|
|
d738b9 |
From df8c8cc7cd18fa94c920c4763545b6fd93a21fcd Mon Sep 17 00:00:00 2001
|
|
|
d738b9 |
From: Robbie Harwood <rharwood@redhat.com>
|
|
|
d738b9 |
Date: Tue, 9 Oct 2018 17:05:10 -0400
|
|
|
d738b9 |
Subject: [PATCH] Bring back general kerberos man page
|
|
|
d738b9 |
|
|
|
d738b9 |
Restore the content of kerberos(1) as it stood in
|
|
|
d738b9 |
0f81e372a2830c9170f6e08dfa956841d0ebdfb1. Convert to ReST to match
|
|
|
d738b9 |
the other man pages, and install it as the more appropriate
|
|
|
d738b9 |
kerberos(7).
|
|
|
d738b9 |
|
|
|
d738b9 |
Build kerberos(7) and check it in to avoid breaking the build.
|
|
|
d738b9 |
|
|
|
d738b9 |
ticket: 8755 (new)
|
|
|
d738b9 |
tags: pullup
|
|
|
d738b9 |
target_version: 1.16-next
|
|
|
d738b9 |
|
|
|
d738b9 |
(cherry picked from commit c38197ee9808503f86ccffd4a2bd94389e17df0b)
|
|
|
d738b9 |
---
|
|
|
d738b9 |
doc/conf.py | 1 +
|
|
|
d738b9 |
doc/user/user_config/index.rst | 1 +
|
|
|
d738b9 |
doc/user/user_config/kerberos.rst | 148 ++++++++++++++++++++++++
|
|
|
d738b9 |
src/Makefile.in | 4 +-
|
|
|
d738b9 |
src/config/pre.in | 2 +
|
|
|
d738b9 |
src/man/Makefile.in | 14 ++-
|
|
|
d738b9 |
src/man/kerberos.man | 180 ++++++++++++++++++++++++++++++
|
|
|
d738b9 |
7 files changed, 345 insertions(+), 5 deletions(-)
|
|
|
d738b9 |
create mode 100644 doc/user/user_config/kerberos.rst
|
|
|
d738b9 |
create mode 100644 src/man/kerberos.man
|
|
|
d738b9 |
|
|
|
d738b9 |
diff --git a/doc/conf.py b/doc/conf.py
|
|
|
d738b9 |
index 3ee2df630..68dad781f 100644
|
|
|
d738b9 |
--- a/doc/conf.py
|
|
|
d738b9 |
+++ b/doc/conf.py
|
|
|
d738b9 |
@@ -292,6 +292,7 @@ man_pages = [
|
|
|
d738b9 |
('user/user_commands/krb5-config', 'krb5-config', u'tool for linking against MIT Kerberos libraries', [u'MIT'], 1),
|
|
|
d738b9 |
('user/user_config/k5login', 'k5login', u'Kerberos V5 acl file for host access', [u'MIT'], 5),
|
|
|
d738b9 |
('user/user_config/k5identity', 'k5identity', u'Kerberos V5 client principal selection rules', [u'MIT'], 5),
|
|
|
d738b9 |
+ ('user/user_config/kerberos', 'kerberos', u'Overview of using Kerberos', [u'MIT'], 7),
|
|
|
d738b9 |
('admin/admin_commands/krb5kdc', 'krb5kdc', u'Kerberos V5 KDC', [u'MIT'], 8),
|
|
|
d738b9 |
('admin/admin_commands/kadmin_local', 'kadmin', u'Kerberos V5 database administration program', [u'MIT'], 1),
|
|
|
d738b9 |
('admin/admin_commands/kprop', 'kprop', u'propagate a Kerberos V5 principal database to a slave server', [u'MIT'], 8),
|
|
|
d738b9 |
diff --git a/doc/user/user_config/index.rst b/doc/user/user_config/index.rst
|
|
|
d738b9 |
index 6b3d4393b..ad0dc1a72 100644
|
|
|
d738b9 |
--- a/doc/user/user_config/index.rst
|
|
|
d738b9 |
+++ b/doc/user/user_config/index.rst
|
|
|
d738b9 |
@@ -8,5 +8,6 @@ been disabled by your host's configuration):
|
|
|
d738b9 |
.. toctree::
|
|
|
d738b9 |
:maxdepth: 1
|
|
|
d738b9 |
|
|
|
d738b9 |
+ kerberos.rst
|
|
|
d738b9 |
k5login.rst
|
|
|
d738b9 |
k5identity.rst
|
|
|
d738b9 |
diff --git a/doc/user/user_config/kerberos.rst b/doc/user/user_config/kerberos.rst
|
|
|
d738b9 |
new file mode 100644
|
|
|
d738b9 |
index 000000000..6c4453b3b
|
|
|
d738b9 |
--- /dev/null
|
|
|
d738b9 |
+++ b/doc/user/user_config/kerberos.rst
|
|
|
d738b9 |
@@ -0,0 +1,148 @@
|
|
|
d738b9 |
+.. _kerberos(7):
|
|
|
d738b9 |
+
|
|
|
d738b9 |
+kerberos
|
|
|
d738b9 |
+========
|
|
|
d738b9 |
+
|
|
|
d738b9 |
+DESCRIPTION
|
|
|
d738b9 |
+-----------
|
|
|
d738b9 |
+
|
|
|
d738b9 |
+The Kerberos system authenticates individual users in a network
|
|
|
d738b9 |
+environment. After authenticating yourself to Kerberos, you can use
|
|
|
d738b9 |
+Kerberos-enabled programs without having to present passwords.
