mirror of
https://github.com/goauthentik/authentik
synced 2026-04-27 18:07:15 +02:00
website: fix typos (#20996)
This commit is contained in:
@@ -13,7 +13,7 @@ The following placeholders are used in this guide:
|
||||
- `REALM.COMPANY` is the Kerberos realm.
|
||||
- `authentik.company` is the FQDN of the authentik install.
|
||||
|
||||
Examples are shown for an MIT Krb5 KDC system; you might need to adapt them for you Kerberos installation.
|
||||
Examples are shown for an MIT Krb5 KDC system; you might need to adapt them for your Kerberos installation.
|
||||
|
||||
There are three ways to use the Kerberos source:
|
||||
|
||||
@@ -21,7 +21,7 @@ There are three ways to use the Kerberos source:
|
||||
- As a directory source, where users are synced from the KDC.
|
||||
- With SPNEGO, where users can log in to authentik with their [browser](./browser.md) and their Kerberos credentials.
|
||||
|
||||
You can choose to use one or several of those methods.
|
||||
You can choose to use one or more of those methods.
|
||||
|
||||
## Common settings
|
||||
|
||||
@@ -62,7 +62,7 @@ In authentik, configure these extra options:
|
||||
- Sync principal: `authentik/admin@REALM.COMPANY`
|
||||
- Sync keytab: the base64-encoded keytab created above.
|
||||
|
||||
If you do not wish to use a keytab, you can also configure authentik to authenticate using a password, or an existing credentials cache.
|
||||
If you do not wish to use a keytab, you can also configure authentik to authenticate using a password or an existing credentials cache.
|
||||
|
||||
## SPNEGO
|
||||
|
||||
@@ -85,7 +85,7 @@ If you do not wish to use a keytab, you can also configure authentik to use an e
|
||||
|
||||
You can also override the SPNEGO server name if needed.
|
||||
|
||||
You might need to configure your web browser to allow SPNEGO. Check out [our documentation](./browser.md) on how to do so. You can now login to authentik using SPNEGO.
|
||||
You might need to configure your web browser to allow SPNEGO. Check out [our documentation](./browser.md) on how to do so. You can now log in to authentik using SPNEGO.
|
||||
|
||||
### Custom server name
|
||||
|
||||
@@ -113,7 +113,7 @@ Kerberos property mappings are used when you define a Kerberos source. These map
|
||||
- authentik default Kerberos User Mapping: Add realm as group
|
||||
The realm of the user will be added as a group for that user.
|
||||
- authentik default Kerberos User Mapping: Ignore other realms
|
||||
Realms other than the one configured on the source are ignored, and log in is not allowed.
|
||||
Realms other than the one configured on the source are ignored, and logging in is not allowed.
|
||||
- authentik default Kerberos User Mapping: Ignore system principals
|
||||
System principals such as `K/M` or `kadmin/admin` are ignored.
|
||||
- authentik default Kerberos User Mapping: Multipart principals as service accounts
|
||||
|
||||
Reference in New Issue
Block a user