On Wed, 2013-04-10 at 12:09 -0400, Simo Sorce wrote: > On Wed, 2013-04-10 at 15:06 +0000, Myklebust, Trond wrote: > > On Wed, 2013-04-10 at 10:50 -0400, Simo Sorce wrote: > > > > > This way all applications that need access to krb5 protected shares do not need > > > to be taught how to initiate crdentials on their own, nor they need to be > > > wrapped in additional init scripts like k5start or use wasteful cronjobs to > > > keep credentials fresh. All is needed is to drop a keytab with the right keys > > > in a special location on the system and gss-proxy will do the rest. > > > > Can you explain further? Will this for instance work with Active > > Directory servers as well as MIT and Heimdal? > > GSS-Proxy on the client works only with MIT 1.11 as explained, but the > patch itself does not depend on GSS-Proxy so it is safe from rpc.gssd to > include it. OK. > GSS-Proxy doesn't really care what it the Kerberos infrastructure is > used on the KDC, so it will work with any KDC, be it MIT, Heimdal or > Active Directory. So what kind of privileges do the keys in this keytab need in order to allow gss-proxy to perform automatic renewal of gss sessions? -- Trond Myklebust Linux NFS client maintainer NetApp Trond.Myklebust@xxxxxxxxxx www.netapp.com -- To unsubscribe from this list: send the line "unsubscribe linux-nfs" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html