Skip to content

Commit 7d7e020

Browse files
jgroffensimo5
authored andcommitted
Update and rename README to README.md
Add symlink to .md so the markdown is picked up. Updated styling and fixed a couple of typos. Simo: Changed rename into a symlink. Reworded commit message Reviewed-by: Simo Sorce <simo@redhat.com> Closes #51
1 parent 5e72093 commit 7d7e020

File tree

2 files changed

+40
-39
lines changed

2 files changed

+40
-39
lines changed

README

+39-39
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ Intro
55
-----
66

77
This module has been built as a replacement for the aging mod_auth_kerb.
8-
It's aim is to use only GSSAPI calls and be as much as possible agnostic
8+
Its aim is to use only GSSAPI calls and be as much as possible agnostic
99
of the actual mechanism used.
1010

1111
Dependencies
@@ -17,15 +17,15 @@ extension](http://k5wiki.kerberos.org/wiki/Projects/Credential_Store_extensions)
1717
is necessary to achieve full functionality. Reduced functionality is
1818
provided without these extensions.
1919

20-
krb5 (>=1.11)
21-
Apache (>=2.4)
20+
krb5 (>=1.11)
21+
Apache (>=2.4)
2222

2323
Installation
2424
------------
2525

26-
./configure
27-
make
28-
make install
26+
./configure
27+
make
28+
make install
2929

3030

3131
Configuration
@@ -41,12 +41,12 @@ The simplest configuration scheme specifies just one directive, which is the
4141
location of the keytab.
4242

4343
#### Example
44-
<Location /private>
45-
AuthType GSSAPI
46-
AuthName "GSSAPI Single Sign On Login"
47-
GssapiCredStore keytab:/etc/httpd.keytab
48-
Require valid-user
49-
</Location>
44+
<Location /private>
45+
AuthType GSSAPI
46+
AuthName "GSSAPI Single Sign On Login"
47+
GssapiCredStore keytab:/etc/httpd.keytab
48+
Require valid-user
49+
</Location>
5050

5151
Your Apache server need read access to the keytab configured.
5252
If your Kerberos implementation does not support the credential store
@@ -62,7 +62,7 @@ Configuration Directives
6262
Forces the authentication attempt to fail if the connection is not being
6363
established over TLS
6464

65-
Example:
65+
#### Example
6666
GssapiSSLonly On
6767

6868

@@ -78,7 +78,7 @@ When this options is used the resolved name is set in the REMOTE_USER variable
7878
however the complete client principal name is also made available in the
7979
GSS_NAME variable.
8080

81-
Example:
81+
#### Example
8282
GssapiLocalName on
8383

8484

@@ -90,15 +90,15 @@ the connection in order to keep the state between round-trips. With this option
9090
enable incomplete context are store in the connection and retrieved on the next
9191
request for continuation.
9292

93-
Example:
93+
#### Example
9494
GssapiConnectionBound On
9595

9696

9797
### GssapiSignalPersistentAuth
9898
For clients that make use of Persistent-Auth header, send the header according
9999
to GssapiConnectionBound setting.
100100

101-
Example:
101+
#### Example
102102
GssapiSignalPersistentAuth On
103103

104104

@@ -116,7 +116,7 @@ See the
116116
[mod_sessions](http://httpd.apache.org/docs/current/mod/mod_session.html)
117117
documentation for more information.
118118

119-
Example:
119+
#### Example
120120
GssapiUseSessions On
121121
Session On
122122
SessionCookieName gssapi_session path=/private;httponly;secure;
@@ -126,15 +126,15 @@ Example:
126126

127127
When GssapiUseSessions is enabled a key use to encrypt and MAC the session
128128
data will be automatically generated at startup, this means session data will
129-
become unreadable if the server is restarted or multiple serves are used and
129+
become unreadable if the server is restarted or multiple servers are used and
130130
the client is load balanced from one to another. To obviate this problem the
131131
admin can choose to install a permanent key in the configuration so that
132132
session data remain accessible after a restart or by multiple servers
133133
sharing the same key.
134134

135135
The key must be a base64 encoded raw key of 32 bytes of length.
136136

137-
Example:
137+
#### Example
138138
GssapiSessionKey key:VGhpcyBpcyBhIDMyIGJ5dGUgbG9uZyBzZWNyZXQhISE=
139139

