 2d503ef2c4
			
		
	
	2d503ef2c4
	
	
	
		
			
			git-svn-id: svn://svn.h5l.se/heimdal/trunk/heimdal@13633 ec53bebd-3082-4978-b11e-865c3cabbd6b
		
			
				
	
	
		
			324 lines
		
	
	
		
			7.4 KiB
		
	
	
	
		
			Groff
		
	
	
	
	
	
			
		
		
	
	
			324 lines
		
	
	
		
			7.4 KiB
		
	
	
	
		
			Groff
		
	
	
	
	
	
| .\" Copyright (c) 2000 - 2004 Kungliga Tekniska Högskolan
 | |
| .\" (Royal Institute of Technology, Stockholm, Sweden). 
 | |
| .\" All rights reserved. 
 | |
| .\"
 | |
| .\" Redistribution and use in source and binary forms, with or without 
 | |
| .\" modification, are permitted provided that the following conditions 
 | |
| .\" are met: 
 | |
| .\"
 | |
| .\" 1. Redistributions of source code must retain the above copyright 
 | |
| .\"    notice, this list of conditions and the following disclaimer. 
 | |
| .\"
 | |
| .\" 2. Redistributions in binary form must reproduce the above copyright 
 | |
| .\"    notice, this list of conditions and the following disclaimer in the 
 | |
| .\"    documentation and/or other materials provided with the distribution. 
 | |
| .\"
 | |
| .\" 3. Neither the name of the Institute nor the names of its contributors 
 | |
| .\"    may be used to endorse or promote products derived from this software 
 | |
| .\"    without specific prior written permission. 
 | |
| .\"
 | |
| .\" THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND 
 | |
| .\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 
 | |
| .\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 
 | |
| .\" ARE DISCLAIMED.  IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE 
 | |
| .\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 
 | |
| .\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 
 | |
| .\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 
 | |
| .\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 
 | |
| .\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 
 | |
| .\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 
 | |
| .\" SUCH DAMAGE. 
 | |
| .\" 
 | |
| .\" $Id$
 | |
| .\"
 | |
| .Dd March 24, 2004
 | |
| .Dt KADMIN 8
 | |
| .Os HEIMDAL
 | |
| .Sh NAME
 | |
| .Nm kadmin
 | |
| .Nd Kerberos administration utility
 | |
| .Sh SYNOPSIS
 | |
| .Nm
 | |
| .Oo Fl p Ar string \*(Ba Xo
 | |
| .Fl -principal= Ns Ar string
 | |
| .Xc
 | |
| .Oc
 | |
| .Oo Fl K Ar string \*(Ba Xo
 | |
| .Fl -keytab= Ns Ar string
 | |
| .Xc
 | |
| .Oc
 | |
| .Oo Fl c Ar file \*(Ba Xo
 | |
| .Fl -config-file= Ns Ar file
 | |
| .Xc
 | |
| .Oc
 | |
| .Oo Fl k Ar file \*(Ba Xo
 | |
| .Fl -key-file= Ns Ar file
 | |
| .Xc
 | |
| .Oc
 | |
| .Oo Fl r Ar realm \*(Ba Xo
 | |
| .Fl -realm= Ns Ar realm
 | |
| .Xc
 | |
| .Oc
 | |
| .Oo Fl a Ar host \*(Ba Xo
 | |
| .Fl -admin-server= Ns Ar host
 | |
| .Xc
 | |
| .Oc
 | |
| .Oo Fl s Ar port number \*(Ba Xo
 | |
| .Fl -server-port= Ns Ar port number
 | |
| .Xc
 | |
| .Oc
 | |
| .Op Fl l | Fl -local
 | |
| .Op Fl h | Fl -help
 | |
| .Op Fl v | Fl -version
 | |
| .Op Ar command
 | |
| .Sh DESCRIPTION
 | |
| The
 | |
| .Nm
 | |
| program is used to make modifications to the Kerberos database, either remotely via the
 | |
| .Xr kadmind 8
 | |
| daemon, or locally (with the
 | |
| .Fl l
 | |
| option).
 | |
| .Pp
 | |
| Supported options:
 | |
| .Bl -tag -width Ds
 | |
| .It Xo
 | |
| .Fl p Ar string ,