|
|
|
d738b9 |
+
|
|
|
d738b9 |
+If you enter your username and :ref:`kinit(1)` responds with this
|
|
|
d738b9 |
+message:
|
|
|
d738b9 |
+
|
|
|
d738b9 |
+kinit(v5): Client not found in Kerberos database while getting initial
|
|
|
d738b9 |
+credentials
|
|
|
d738b9 |
+
|
|
|
d738b9 |
+you haven't been registered as a Kerberos user. See your system
|
|
|
d738b9 |
+administrator.
|
|
|
d738b9 |
+
|
|
|
d738b9 |
+A Kerberos name usually contains three parts. The first is the
|
|
|
d738b9 |
+**primary**, which is usually a user's or service's name. The second
|
|
|
d738b9 |
+is the **instance**, which in the case of a user is usually null.
|
|
|
d738b9 |
+Some users may have privileged instances, however, such as ``root`` or
|
|
|
d738b9 |
+``admin``. In the case of a service, the instance is the fully
|
|
|
d738b9 |
+qualified name of the machine on which it runs; i.e. there can be an
|
|
|
d738b9 |
+rlogin service running on the machine ABC, which is different from the
|
|
|
d738b9 |
+rlogin service running on the machine XYZ. The third part of a
|
|
|
d738b9 |
+Kerberos name is the **realm**. The realm corresponds to the Kerberos
|
|
|
d738b9 |
+service providing authentication for the principal.
|
|
|
d738b9 |
+
|
|
|
d738b9 |
+When writing a Kerberos name, the principal name is separated from the
|
|
|
d738b9 |
+instance (if not null) by a slash, and the realm (if not the local
|
|
|
d738b9 |
+realm) follows, preceded by an "@" sign. The following are examples
|
|
|
d738b9 |
+of valid Kerberos names::
|
|
|
d738b9 |
+
|
|
|
d738b9 |
+ david
|
|
|
d738b9 |
+ jennifer/admin
|
|
|
d738b9 |
+ joeuser@BLEEP.COM
|
|
|
d738b9 |
+ cbrown/root@FUBAR.ORG
|
|
|
d738b9 |
+
|
|
|
d738b9 |
+When you authenticate yourself with Kerberos you get an initial
|
|
|
d738b9 |
+Kerberos **ticket**. (A Kerberos ticket is an encrypted protocol
|
|
|
d738b9 |
+message that provides authentication.) Kerberos uses this ticket for
|
|
|
d738b9 |
+network utilities such as rlogin and rcp. The ticket transactions are
|
|
|
d738b9 |
+done transparently, so you don't have to worry about their management.
|
|
|
d738b9 |
+
|
|
|
d738b9 |
+Note, however, that tickets expire. Privileged tickets, such as those
|
|
|
d738b9 |
+with the instance ``root``, expire in a few minutes, while tickets
|
|
|
d738b9 |
+that carry more ordinary privileges may be good for several hours or a
|
|
|
d738b9 |
+day, depending on the installation's policy. If your login session
|
|
|
d738b9 |
+extends beyond the time limit, you will have to re-authenticate
|
|
|
d738b9 |
+yourself to Kerberos to get new tickets. Use the :ref:`kinit(1)`
|
|
|
d738b9 |
+command to re-authenticate yourself.
|
|
|
d738b9 |
+
|
|
|
d738b9 |
+If you use the kinit command to get your tickets, make sure you use
|
|
|
d738b9 |
+the kdestroy command to destroy your tickets before you end your login
|
|
|
d738b9 |
+session. You should put the kdestroy command in your ``.logout`` file
|
|
|
d738b9 |
+so that your tickets will be destroyed automatically when you logout.
