1 KADMIN(8) NetBSD System Manager's Manual KADMIN(8)
4 k
\bka
\bad
\bdm
\bmi
\bin
\bn - Kerberos administration utility
6 S
\bSY
\bYN
\bNO
\bOP
\bPS
\bSI
\bIS
\bS
7 k
\bka
\bad
\bdm
\bmi
\bin
\bn [-
\b-p
\bp _
\bs_
\bt_
\br_
\bi_
\bn_
\bg | -
\b--
\b-p
\bpr
\bri
\bin
\bnc
\bci
\bip
\bpa
\bal
\bl=
\b=_
\bs_
\bt_
\br_
\bi_
\bn_
\bg] [-
\b-K
\bK _
\bs_
\bt_
\br_
\bi_
\bn_
\bg | -
\b--
\b-k
\bke
\bey
\byt
\bta
\bab
\bb=
\b=_
\bs_
\bt_
\br_
\bi_
\bn_
\bg] [-
\b-c
\bc
8 _
\bf_
\bi_
\bl_
\be | -
\b--
\b-c
\bco
\bon
\bnf
\bfi
\big
\bg-
\b-f
\bfi
\bil
\ble
\be=
\b=_
\bf_
\bi_
\bl_
\be] [-
\b-k
\bk _
\bf_
\bi_
\bl_
\be | -
\b--
\b-k
\bke
\bey
\by-
\b-f
\bfi
\bil
\ble
\be=
\b=_
\bf_
\bi_
\bl_
\be] [-
\b-r
\br _
\br_
\be_
\ba_
\bl_
\bm |
9 -
\b--
\b-r
\bre
\bea
\bal
\blm
\bm=
\b=_
\br_
\be_
\ba_
\bl_
\bm] [-
\b-a
\ba _
\bh_
\bo_
\bs_
\bt | -
\b--
\b-a
\bad
\bdm
\bmi
\bin
\bn-
\b-s
\bse
\ber
\brv
\bve
\ber
\br=
\b=_
\bh_
\bo_
\bs_
\bt] [-
\b-s
\bs _
\bp_
\bo_
\br_
\bt _
\bn_
\bu_
\bm_
\bb_
\be_
\br |
10 -
\b--
\b-s
\bse
\ber
\brv
\bve
\ber
\br-
\b-p
\bpo
\bor
\brt
\bt=
\b=_
\bp_
\bo_
\br_
\bt _
\bn_
\bu_
\bm_
\bb_
\be_
\br] [-
\b-l
\bl | -
\b--
\b-l
\blo
\boc
\bca
\bal
\bl] [-
\b-h
\bh | -
\b--
\b-h
\bhe
\bel
\blp
\bp] [-
\b-v
\bv | -
\b--
\b-v
\bve
\ber
\brs
\bsi
\bio
\bon
\bn]
11 [_
\bc_
\bo_
\bm_
\bm_
\ba_
\bn_
\bd]
13 D
\bDE
\bES
\bSC
\bCR
\bRI
\bIP
\bPT
\bTI
\bIO
\bON
\bN
14 The k
\bka
\bad
\bdm
\bmi
\bin
\bn program is used to make modification to the Kerberos database,
15 either remotely via the kadmind(8) daemon, or locally (with the -
\b-l
\bl op-
20 -
\b-p
\bp _
\bs_
\bt_
\br_
\bi_
\bn_
\bg, -
\b--
\b-p
\bpr
\bri
\bin
\bnc
\bci
\bip
\bpa
\bal
\bl=
\b=_
\bs_
\bt_
\br_
\bi_
\bn_
\bg
21 principal to authenticate as
23 -
\b-K
\bK _
\bs_
\bt_
\br_
\bi_
\bn_
\bg, -
\b--
\b-k
\bke
\bey
\byt
\bta
\bab
\bb=
\b=_
\bs_
\bt_
\br_
\bi_
\bn_
\bg
24 keytab for authentication pricipal
26 -
\b-c
\bc _
\bf_
\bi_
\bl_
\be, -
\b--
\b-c
\bco
\bon
\bnf
\bfi
\big
\bg-
\b-f
\bfi
\bil
\ble
\be=
\b=_
\bf_
\bi_
\bl_
\be
27 location of config file
29 -
\b-k
\bk _
\bf_
\bi_
\bl_
\be, -
\b--
\b-k
\bke
\bey
\by-
\b-f
\bfi
\bil
\ble
\be=
\b=_
\bf_
\bi_
\bl_
\be
30 location of master key file
32 -
\b-r
\br _
\br_
\be_
\ba_
\bl_
\bm, -
\b--
\b-r
\bre
\bea
\bal
\blm
\bm=
\b=_
\br_
\be_
\ba_
\bl_
\bm
35 -
\b-a
\ba _
\bh_
\bo_
\bs_
\bt, -
\b--
\b-a
\bad
\bdm
\bmi
\bin
\bn-
\b-s
\bse
\ber
\brv
\bve
\ber
\br=
\b=_
\bh_
\bo_
\bs_
\bt
38 -
\b-s
\bs _
\bp_
\bo_
\br_
\bt _
\bn_
\bu_
\bm_
\bb_
\be_
\br, -
\b--
\b-s
\bse
\ber
\brv
\bve
\ber