140140

@@ -143,7 +143,7 @@ Example:
143143
The GssapiCredStore option allows to specify multiple credential related
144144
options like keytab location, client_keytab location, ccache location etc.
145145

146-
Example:
146+
#### Example
147147
GssapiCredStore keytab:/etc/httpd.keytab
148148
GssapiCredStore ccache:FILE:/var/run/httpd/krb5ccache
149149

@@ -156,13 +156,13 @@ The delegated credentials will be stored in a file named after the client
156156
principal and the subprocess environment variable KRB5CCNAME will be set
157157
to point to that file.
158158

159-
Example:
159+
#### Example
160160
GssapiDelegCcacheDir /var/run/httpd/clientcaches
161161

162-
163162
A user foo@EXAMPLE.COM delegating its credentials would cause the server to
164163
create a ccache file named /var/run/httpd/clientcaches/foo@EXAMPLE.COM
165164

165+
166166
### GssapiUseS4U2Proxy
167167

168168
Enables the use of the s4u2Proxy Kerberos extension also known as
@@ -174,14 +174,14 @@ This options requires GssapiDelegCcacheDir to be set. The ccache will be
174174
populated with the user's provided ticket which is later used as evidence
175175
ticket by the application.
176176

177-
Example:
177+
#### Example
178178
GssapiUseS4U2Proxy On
179179
GssapiCredStore keytab:/etc/httpd.keytab
180180
GssapiCredStore client_keytab:/etc/httpd.keytab
181181
GssapiCredStore ccache:FILE:/var/run/httpd/krb5ccache
182182
GssapiDelegCcacheDir /var/run/httpd/clientcaches
183183

184-
NOTE: The client keytab is necessary to allow GSSAPI to initate via keytab
184+
**NOTE:** The client keytab is necessary to allow GSSAPI to initiate via keytab
185185
on its own. If not present an external mechanism needs to kinit with the
186186
keytab and store a ccache in the configured ccache file.
187187

@@ -191,19 +191,19 @@ Allows the use of Basic Auth in conjunction with Negotiate.
191191
If the browser fails to use Negotiate is will instead fallback to Basic and
192192
the username and password will be used to try to acquire credentials in the
193193
module via GSSAPI. If credentials are acquire successfully then they are
194-
validated agaist the server's keytab.
194+
validated against the server's keytab.
195195

196-
Enable with: GssapiBasicAuth On
197-
Default: GssapiBasicAuth Off
196+
- **Enable with:** GssapiBasicAuth On
197+
- **Default:** GssapiBasicAuth Off
198198

199-
Example:
200-
<Location /gssapi>
201-
AuthType GSSAPI
202-
AuthName "Login"
203-
GssapiBasicAuth On
204-
GssapiCredStore keytab:/etc/httpd/http.keytab
205-
Require valid-user
206-
</Location>
199+
#### Example
200+
<Location /gssapi>
201+
AuthType GSSAPI
202+
AuthName "Login"
203+
GssapiBasicAuth On
204+
GssapiCredStore keytab:/etc/httpd/http.keytab
205+
Require valid-user
206+
</Location>
207207

208208

209209
### GssapiAllowedMech
@@ -213,19 +213,19 @@ can be used when credentials for multiple mechanisms are available.
213213
By default no mechanism is set, this means all locally available mechanisms
214214
are allowed. The recognized mechanism names are: krb5, iakerb, ntlmssp
215215

216-
Example:
216+
#### Example
217217
GssapiAllowedMech krb5
218218
GssapiAllowedMech ntlmssp
219219

220220

221221
### GssapiBasicAuthMech
222222

223223
List of mechanisms against which Basic Auth is attempted. This is useful to
224-
restrict the mechanisms that can be used to attaempt password auth.
224+
restrict the mechanisms that can be used to attempt password auth.
225225
By default no mechanism is set, this means all locally available mechanisms
226226
are allowed, unless GssapiAllowedMech is set, in which case those are used.
227-
GssapiBasicAuthMech always takes precendence over GssapiAllowedMech.
227+
GssapiBasicAuthMech always takes precedence over GssapiAllowedMech.
228228
The recognized mechanism names are: krb5, iakerb, ntlmssp
229229

230-
Example:
230+
#### Example
231231
GssapiBasicAuthMech krb5

README.md

+1
Original file line numberDiff line numberDiff line change
@@ -0,0 +1 @@
1+
README

0 commit comments

Comments
 (0)