|
|
|
d738b9 |
+For more information about the kinit and kdestroy commands, see the
|
|
|
d738b9 |
+:ref:`kinit(1)` and :ref:`kdestroy(1)` manual pages.
|
|
|
d738b9 |
+
|
|
|
d738b9 |
+Kerberos tickets can be forwarded. In order to forward tickets, you
|
|
|
d738b9 |
+must request **forwardable** tickets when you kinit. Once you have
|
|
|
d738b9 |
+forwardable tickets, most Kerberos programs have a command line option
|
|
|
d738b9 |
+to forward them to the remote host.
|
|
|
d738b9 |
+
|
|
|
d738b9 |
+ENVIRONMENT VARIABLES
|
|
|
d738b9 |
+---------------------
|
|
|
d738b9 |
+
|
|
|
d738b9 |
+Several environment variables affect the operation of Kerberos-enabled
|
|
|
d738b9 |
+programs. These inclide:
|
|
|
d738b9 |
+
|
|
|
d738b9 |
+**KRB5CCNAME**
|
|
|
d738b9 |
+ Specifies the location of the credential cache, in the form
|
|
|
d738b9 |
+ *TYPE*:*residual*. If no *type* prefix is present, the **FILE**
|
|
|
d738b9 |
+ type is assumed and *residual* is the pathname of the cache file.
|
|
|
d738b9 |
+ A collection of multiple caches may be used by specifying the
|
|
|
d738b9 |
+ **dir** type and the pathname of a private directory (which must
|
|
|
d738b9 |
+ already exist). The default cache file is /tmp/krb5cc_*uid*,
|
|
|
d738b9 |
+ where *uid* is the decimal user ID of the user.
|
|
|
d738b9 |
+
|
|
|
d738b9 |
+**KRB5_KTNAME**
|
|
|
d738b9 |
+ Specifies the location of the keytab file, in the form
|
|
|
d738b9 |
+ *TYPE*:*residual*. If no *type* is present, the **FILE** type is
|
|
|
d738b9 |
+ assumed and *residual* is the pathname of the keytab file. The
|
|
|
d738b9 |
+ default keytab file is ``/etc/krb5.keytab``.
|
|
|
d738b9 |
+
|
|
|
d738b9 |
+**KRB5_CONFIG**
|
|
|
d738b9 |
+ Specifies the location of the Kerberos configuration file. The
|
|
|
d738b9 |
+ default is ``/etc/krb5.conf``.
|
|
|
d738b9 |
+
|
|
|
d738b9 |
+**KRB5_KDC_PROFILE**
|
|
|
d738b9 |
+ Specifies the location of the KDC configuration file, which
|
|
|
d738b9 |
+ contains additional configuration directives for the Key
|
|
|
d738b9 |
+ Distribution Center daemon and associated programs. The default
|
|
|
d738b9 |
+ is ``/usr/local/var/krb5kdc/kdc.conf``.
|
|
|
d738b9 |
+
|
|
|
d738b9 |
+**KRB5RCACHETYPE**
|
|
|
d738b9 |
+ Specifies the default type of replay cache to use for servers.
|
|
|
d738b9 |
+ Valid types include **dfl** for the normal file type and **none**
|
|
|
d738b9 |
+ for no replay cache.
|
|
|
d738b9 |
+
|
|
|
d738b9 |
+**KRB5RCACHEDIR**
|
|
|
d738b9 |
+ Specifies the default directory for replay caches used by servers.
|
|
|
d738b9 |
+ The default is the value of the **TMPDIR** environment variable,
|
|
|
d738b9 |
+ or ``/var/tmp`` if **TMPDIR** is not set.
|
|
|
d738b9 |
+
|
|
|
d738b9 |
+**KRB5_TRACE**
|
|
|
d738b9 |
+ Specifies a filename to write trace log output to. Trace logs can
|
|
|
d738b9 |
+ help illuminate decisions made internally by the Kerberos
|
|
|
d738b9 |
+ libraries. The default is not to write trace log output anywhere.
|
|
|
d738b9 |
+
|
|
|
d738b9 |
+Most environment variables are disabled for certain programs, such as
|
|
|
d738b9 |
+login system programs and setuid programs, which are designed to be
|
|
|
d738b9 |
+secure when run within an untrusted process environment.