\br-
\b-p
\bpo
\bor
\brt
\bt=
\b=_
\bp_
\bo_
\br_
\bt _
\bn_
\bu_
\bm_
\bb_
\be_
\br
41 -
\b-l
\bl, -
\b--
\b-l
\blo
\boc
\bca
\bal
\bl
44 If no _
\bc_
\bo_
\bm_
\bm_
\ba_
\bn_
\bd is given on the command line, k
\bka
\bad
\bdm
\bmi
\bin
\bn will prompt for com-
45 mands to process. Commands include:
47 a
\bad
\bdd
\bd [-
\b-r
\br | -
\b--
\b-r
\bra
\ban
\bnd
\bdo
\bom
\bm-
\b-k
\bke
\bey
\by] [-
\b--
\b-r
\bra
\ban
\bnd
\bdo
\bom
\bm-
\b-p
\bpa
\bas
\bss
\bsw
\bwo
\bor
\brd
\bd] [-
\b-p
\bp _
\bs_
\bt_
\br_
\bi_
\bn_
\bg |
48 -
\b--
\b-p
\bpa
\bas
\bss
\bsw
\bwo
\bor
\brd
\bd=
\b=_
\bs_
\bt_
\br_
\bi_
\bn_
\bg] [-
\b--
\b-k
\bke
\bey
\by=
\b=_
\bs_
\bt_
\br_
\bi_
\bn_
\bg] [-
\b--
\b-m
\bma
\bax
\bx-
\b-t
\bti
\bic
\bck
\bke
\bet
\bt-
\b-l
\bli
\bif
\bfe
\be=
\b=_
\bl_
\bi_
\bf_
\be_
\bt_
\bi_
\bm_
\be]
49 [-
\b--
\b-m
\bma
\bax
\bx-
\b-r
\bre
\ben
\bne
\bew
\bwa
\bab
\bbl
\ble
\be-
\b-l
\bli
\bif
\bfe
\be=
\b=_
\bl_
\bi_
\bf_
\be_
\bt_
\bi_
\bm_
\be] [-
\b--
\b-a
\bat
\btt
\btr
\bri
\bib
\bbu
\but
\bte
\bes
\bs=
\b=_
\ba_
\bt_
\bt_
\br_
\bi_
\bb_
\bu_
\bt_
\be_
\bs]
50 [-
\b--
\b-e
\bex
\bxp
\bpi
\bir
\bra
\bat
\bti
\bio
\bon
\bn-
\b-t
\bti
\bim
\bme
\be=
\b=_
\bt_
\bi_
\bm_
\be] [-
\b--
\b-p
\bpw
\bw-
\b-e
\bex
\bxp
\bpi
\bir
\bra
\bat
\bti
\bio
\bon
\bn-
\b-t
\bti
\bim
\bme
\be=
\b=_
\bt_
\bi_
\bm_
\be] _
\bp_
\br_
\bi_
\bn_
\bc_
\bi_
\bp_
\ba_
\bl_
\b._
\b._
\b.
52 creates a new principal
54 p
\bpa
\bas
\bss
\bsw
\bwd
\bd [-
\b-r
\br | -
\b--
\b-r
\bra
\ban
\bnd
\bdo
\bom
\bm-
\b-k
\bke
\bey
\by] [-
\b--
\b-r
\bra
\ban
\bnd
\bdo
\bom
\bm-
\b-p
\bpa
\bas
\bss
\bsw
\bwo
\bor
\brd
\bd] [-
\b-p
\bp _
\bs_
\bt_
\br_
\bi_
\bn_
\bg |
55 -
\b--
\b-p
\bpa
\bas
\bss
\bsw
\bwo
\bor
\brd
\bd=
\b=_
\bs_
\bt_
\br_
\bi_
\bn_
\bg] [-
\b--
\b-k
\bke
\bey
\by=
\b=_
\bs_
\bt_
\br_
\bi_
\bn_
\bg] _
\bp_
\br_
\bi_
\bn_
\bc_
\bi_
\bp_
\ba_
\bl_
\b._
\b._
\b.
57 changes the password of an existing principal
59 d
\bde
\bel
\ble
\bet
\bte
\be _
\bp_
\br_
\bi_
\bn_
\bc_
\bi_
\bp_
\ba_
\bl_
\b._
\b._
\b.
63 d
\bde
\bel
\bl_
\b_e
\ben
\bnc
\bct
\bty
\byp
\bpe
\be _
\bp_
\br_
\bi_
\bn_
\bc_
\bi_
\bp_
\ba_
\bl _
\be_
\bn_
\bc_
\bt_
\by_
\bp_
\be_
\bs_
\b._
\b._
\b.
65 removes some enctypes from a principal, this can be useful
66 the service belonging to the principal is known to not handle
69 e
\bex
\bxt
\bt_
\b_k
\bke
\bey
\byt
\bta
\bab
\bb [-
\b-k
\bk _
\bs_
\bt_
\br_
\bi_
\bn_
\bg | -
\b--
\b-k
\bke
\bey
\byt
\bta
\bab
\bb=
\b=_
\bs_
\bt_
\br_
\bi_
\bn_
\bg] _
\bp_
\br_
\bi_
\bn_
\bc_
\bi_
\bp_
\ba_
\bl_
\b._
\b._
\b.
