Linux websever 5.15.0-153-generic #163-Ubuntu SMP Thu Aug 7 16:37:18 UTC 2025 x86_64
Apache/2.4.52 (Ubuntu)
: 192.168.3.70 | : 192.168.1.99
Cant Read [ /etc/named.conf ]
8.1.2-1ubuntu2.23
urlab
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
usr /
share /
doc /
realmd /
html /
[ HOME SHELL ]
Name
Size
Permission
Action
book.devhelp2
7.21
KB
-rw-r--r--
dbus-interface-raw.html
4.93
KB
-rw-r--r--
dbus-interface-reference.html
2.57
KB
-rw-r--r--
development.html
2.71
KB
-rw-r--r--
gdbus-org.freedesktop.realmd.K...
3.77
KB
-rw-r--r--
gdbus-org.freedesktop.realmd.K...
16.01
KB
-rw-r--r--
gdbus-org.freedesktop.realmd.P...
8.74
KB
-rw-r--r--
gdbus-org.freedesktop.realmd.R...
19.67
KB
-rw-r--r--
gdbus-org.freedesktop.realmd.S...
7.79
KB
-rw-r--r--
gtk-doc.css
8.64
KB
-rw-r--r--
guide-active-directory-client....
4.33
KB
-rw-r--r--
guide-active-directory-join.ht...
4.97
KB
-rw-r--r--
guide-active-directory-permit....
2.77
KB
-rw-r--r--
guide-active-directory.html
4.39
KB
-rw-r--r--
guide-integration.html
1.55
KB
-rw-r--r--
guide-ipa-client.html
1.87
KB
-rw-r--r--
guide-ipa-join.html
3.59
KB
-rw-r--r--
guide-ipa-permit.html
2.76
KB
-rw-r--r--
guide-ipa.html
3.89
KB
-rw-r--r--
guide-kerberos.html
3.41
KB
-rw-r--r--
guide.html
3.68
KB
-rw-r--r--
home.png
566
B
-rw-r--r--
index.html
4.39
KB
-rw-r--r--
left.png
362
B
-rw-r--r--
realm-manual.html
1.82
KB
-rw-r--r--
realm.html
19.56
KB
-rw-r--r--
realmd-conf.html
20.47
KB
-rw-r--r--
right.png
377
B
-rw-r--r--
style.css
1.71
KB
-rw-r--r--
up.png
287
B
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : guide-kerberos.html
<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"> <html> <head> <meta http-equiv="Content-Type" content="text/html; charset=UTF-8"> <title>Using with other Kerberos realms: realmd</title> <meta name="generator" content="DocBook XSL Stylesheets Vsnapshot"> <link rel="home" href="index.html" title="realmd"> <link rel="up" href="guide.html" title="Part I. Administrative Guide"> <link rel="prev" href="guide-ipa-permit.html" title="Logins using Domain Accounts"> <link rel="next" href="guide-integration.html" title="Integration"> <link rel="stylesheet" href="style.css" type="text/css"> </head> <body bgcolor="white" text="black" link="#0000FF" vlink="#840084" alink="#0000FF"> <table class="navigation" id="top" width="100%" summary="Navigation header" cellpadding="2" cellspacing="5"><tr valign="middle"> <td width="100%" align="left" class="shortcuts"></td> <td><a accesskey="h" href="index.html"><img src="home.png" width="16" height="16" border="0" alt="Home"></a></td> <td><a accesskey="u" href="guide.html"><img src="up.png" width="16" height="16" border="0" alt="Up"></a></td> <td><a accesskey="p" href="guide-ipa-permit.html"><img src="left.png" width="16" height="16" border="0" alt="Prev"></a></td> <td><a accesskey="n" href="guide-integration.html"><img src="right.png" width="16" height="16" border="0" alt="Next"></a></td> </tr></table> <div class="chapter"> <div class="titlepage"><div><div><h2 class="title"> <a name="guide-kerberos"></a>Using with other Kerberos realms</h2></div></div></div> <div class="toc"><dl class="toc"><dt><span class="section"><a href="guide-kerberos.html#discovering-kerberos-realms">Discovering Kerberos realms</a></span></dt></dl></div> <p><span class="command"><strong>realmd</strong></span> can discover generic Kerberos realms. Since there is no standard way to enroll a computer against a Kerberos server, it is not possible to do this with <span class="command"><strong>realmd</strong></span>.</p> <div class="section"> <div class="titlepage"><div><div><h2 class="title" style="clear: both"> <a name="discovering-kerberos-realms"></a>Discovering Kerberos realms</h2></div></div></div> <p><span class="command"><strong>realmd</strong></span> discovers which domains or realms it can use or configure. It can discover and identify Kerberos domains by looking up the appropriate DNS SRV records.</p> <p>The following DNS SRV record is required to be present for <span class="command"><strong>realmd</strong></span> to identify a provided realm as a Kerberos domain.</p> <div class="informalexample"><pre class="screen"> # In this example the Kerberos domain is 'domain.example.com' <span class="emphasis"><em>_kerberos._udp.</em></span>domain.example.com. </pre></div> <div class="informalexample"><pre class="screen"> $ <span class="command"><strong>realm --verbose discover domain.example.com</strong></span> * Searching for kerberos SRV records for domain: _kerberos._udp.domain.example.com * Searching for MSDCS SRV records on domain: _kerberos._tcp.dc._msdcs.domain.example.com * dc.domain.example.com:88 * Trying to retrieve IPA certificate from dc.domain.example.com ! Couldn't read certificate via HTTP: No PEM-encoded certificate found ! Couldn't discover IPA KDC: No PEM-encoded certificate found * Found kerberos DNS records for: domain.example.com * Successfully discovered: domain.example.com ... </pre></div> </div> </div> <div class="footer"> <hr>Generated by GTK-Doc</div> </body> </html>
Close