[realms]
EXAMPLE.COM = {
- pkinit_anchors = FILE\:/usr/local/example.com.crt
+ pkinit_anchors = FILE:/usr/local/example.com.crt
}
2. generic value in the [kdcdefaults] section.
::
[kdcdefaults]
- pkinit_anchors = DIR\:/usr/local/generic_trusted_cas/
+ pkinit_anchors = DIR:/usr/local/generic_trusted_cas/
For information about the syntax of some of these options, see
:ref:`Specifying PKINIT identity information <pkinit_identity>` in
[libdefaults]
EXAMPLE.COM = {
- pkinit_anchors = FILE\:/usr/local/example.com.crt
+ pkinit_anchors = FILE:/usr/local/example.com.crt
}
2. realm-specific value in the [realms] section,
[realms]
OTHERREALM.ORG = {
- pkinit_anchors = FILE\:/usr/local/otherrealm.org.crt
+ pkinit_anchors = FILE:/usr/local/otherrealm.org.crt
}
3. generic value in the [libdefaults] section.
::
[libdefaults]
- pkinit_anchors = DIR\:/usr/local/generic_trusted_cas/
+ pkinit_anchors = DIR:/usr/local/generic_trusted_cas/
.. _pkinit_identity:
1. Set up SSL on the OpenLDAP server and client to ensure secure
communication when the KDC service and LDAP server are on different
- machines. ``ldapi\://`` can be used if the LDAP server and KDC
+ machines. ``ldapi://`` can be used if the LDAP server and KDC
service are running on the same machine.
A. Setting up SSL on the OpenLDAP server: