Received: from pch.mit.edu (PCH.MIT.EDU [18.7.21.90]) by krbdev.mit.edu (8.9.3p2) with ESMTP id XAA06610; Mon, 8 Jan 2007 23:35:25 -0500 (EST) Received: from pch.mit.edu (pch.mit.edu [127.0.0.1]) by pch.mit.edu (8.13.6/8.12.8) with ESMTP id l094Z80f031182; Mon, 8 Jan 2007 23:35:08 -0500 Received: from fort-point-station.mit.edu (FORT-POINT-STATION.MIT.EDU [18.7.7.76]) by pch.mit.edu (8.13.6/8.12.8) with ESMTP id l092OLkQ005436 for ; Mon, 8 Jan 2007 21:24:21 -0500 Received: from mit.edu (M24-004-BARRACUDA-3.MIT.EDU [18.7.7.114]) by fort-point-station.mit.edu (8.13.6/8.9.2) with ESMTP id l092O5AY022100 for ; Mon, 8 Jan 2007 21:24:05 -0500 (EST) Received: from spunkymail-a7.dreamhost.com (sd-green-bigip-62.dreamhost.com [208.97.132.62]) by mit.edu (Spam Firewall) with ESMTP id E3C011CEA0A for ; Mon, 8 Jan 2007 21:24:04 -0500 (EST) Received: from [192.168.168.3] (pool-71-99-0-161.tampfl.dsl-w.verizon.net [71.99.0.161]) by spunkymail-a7.dreamhost.com (Postfix) with ESMTP id F03F35C050 for ; Mon, 8 Jan 2007 18:24:03 -0800 (PST) Message-Id: <45A2FCBE.1010705@kickflop.net> Date: Mon, 08 Jan 2007 21:23:58 -0500 From: Jeff Blaine User-Agent: Thunderbird 1.5.0.9 (Windows/20061207) MIME-Version: 1.0 To: krb5-bugs@mit.edu Subject: Doc - Add-Kerberos-Principals-to-the-Database Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit X-Spam-Score: 0.12 X-Spam-Flag: NO X-Scanned-BY: MIMEDefang 2.42 X-Mailman-Approved-At: Mon, 08 Jan 2007 23:35:08 -0500 X-Beenthere: krb5-bugs-incoming@mailman.mit.edu X-Mailman-Version: 2.1.6 Precedence: list Sender: krb5-bugs-incoming-bounces@PCH.mit.edu Errors-To: krb5-bugs-incoming-bounces@PCH.mit.edu X-RT-Original-Encoding: iso-8859-1 Content-Length: 1009 First, sorry for not being able to use the PR method to submit these 'bugs' I am finding. My Kerberos boxes are in a testbed with no working mail. Second, I hope these are not annoying. I have been trying to submit things I generally think do need improvement for any future reader. http://web.mit.edu/Kerberos/krb5-1.5/krb5-1.5.1/doc/krb5-install/Add-Kerberos-Principals-to-the-Database.html#Add%20Kerberos%20Principals%20to%20the%20Database "Once your KDCs are set up and running, you are ready to use kadmin to load principals for your users, hosts, and other services into the Kerberos database. This procedure is described fully in the "Adding or Modifying Principals" section of the Kerberos V5 System Administrator's Guide. (See Create Host Keys for the Slave KDCs, for a brief Okay! description.) The keytab is generated by running kadmin and issuing the ktadd command." What keytab? That last sentence is dangling out there on its own out of context.