|
|
|
d738b9 |
+
|
|
|
d738b9 |
+SEE ALSO
|
|
|
d738b9 |
+--------
|
|
|
d738b9 |
+
|
|
|
d738b9 |
+:ref:`kdestroy(1)`, :ref:`kinit(1)`, :ref:`klist(1)`,
|
|
|
d738b9 |
+:ref:`kswitch(1)`, :ref:`kpasswd(1)`, :ref:`ksu(1)`,
|
|
|
d738b9 |
+:ref:`krb5.conf(5)`, :ref:`kdc.conf(5)`, :ref:`kadmin(1)`,
|
|
|
d738b9 |
+:ref:`kadmind(8)`, :ref:`kdb5_util(8)`, :ref:`krb5kdc(8)`
|
|
|
d738b9 |
+
|
|
|
d738b9 |
+BUGS
|
|
|
d738b9 |
+----
|
|
|
d738b9 |
+
|
|
|
d738b9 |
+AUTHORS
|
|
|
d738b9 |
+-------
|
|
|
d738b9 |
+
|
|
|
d738b9 |
+| Steve Miller, MIT Project Athena/Digital Equipment Corporation
|
|
|
d738b9 |
+| Clifford Neuman, MIT Project Athena
|
|
|
d738b9 |
+| Greg Hudson, MIT Kerberos Consortium
|
|
|
d738b9 |
+
|
|
|
d738b9 |
+HISTORY
|
|
|
d738b9 |
+-------
|
|
|
d738b9 |
+
|
|
|
d738b9 |
+The MIT Kerberos 5 implementation was developed at MIT, with
|
|
|
d738b9 |
+contributions from many outside parties. It is currently maintained
|
|
|
d738b9 |
+by the MIT Kerberos Consortium.
|
|
|
d738b9 |
+
|
|
|
d738b9 |
+RESTRICTIONS
|
|
|
d738b9 |
+------------
|
|
|
d738b9 |
+
|
|
|
d738b9 |
+Copyright 1985, 1986, 1989-1996, 2002, 2011 Masachusetts Institute of
|
|
|
d738b9 |
+Technology
|
|
|
d738b9 |
diff --git a/src/Makefile.in b/src/Makefile.in
|
|
|
d738b9 |
index e47bddcb1..91032361f 100644
|
|
|
d738b9 |
--- a/src/Makefile.in
|
|
|
d738b9 |
+++ b/src/Makefile.in
|
|
|
d738b9 |
@@ -60,9 +60,9 @@ world:
|
|
|
d738b9 |
INSTALLMKDIRS = $(KRB5ROOT) $(KRB5MANROOT) $(KRB5OTHERMKDIRS) \
|
|
|
d738b9 |
$(ADMIN_BINDIR) $(SERVER_BINDIR) $(CLIENT_BINDIR) \
|
|
|
d738b9 |
$(ADMIN_MANDIR) $(SERVER_MANDIR) $(CLIENT_MANDIR) \
|
|
|
d738b9 |
- $(FILE_MANDIR) \
|
|
|
d738b9 |
+ $(FILE_MANDIR) $(OVERVIEW_MANDIR) \
|
|
|
d738b9 |
$(ADMIN_CATDIR) $(SERVER_CATDIR) $(CLIENT_CATDIR) \
|
|
|
d738b9 |
- $(FILE_CATDIR) \
|
|
|
d738b9 |
+ $(FILE_CATDIR) $(OVERVIEW_CATDIR) \
|
|
|
d738b9 |
$(KRB5_LIBDIR) $(KRB5_INCDIR) \
|
|
|
d738b9 |
$(KRB5_DB_MODULE_DIR) $(KRB5_PA_MODULE_DIR) \
|
|
|
d738b9 |
$(KRB5_AD_MODULE_DIR) \
|
|
|
d738b9 |
diff --git a/src/config/pre.in b/src/config/pre.in
|
|
|
d738b9 |
index f23c07d9d..a851c56c7 100644
|
|
|
d738b9 |
--- a/src/config/pre.in
|
|
|
d738b9 |
+++ b/src/config/pre.in
|
|
|
d738b9 |
@@ -210,6 +210,8 @@ ADMIN_CATDIR = $(KRB5MANROOT)/cat8
|
|
|
d738b9 |
SERVER_CATDIR = $(KRB5MANROOT)/cat8
|
|
|
d738b9 |
CLIENT_CATDIR = $(KRB5MANROOT)/cat1
|
|
|
d738b9 |
FILE_CATDIR = $(KRB5MANROOT)/cat5
|
|
|
d738b9 |
+OVERVIEW_MANDIR = $(KRB5MANROOT)/man7
|
|
|
d738b9 |
+OVERVIEW_CATDIR = $(KRB5MANROOT)/cat7
|
|
|
d738b9 |
KRB5_LIBDIR = @libdir@
|
|
|
d738b9 |
KRB5_INCDIR = @includedir@
|
|
|
d738b9 |
MODULE_DIR = @libdir@/krb5/plugins
|
|
|
d738b9 |
diff --git a/src/man/Makefile.in b/src/man/Makefile.in
|
|
|
d738b9 |
index 4bc670bad..e3722b1cd 100644
|
|
|
d738b9 |
--- a/src/man/Makefile.in
|
|
|
d738b9 |
+++ b/src/man/Makefile.in
|
|
|
d738b9 |
@@ -15,7 +15,7 @@ MANSUBS=k5identity.sub k5login.sub k5srvutil.sub kadm5.acl.sub kadmin.sub \
|
|
|
d738b9 |
kadmind.sub kdb5_ldap_util.sub kdb5_util.sub kdc.conf.sub \
|
|
|
d738b9 |
kdestroy.sub kinit.sub klist.sub kpasswd.sub kprop.sub kpropd.sub \
|
|
|
d738b9 |
kproplog.sub krb5.conf.sub krb5-config.sub krb5kdc.sub ksu.sub \
|
|
|
d738b9 |
- kswitch.sub ktutil.sub kvno.sub sclient.sub sserver.sub
|
|
|
d738b9 |
+ kswitch.sub ktutil.sub kvno.sub sclient.sub sserver.sub kerberos.sub
|
|
|
d738b9 |
|
|
|
d738b9 |
docsrc=$(top_srcdir)/../doc
|
|
|
d738b9 |
|
|
|
d738b9 |
@@ -56,9 +56,11 @@ all: $(MANSUBS)
|
|
|
d738b9 |
clean:
|
|
|
d738b9 |
rm -rf $(MANSUBS) rst_man
|
|
|
d738b9 |
|
|
|
d738b9 |
-install: install-clientman install-fileman install-adminman install-serverman
|
|
|
d738b9 |
+install: install-clientman install-fileman install-adminman \
|
|
|
d738b9 |
+ install-overviewman install-serverman
|
|
|
d738b9 |
|
|
|
d738b9 |
-install-catman: install-clientcat install-filecat install-admincat install-servercat
|
|
|
d738b9 |
+install-catman: install-clientcat install-filecat install-admincat \
|
|
|
d738b9 |
+ install-overviewcat install-servercat
|
|
|
d738b9 |
|
|
|
d738b9 |
install-clientman:
|
|
|
d738b9 |
$(INSTALL_DATA) k5srvutil.sub $(DESTDIR)$(CLIENT_MANDIR)/k5srvutil.1
|
|
|
d738b9 |
@@ -85,6 +87,9 @@ install-fileman:
|
|
|
d738b9 |
$(INSTALL_DATA) kdc.conf.sub $(DESTDIR)$(FILE_MANDIR)/kdc.conf.5
|
|
|
d738b9 |
$(INSTALL_DATA) krb5.conf.sub $(DESTDIR)$(FILE_MANDIR)/krb5.conf.5
|
|
|
d738b9 |
|
|
|
d738b9 |
+install-overviewman:
|
|
|
d738b9 |
+ $(INSTALL_DATA) kerberos.sub $(DESTDIR)$(OVERVIEW_MANDIR)/kerberos.7
|
|
|
d738b9 |
+
|
|
|
d738b9 |
install-adminman:
|
|
|
d738b9 |
$(INSTALL_DATA) $(srcdir)/kadmin.local.8 \
|
|
|
d738b9 |
$(DESTDIR)$(ADMIN_MANDIR)/kadmin.local.8
|
|
|
d738b9 |
@@ -127,6 +132,9 @@ install-filecat:
|
|
|
d738b9 |
$(GROFF_MAN) kdc.conf.sub > $(DESTDIR)$(FILE_CATDIR)/kdc.conf.5
|
|
|
d738b9 |
$(GROFF_MAN) krb5.conf.sub > $(DESTDIR)$(FILE_CATDIR)/krb5.conf.5
|
|
|
d738b9 |
|
|
|
d738b9 |
+install-overviewcat:
|
|
|
d738b9 |
+ $(GROFF_MAN) kerberos.sub > $(DESTDIR)$(OVERVIEW_CATDIR)/kerberos.7
|
|
|
d738b9 |
+
|
|
|
d738b9 |
install-admincat:
|
|
|
d738b9 |
($(RM) $(DESTDIR)$(ADMIN_CATDIR)/kadmin.local.8; \
|
|
|
d738b9 |
$(LN_S) $(CLIENT_CATDIR)/kadmin.1 \
|
|
|
d738b9 |
diff --git a/src/man/kerberos.man b/src/man/kerberos.man
|
|
|
d738b9 |
new file mode 100644
|
|
|
d738b9 |
index 000000000..7b2b5d932
|
|
|
d738b9 |
--- /dev/null
|
|
|
d738b9 |
+++ b/src/man/kerberos.man
|
|
|
d738b9 |
@@ -0,0 +1,180 @@
|
|
|
d738b9 |
+.\" Man page generated from reStructuredText.