71 creates a keytab with the keys of the specified principals
73 g
\bge
\bet
\bt [-
\b-l
\bl | -
\b--
\b-l
\blo
\bon
\bng
\bg] [-
\b-s
\bs | -
\b--
\b-s
\bsh
\bho
\bor
\brt
\bt] [-
\b-t
\bt | -
\b--
\b-t
\bte
\ber
\brs
\bse
\be] _
\be_
\bx_
\bp_
\br_
\be_
\bs_
\bs_
\bi_
\bo_
\bn_
\b._
\b._
\b.
75 lists the principals that match the expressions (which are
76 shell glob like), long format gives more information, and
77 terse just prints the names
79 r
\bre
\ben
\bna
\bam
\bme
\be _
\bf_
\br_
\bo_
\bm _
\bt_
\bo
83 m
\bmo
\bod
\bdi
\bif
\bfy
\by [-
\b-a
\ba _
\ba_
\bt_
\bt_
\br_
\bi_
\bb_
\bu_
\bt_
\be_
\bs | -
\b--
\b-a
\bat
\btt
\btr
\bri
\bib
\bbu
\but
\bte
\bes
\bs=
\b=_
\ba_
\bt_
\bt_
\br_
\bi_
\bb_
\bu_
\bt_
\be_
\bs]
84 [-
\b--
\b-m
\bma
\bax
\bx-
\b-t
\bti
\bic
\bck
\bke
\bet
\bt-
\b-l
\bli
\bif
\bfe
\be=
\b=_
\bl_
\bi_
\bf_
\be_
\bt_
\bi_
\bm_
\be] [-
\b--
\b-m
\bma
\bax
\bx-
\b-r
\bre
\ben
\bne
\bew
\bwa
\bab
\bbl
\ble
\be-
\b-l
\bli
\bif
\bfe
\be=
\b=_
\bl_
\bi_
\bf_
\be_
\bt_
\bi_
\bm_
\be]
85 [-
\b--
\b-e
\bex
\bxp
\bpi
\bir
\bra
\bat
\bti
\bio
\bon
\bn-
\b-t
\bti
\bim
\bme
\be=
\b=_
\bt_
\bi_
\bm_
\be] [-
\b--
\b-p
\bpw
\bw-
\b-e
\bex
\bxp
\bpi
\bir
\bra
\bat
\bti
\bio
\bon
\bn-
\b-t
\bti
\bim
\bme
\be=
\b=_
\bt_
\bi_
\bm_
\be]
86 [-
\b--
\b-k
\bkv
\bvn
\bno
\bo=
\b=_
\bn_
\bu_
\bm_
\bb_
\be_
\br] _
\bp_
\br_
\bi_
\bn_
\bc_
\bi_
\bp_
\ba_
\bl
88 modifies certain attributes of a principal
90 p
\bpr
\bri
\biv
\bvi
\bil
\ble
\beg
\bge
\bes
\bs
92 lists the operations you are allowd to perform
94 When running in local mode, the following commands can also be used.
96 d
\bdu
\bum
\bmp
\bp [-
\b-d
\bd | -
\b--
\b-d
\bde
\bec
\bcr
\bry
\byp
\bpt
\bt] [_
\bd_
\bu_
\bm_
\bp_
\b-_
\bf_
\bi_
\bl_
\be]
98 writes the database in ``human readable'' form to the speci-
99 fied file, or standard out
101 i
\bin
\bni
\bit
\bt [-
\b--
\b-r
\bre
\bea
\bal
\blm
\bm-
\b-m
\bma
\bax
\bx-
\b-t
\bti
\bic
\bck
\bke
\bet
\bt-
\b-l
\bli
\bif
\bfe
\be=
\b=_
\bs_
\bt_
\br_
\bi_
\bn_
\bg]
102 [-
\b--
\b-r
\bre
\bea
\bal
\blm
\bm-
\b-m
\bma
\bax
\bx-
\b-r
\bre
\ben
\bne
\bew
\bwa
\bab
\bbl
\ble
\be-
\b-l
\bli
\bif
\bfe
\be=
\b=_
\bs_
\bt_
\br_
\bi_
\bn_
\bg] _
\br_
\be_
\ba_
\bl_
\bm
104 initialises the Kerberos database with entries for a new
105 realm, it's possible to have more than one realm served by
108 l
\blo
\boa
\bad
\bd _
\bf_
\bi_
\bl_
\be
110 reads a previously dumped database, and re-creates that
111 database from scratch
113 m
\bme
\ber
\brg
\bge
\be _
\bf_
\bi_
\bl_
\be
115 similar to l
\bli
\bis
\bst
\bt but just modifies the database with the en-
116 tries in the dump file
118 S
\bSE
\bEE
\bE A
\bAL
\bLS
\bSO
\bO
121 HEIMDAL September 10, 2000 2