 | |
| .Fl -principal= Ns Ar string
 | |
| .Xc
 | |
| principal to authenticate as
 | |
| .It Xo
 | |
| .Fl K Ar string ,
 | |
| .Fl -keytab= Ns Ar string
 | |
| .Xc
 | |
| keytab for authentication principal
 | |
| .It Xo
 | |
| .Fl c Ar file ,
 | |
| .Fl -config-file= Ns Ar file
 | |
| .Xc
 | |
| location of config file
 | |
| .It Xo
 | |
| .Fl k Ar file ,
 | |
| .Fl -key-file= Ns Ar file
 | |
| .Xc
 | |
| location of master key file
 | |
| .It Xo
 | |
| .Fl r Ar realm ,
 | |
| .Fl -realm= Ns Ar realm
 | |
| .Xc
 | |
| realm to use
 | |
| .It Xo
 | |
| .Fl a Ar host ,
 | |
| .Fl -admin-server= Ns Ar host
 | |
| .Xc
 | |
| server to contact
 | |
| .It Xo
 | |
| .Fl s Ar port number ,
 | |
| .Fl -server-port= Ns Ar port number
 | |
| .Xc
 | |
| port to use
 | |
| .It Xo
 | |
| .Fl l ,
 | |
| .Fl -local
 | |
| .Xc
 | |
| local admin mode
 | |
| .El
 | |
| .Pp
 | |
| If no
 | |
| .Ar command
 | |
| is given on the command line,
 | |
| .Nm
 | |
| will prompt for commands to process. Some of the commands which take a
 | |
| principal as argument
 | |
| .Ns ( Nm delete ,
 | |
| .Nm ext_keytab ,
 | |
| .Nm get ,
 | |
| .Nm modify ,
 | |
| and
 | |
| .Nm passwd )
 | |
| will accept a glob style wildcard, and perform the operation on all
 | |
| matching principals.  Commands include:
 | |
| .\" not using a list here, since groff apparently gets confused
 | |
| .\" with nested Xo/Xc
 | |
| .Bd -ragged -offset indent
 | |
| .Nm add
 | |
| .Op Fl r | Fl -random-key
 | |
| .Op Fl -random-password
 | |
| .Oo Fl p Ar string \*(Ba Xo
 | |
| .Fl -password= Ns Ar string
 | |
| .Xc
 | |
| .Oc
 | |
| .Op Fl -key= Ns Ar string
 | |
| .Op Fl -max-ticket-life= Ns Ar lifetime
 | |
| .Op Fl -max-renewable-life= Ns Ar lifetime
 | |
| .Op Fl -attributes= Ns Ar attributes
 | |
| .Op Fl -expiration-time= Ns Ar time
 | |
| .Op Fl -pw-expiration-time= Ns Ar time
 | |
| .Ar principal...
 | |
| .Pp
 | |
| .Bd -ragged -offset indent
 | |
| Adds a new principal to the database. The options not passed on the
 | |
| command line will be promped for.
 | |
| .Ed
 | |
| .Pp
 | |
| .Nm delete
 | |
| .Ar principal...
 | |
| .Pp
 | |
| .Bd -ragged -offset indent
 | |
| Removes a principal.
 | |
| .Ed
 | |
| .Pp
 | |
| .Nm del_enctype
 | |
| .Ar principal enctypes...
 | |
| .Pp
 | |
| .Bd -ragged -offset indent
 | |
| Removes some enctypes from a principal. This can be useful the service
 | |
| belonging to the principal is known to not handle certain enctypes.
 | |
| .Ed
 | |
| .Pp
 | |
| .Nm ext_keytab
 | |
| .Oo Fl k Ar string \*(Ba Xo
 | |
| .Fl -keytab= Ns Ar string
 | |
| .Xc
 | |
| .Oc
 | |
| .Ar principal...
 | |
| .Pp
 | |
| .Bd -ragged -offset indent
 | |
| Creates a keytab with the keys of the specified principals.
 | |
| .Ed
 | |
| .Pp
 | |
| .Nm get
 | |
| .Op Fl l | Fl -long
 | |
| .Op Fl s | Fl -short
 | |
| .Op Fl t | Fl -terse
 | |
| .Ar principal...
 | |
| .Pp
 | |
| .Bd -ragged -offset indent
 | |
| Lists the matching principals, long format gives more information, and
 | |
| terse just prints the names.
 | |
| .Ed
 | |
| .Pp
 | |
| .Nm modify
 | |
| .Oo Fl a Ar attributes \*(Ba Xo
 | |
| .Fl -attributes= Ns Ar attributes
 | |
| .Xc
 | |
| .Oc
 | |
| .Op Fl -max-ticket-life= Ns Ar lifetime
 | |
| .Op Fl -max-renewable-life= Ns Ar lifetime
 | |
| .Op Fl -expiration-time= Ns Ar time
