Administration Guide > LDAP Domain Administration > LDAP Domain Administration > About Kerberos Configuration Files and LDAP Login Credentials
 
About Kerberos Configuration Files and LDAP Login Credentials
Kerberos configuration files often contain definitions for multiple Kerberos realms in the realms section of the file and a default realm specified in the libdefaults section.
Depending on what realm a user belongs to as specified in the libdefaults section of the Kerberos configuration file, their user name might need to be specified differently during login:
Realm Type
User Name Syntax
Example
Non-Default
<user>@<non-default_realm_name>
mmhennington@2K8.HLP.NET
Default
<user>
mmhennington
Passwords are treated one of the following ways:
Password
New Tickets Obtained
specified during login
The user principal and password are used to obtain:
A ticket-granting ticket from the Key Distribution Center (KDC) server
A service ticket for the Kerberos enabled LDAP server based on the new ticket-granting ticket
left blank during login
The specified user principal obtains a ticket-granting ticket from the ticket cache or the Local Security Authority.
The kinit command can be used to obtain a list of available tickets that reside in the ticket cache or Local Security Authority for principals.
Examples
To connect to an external LDAP server residing in the 2K8.HLP.NET realm and the Kerberos configuration file contains the realm settings for the 2K8.HLP.NET realm, but the default realm is SUPPORT.NET, then the user name would have to be specified as <user>@2K8.HLP.NET.