|
|
|
d738b9 |
+.
|
|
|
d738b9 |
+.TH "KERBEROS" "7" " " "1.17" "MIT Kerberos"
|
|
|
d738b9 |
+.SH NAME
|
|
|
d738b9 |
+kerberos \- Overview of using Kerberos
|
|
|
d738b9 |
+.
|
|
|
d738b9 |
+.nr rst2man-indent-level 0
|
|
|
d738b9 |
+.
|
|
|
d738b9 |
+.de1 rstReportMargin
|
|
|
d738b9 |
+\\$1 \\n[an-margin]
|
|
|
d738b9 |
+level \\n[rst2man-indent-level]
|
|
|
d738b9 |
+level margin: \\n[rst2man-indent\\n[rst2man-indent-level]]
|
|
|
d738b9 |
+-
|
|
|
d738b9 |
+\\n[rst2man-indent0]
|
|
|
d738b9 |
+\\n[rst2man-indent1]
|
|
|
d738b9 |
+\\n[rst2man-indent2]
|
|
|
d738b9 |
+..
|
|
|
d738b9 |
+.de1 INDENT
|
|
|
d738b9 |
+.\" .rstReportMargin pre:
|
|
|
d738b9 |
+. RS \\$1
|
|
|
d738b9 |
+. nr rst2man-indent\\n[rst2man-indent-level] \\n[an-margin]
|
|
|
d738b9 |
+. nr rst2man-indent-level +1
|
|
|
d738b9 |
+.\" .rstReportMargin post:
|
|
|
d738b9 |
+..
|
|
|
d738b9 |
+.de UNINDENT
|
|
|
d738b9 |
+. RE
|
|
|
d738b9 |
+.\" indent \\n[an-margin]
|
|
|
d738b9 |
+.\" old: \\n[rst2man-indent\\n[rst2man-indent-level]]
|
|
|
d738b9 |
+.nr rst2man-indent-level -1
|
|
|
d738b9 |
+.\" new: \\n[rst2man-indent\\n[rst2man-indent-level]]
|
|
|
d738b9 |
+.in \\n[rst2man-indent\\n[rst2man-indent-level]]u
|
|
|
d738b9 |
+..
|
|
|
d738b9 |
+.SH DESCRIPTION
|
|
|
d738b9 |
+.sp
|
|
|
d738b9 |
+The Kerberos system authenticates individual users in a network
|
|
|
d738b9 |
+environment. After authenticating yourself to Kerberos, you can use
|
|
|
d738b9 |
+Kerberos\-enabled programs without having to present passwords.
|
|
|
d738b9 |
+.sp
|
|
|
d738b9 |
+If you enter your username and kinit(1) responds with this
|
|
|
d738b9 |
+message:
|
|
|
d738b9 |
+.sp
|
|
|
d738b9 |
+kinit(v5): Client not found in Kerberos database while getting initial
|
|
|
d738b9 |
+credentials
|
|
|
d738b9 |
+.sp
|
|
|
d738b9 |
+you haven\(aqt been registered as a Kerberos user. See your system
|
|
|
d738b9 |
+administrator.
|
|
|
d738b9 |
+.sp
|
|
|
d738b9 |
+A Kerberos name usually contains three parts. The first is the
|
|
|
d738b9 |
+\fBprimary\fP, which is usually a user\(aqs or service\(aqs name. The second
|
|
|
d738b9 |
+is the \fBinstance\fP, which in the case of a user is usually null.
|
|
|
d738b9 |
+Some users may have privileged instances, however, such as \fBroot\fP or
|
|
|
d738b9 |
+\fBadmin\fP\&. In the case of a service, the instance is the fully
|
|
|
d738b9 |
+qualified name of the machine on which it runs; i.e. there can be an
|
|
|
d738b9 |
+rlogin service running on the machine ABC, which is different from the
|
|
|
d738b9 |
+rlogin service running on the machine XYZ. The third part of a
|
|
|
d738b9 |
+Kerberos name is the \fBrealm\fP\&. The realm corresponds to the Kerberos
|
|
|
d738b9 |
+service providing authentication for the principal.
