From efeb9d710d83d730d7e145e0b18a3b79148f6529 Mon Sep 17 00:00:00 2001 From: Andrew Miloradovsky Date: Thu, 19 Dec 2019 18:01:28 +0300 Subject: [PATCH] docs/auth.html.in: fixed typos MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Reviewed-by: Daniel P. Berrangé Signed-off-by: Andrew Miloradovsky --- docs/auth.html.in | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/docs/auth.html.in b/docs/auth.html.in index f198f39b64..6f8805b6f5 100644 --- a/docs/auth.html.in +++ b/docs/auth.html.in @@ -274,7 +274,7 @@ to turn on SASL auth in these listeners.

Since the libvirt SASL config file defaults to using GSSAPI (Kerberos), a -config change is rquired to enable plain password auth. This is done by +config change is required to enable plain password auth. This is done by editting /etc/sasl2/libvirt.conf to set the mech_list parameter to scram-sha-1.

@@ -317,7 +317,7 @@ in these scenarios - only the plain TCP listener needs encryption Some operating systems do not install the SASL kerberos plugin by default. It may be necessary to install a sub-package such as cyrus-sasl-gssapi. To check whether the Kerberos plugin is installed run the pluginviewer -program and verify that gssapi is listed,eg: +program and verify that gssapi is listed, e.g.:

 # pluginviewer
@@ -359,7 +359,7 @@ kadmin.local: quit
     

Any client application wishing to connect to a Kerberos enabled libvirt server merely needs to run kinit to gain a user principal. This may well -be done automatically when a user logs into a desktop session, if PAM is setup +be done automatically when a user logs into a desktop session, if PAM is set up to authenticate against Kerberos.