 | |
| .Op Fl -pw-expiration-time= Ns Ar time
 | |
| .Op Fl -kvno= Ns Ar number
 | |
| .Ar principal...
 | |
| .Pp
 | |
| .Bd -ragged -offset indent
 | |
| Modifies certain attributes of a principal. If run without command
 | |
| line options, you will be prompted. With command line options, it will
 | |
| only change the ones specified.
 | |
| .Ed
 | |
| .Pp
 | |
| .Nm passwd
 | |
| .Op Fl r | Fl -random-key
 | |
| .Op Fl -random-password
 | |
| .Oo Fl p Ar string \*(Ba Xo
 | |
| .Fl -password= Ns Ar string
 | |
| .Xc
 | |
| .Oc
 | |
| .Op Fl -key= Ns Ar string
 | |
| .Ar principal...
 | |
| .Pp
 | |
| .Bd -ragged -offset indent
 | |
| Changes the password of an existing principal.
 | |
| .Ed
 | |
| .Pp
 | |
| .Nm password-quality
 | |
| .Ar principal
 | |
| .Ar password
 | |
| .Pp
 | |
| .Bd -ragged -offset indent
 | |
| Run the password quality check function locally.
 | |
| You can run this on the host that is configured to run the kadmind
 | |
| process to verify that your configuration file is correct.
 | |
| The verification is done locally, if kadmin is is run in remote mode,
 | |
| no rpc call is done to the server.
 | |
| .Ed
 | |
| .Pp
 | |
| .Nm privileges
 | |
| .Pp
 | |
| .Bd -ragged -offset indent
 | |
| Lists the operations you are allowed to perform. These include
 | |
| .Li add , 
 | |
| .Li change-password ,
 | |
| .Li delete ,
 | |
| .Li get ,
 | |
| .Li list ,
 | |
| and
 | |
| .Li modify .
 | |
| .Ed
 | |
| .Pp
 | |
| .Nm rename
 | |
| .Ar from to
 | |
| .Pp
 | |
| .Bd -ragged -offset indent
 | |
| Renames a principal. This is normally transparent, but since keys are
 | |
| salted with the principal name, they will have a non-standard salt,
 | |
| and clients which are unable to cope with this will fail. Kerberos 4
 | |
| suffers from this.
 | |
| .Ed
 | |
| .Pp
 | |
| .Ed
 | |
| .Pp
 | |
| When running in local mode, the following commands can also be used:
 | |
| .Bd -ragged -offset indent
 | |
| .Nm dump
 | |
| .Op Fl d | Fl -decrypt
 | |
| .Op Ar dump-file
 | |
| .Pp
 | |
| .Bd -ragged -offset indent
 | |
| Writes the database in
 | |
| .Dq human readable
 | |
| form to the specified file, or standard out. If the database is
 | |
| encrypted, the dump will also have encrypted keys, unless 
 | |
| .Fl -decrypt
 | |
| is used.
 | |
| .Ed
 | |
| .Pp
 | |
| .Nm init
 | |
| .Op Fl -realm-max-ticket-life= Ns Ar string
 | |
| .Op Fl -realm-max-renewable-life= Ns Ar string
 | |
| .Ar realm
 | |
| .Pp
 | |
| .Bd -ragged -offset indent
 | |
| Initializes the Kerberos database with entries for a new realm. It's
 | |
| possible to have more than one realm served by one server.
 | |
| .Ed
 | |
| .Pp
 | |
| .Nm load
 | |
| .Ar file
 | |
| .Pp
 | |
| .Bd -ragged -offset indent
 | |
| Reads a previously dumped database, and re-creates that database from
 | |
| scratch.
 | |
| .Ed
 | |
| .Pp
 | |
| .Nm merge
 | |
| .Ar file
 | |
| .Pp
 | |
| .Bd -ragged -offset indent
 | |
| Similar to
 | |
| .Nm load
 | |
| but just modifies the database with the entries in the dump file.
 | |
| .Ed
 | |
| .Pp
 | |
| .Ed
 | |
| .\".Sh ENVIRONMENT
 | |
| .\".Sh FILES
 | |
| .\".Sh EXAMPLES
 | |
| .\".Sh DIAGNOSTICS
 | |
| .Sh SEE ALSO
 | |
| .Xr kadmind 8 ,
 | |
| .Xr kdc 8
 | |
| .\".Sh STANDARDS
 | |
| .\".Sh HISTORY
 | |
| .\".Sh AUTHORS
 | |
| .\".Sh BUGS
 |