|
|
|
d738b9 |
+.sp
|
|
|
d738b9 |
+When writing a Kerberos name, the principal name is separated from the
|
|
|
d738b9 |
+instance (if not null) by a slash, and the realm (if not the local
|
|
|
d738b9 |
+realm) follows, preceded by an "@" sign. The following are examples
|
|
|
d738b9 |
+of valid Kerberos names:
|
|
|
d738b9 |
+.INDENT 0.0
|
|
|
d738b9 |
+.INDENT 3.5
|
|
|
d738b9 |
+.sp
|
|
|
d738b9 |
+.nf
|
|
|
d738b9 |
+.ft C
|
|
|
d738b9 |
+david
|
|
|
d738b9 |
+jennifer/admin
|
|
|
d738b9 |
+joeuser@BLEEP.COM
|
|
|
d738b9 |
+cbrown/root@FUBAR.ORG
|
|
|
d738b9 |
+.ft P
|
|
|
d738b9 |
+.fi
|
|
|
d738b9 |
+.UNINDENT
|
|
|
d738b9 |
+.UNINDENT
|
|
|
d738b9 |
+.sp
|
|
|
d738b9 |
+When you authenticate yourself with Kerberos you get an initial
|
|
|
d738b9 |
+Kerberos \fBticket\fP\&. (A Kerberos ticket is an encrypted protocol
|
|
|
d738b9 |
+message that provides authentication.) Kerberos uses this ticket for
|
|
|
d738b9 |
+network utilities such as rlogin and rcp. The ticket transactions are
|
|
|
d738b9 |
+done transparently, so you don\(aqt have to worry about their management.
|
|
|
d738b9 |
+.sp
|
|
|
d738b9 |
+Note, however, that tickets expire. Privileged tickets, such as those
|
|
|
d738b9 |
+with the instance \fBroot\fP, expire in a few minutes, while tickets
|
|
|
d738b9 |
+that carry more ordinary privileges may be good for several hours or a
|
|
|
d738b9 |
+day, depending on the installation\(aqs policy. If your login session
|
|
|
d738b9 |
+extends beyond the time limit, you will have to re\-authenticate
|
|
|
d738b9 |
+yourself to Kerberos to get new tickets. Use the kinit(1)
|
|
|
d738b9 |
+command to re\-authenticate yourself.
|
|
|
d738b9 |
+.sp
|
|
|
d738b9 |
+If you use the kinit command to get your tickets, make sure you use
|
|
|
d738b9 |
+the kdestroy command to destroy your tickets before you end your login
|
|
|
d738b9 |
+session. You should put the kdestroy command in your \fB\&.logout\fP file
|
|
|
d738b9 |
+so that your tickets will be destroyed automatically when you logout.
|
|
|
d738b9 |
+For more information about the kinit and kdestroy commands, see the
|
|
|
d738b9 |
+kinit(1) and kdestroy(1) manual pages.
|
|
|
d738b9 |
+.sp
|
|
|
d738b9 |
+Kerberos tickets can be forwarded. In order to forward tickets, you
|
|
|
d738b9 |
+must request \fBforwardable\fP tickets when you kinit. Once you have
|
|
|
d738b9 |
+forwardable tickets, most Kerberos programs have a command line option
|
|
|
d738b9 |
+to forward them to the remote host.
|
|
|
d738b9 |
+.SH ENVIRONMENT VARIABLES
|
|
|
d738b9 |
+.sp
|
|
|
d738b9 |
+Several environment variables affect the operation of Kerberos\-enabled
|
|
|
d738b9 |
+programs. These inclide:
|
|
|
d738b9 |
+.INDENT 0.0
|
|
|
d738b9 |
+.TP
|
|
|
d738b9 |
+\fBKRB5CCNAME\fP
|
|
|
d738b9 |
+Specifies the location of the credential cache, in the form
|
|
|
d738b9 |
+\fITYPE\fP:\fIresidual\fP\&. If no \fItype\fP prefix is present, the \fBFILE\fP
|
|
|
d738b9 |
+type is assumed and \fIresidual\fP is the pathname of the cache file.
|
|
|
d738b9 |
+A collection of multiple caches may be used by specifying the
|
|
|
d738b9 |
+\fBdir\fP type and the pathname of a private directory (which must
|
|
|
d738b9 |
+already exist). The default cache file is /tmp/krb5cc_*uid*,
|
|
|
d738b9 |
+where \fIuid\fP is the decimal user ID of the user.
