# 1. Insert following lines into the options {} section of your named.conf
# file:
-tkey-gssapi-keytab "/data/samba/git/samba/st/promoted_dc/private/dns.keytab";
+tkey-gssapi-keytab "/data/samba/git/samba4.1/st/promoted_dc/private/dns.keytab";
#
# Common Steps for BIND 9.x.x --------------------------------------------
# is running as a non-root user, the "dns.keytab" file must have its
# permissions altered to allow the daemon to read it. Under Fedora 9,
# execute the following commands:
-chgrp named /data/samba/git/samba/st/promoted_dc/private/dns.keytab
-chmod g+r /data/samba/git/samba/st/promoted_dc/private/dns.keytab
+chgrp named /data/samba/git/samba4.1/st/promoted_dc/private/dns.keytab
+chmod g+r /data/samba/git/samba4.1/st/promoted_dc/private/dns.keytab
# 3. Ensure the BIND zone file(s) that will be dynamically updated are in
# a directory where the BIND daemon can write. When BIND performs
# SELinux file contexts. The dns.keytab file must be accessible by the
# BIND daemon and should have a SELinux type of named_conf_t. This can be
# set with the following command:
-chcon -t named_conf_t /data/samba/git/samba/st/promoted_dc/private/dns.keytab
+chcon -t named_conf_t /data/samba/git/samba4.1/st/promoted_dc/private/dns.keytab