Bugzilla will be upgraded to version 5.0. The upgrade date is tentatively scheduled for 2 December 2018, pending final testing and feedback.
Bug 1252761 - [Docs] [Shell] Users can now use Kerberos authentication
[Docs] [Shell] Users can now use Kerberos authentication
Status: CLOSED CURRENTRELEASE
Product: Red Hat Enterprise Virtualization Manager
Classification: Red Hat
Component: Documentation (Show other bugs)
3.6.0
Unspecified Unspecified
medium Severity medium
: ovirt-3.6.1
: 3.6.0
Assigned To: Andrew Burden
Dayle Parker
docs
:
Depends On: 1145239
Blocks:
  Show dependency treegraph
 
Reported: 2015-08-12 04:29 EDT by Andrew Dahms
Modified: 2016-02-10 13:57 EST (History)
6 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2015-11-19 23:10:02 EST
Type: Bug
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: Docs
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Andrew Dahms 2015-08-12 04:29:06 EDT
In RHEV 3.6, users can now use Kerberos to authenticate when working with the RHEVM shell -

  $ ovirt-shell --kerberos ...

An example outlining the above option must be added to the RHEVM Shell Guide with a short description of what this option does and why a user would want to use it.
Comment 1 Andrew Dahms 2015-09-11 02:03:39 EDT
Assigning to Andrew for review.
Comment 2 Sandro Bonazzola 2015-10-26 08:34:15 EDT
this is an automated message. oVirt 3.6.0 RC3 has been released and GA is targeted to next week, Nov 4th 2015.
Please review this bug and if not a blocker, please postpone to a later release.
All bugs not postponed on GA release will be automatically re-targeted to

- 3.6.1 if severity >= high
- 4.0 if severity < high
Comment 5 Andrew Burden 2015-11-19 23:10:02 EST
3.6 Beta documentation can be found at https://access.redhat.com/documentation/en/red-hat-enterprise-virtualization/

Note You need to log in before you can comment on or make changes to this bug.