|
|
|
d738b9 |
+.TP
|
|
|
d738b9 |
+\fBKRB5_KTNAME\fP
|
|
|
d738b9 |
+Specifies the location of the keytab file, in the form
|
|
|
d738b9 |
+\fITYPE\fP:\fIresidual\fP\&. If no \fItype\fP is present, the \fBFILE\fP type is
|
|
|
d738b9 |
+assumed and \fIresidual\fP is the pathname of the keytab file. The
|
|
|
d738b9 |
+default keytab file is \fB/etc/krb5.keytab\fP\&.
|
|
|
d738b9 |
+.TP
|
|
|
d738b9 |
+\fBKRB5_CONFIG\fP
|
|
|
d738b9 |
+Specifies the location of the Kerberos configuration file. The
|
|
|
d738b9 |
+default is \fB/etc/krb5.conf\fP\&.
|
|
|
d738b9 |
+.TP
|
|
|
d738b9 |
+\fBKRB5_KDC_PROFILE\fP
|
|
|
d738b9 |
+Specifies the location of the KDC configuration file, which
|
|
|
d738b9 |
+contains additional configuration directives for the Key
|
|
|
d738b9 |
+Distribution Center daemon and associated programs. The default
|
|
|
d738b9 |
+is \fB/usr/local/var/krb5kdc/kdc.conf\fP\&.
|
|
|
d738b9 |
+.TP
|
|
|
d738b9 |
+\fBKRB5RCACHETYPE\fP
|
|
|
d738b9 |
+Specifies the default type of replay cache to use for servers.
|
|
|
d738b9 |
+Valid types include \fBdfl\fP for the normal file type and \fBnone\fP
|
|
|
d738b9 |
+for no replay cache.
|
|
|
d738b9 |
+.TP
|
|
|
d738b9 |
+\fBKRB5RCACHEDIR\fP
|
|
|
d738b9 |
+Specifies the default directory for replay caches used by servers.
|
|
|
d738b9 |
+The default is the value of the \fBTMPDIR\fP environment variable,
|
|
|
d738b9 |
+or \fB/var/tmp\fP if \fBTMPDIR\fP is not set.
|
|
|
d738b9 |
+.TP
|
|
|
d738b9 |
+\fBKRB5_TRACE\fP
|
|
|
d738b9 |
+Specifies a filename to write trace log output to. Trace logs can
|
|
|
d738b9 |
+help illuminate decisions made internally by the Kerberos
|
|
|
d738b9 |
+libraries. The default is not to write trace log output anywhere.
|
|
|
d738b9 |
+.UNINDENT
|
|
|
d738b9 |
+.sp
|
|
|
d738b9 |
+Most environment variables are disabled for certain programs, such as
|
|
|
d738b9 |
+login system programs and setuid programs, which are designed to be
|
|
|
d738b9 |
+secure when run within an untrusted process environment.
|
|
|
d738b9 |
+.SH SEE ALSO
|
|
|
d738b9 |
+.sp
|
|
|
d738b9 |
+kdestroy(1), kinit(1), klist(1),
|
|
|
d738b9 |
+kswitch(1), kpasswd(1), ksu(1),
|
|
|
d738b9 |
+krb5.conf(5), kdc.conf(5), kadmin(1),
|
|
|
d738b9 |
+kadmind(8), kdb5_util(8), krb5kdc(8)
|
|
|
d738b9 |
+.SH BUGS
|
|
|
d738b9 |
+.SH AUTHORS
|
|
|
d738b9 |
+.nf
|
|
|
d738b9 |
+Steve Miller, MIT Project Athena/Digital Equipment Corporation
|
|
|
d738b9 |
+Clifford Neuman, MIT Project Athena
|
|
|
d738b9 |
+Greg Hudson, MIT Kerberos Consortium
|
|
|
d738b9 |
+.fi
|
|
|
d738b9 |
+.sp
|
|
|
d738b9 |
+.SH HISTORY
|
|
|
d738b9 |
+.sp
|
|
|
d738b9 |
+The MIT Kerberos 5 implementation was developed at MIT, with
|
|
|
d738b9 |
+contributions from many outside parties. It is currently maintained
|
|
|
d738b9 |
+by the MIT Kerberos Consortium.
|
|
|
d738b9 |
+.SH RESTRICTIONS
|
|
|
d738b9 |
+.sp
|
|
|
d738b9 |
+Copyright 1985, 1986, 1989\-1996, 2002, 2011 Masachusetts Institute of
|
|
|
d738b9 |
+Technology
|
|
|
d738b9 |
+.SH AUTHOR
|
|
|
d738b9 |
+MIT
|
|
|
d738b9 |
+.SH COPYRIGHT
|
|
|
d738b9 |
+1985-2018, MIT
|
|
|
d738b9 |
+.\" Generated by docutils manpage writer.
|
|
|
d738b9 |
+.
|