There is no such requirement. ~/.codafs/clog/pref is completely
optional.
Clarification: If I don't put those settings in pref along with
codaauth2, I end up having to define the settings on the command
line. I would like
This means that something else in the setup is broken.
Thanks. I thought I was going nuts. I'll see if I can figure out where
this is broken. Probably DNS, I reckon.
clog to pull as much as it can from dns, then codaauth2, then pref, and
finally command line (overrides working in reverse order, or course). If
codaauth2 has the kerberos definitions in it, why does clog need those
same definitions set in pref?
It doesn't. Your authentication advertisement is apparently not working.
Please recheck.
What I don't understand is how to link a coda user to a kerberos service
principal, as the syntax of the principal (displayed, at least) is
different between the two types. For instance, the following is very
The syntax includes realm names which actually refer to the databases'
instances and do not belong to the records in the databases.
strait forward:
coda_u...@coda.realm
coda_u...@kerberos.realm
Exactly.
What I want to do is associate this same coda user to a service instead.
Can this be done by simply creating a kerberos service in the form of:
coda_u...@coda.realm
coda_user/KERBEROS.REALM
Now what do you mean by "a kerberos service"?
Sorry, I can't help this.
Here is an example of a kerberos service principal:
codaauth/coda.re...@kerberos.realm
The question restated is: Can a kerberos service principal (stored in a
kerberos keytab, of course) be used to authenticate a coda user (using clog
-keytab keytab_file, of course)? If so, given the example of:
coda_u...@coda.realm
[what_does_the_service_principal_look_li...@kerberos.realm
If it's not possible, it's not possible.
Thanks,
-Don
{void}