2 KADMIN(8) UNIX System Manager's Manual KADMIN(8)
5 k
\bka
\bad
\bdm
\bmi
\bin
\bn - Kerberos administration utility
7 S
\bSY
\bYN
\bNO
\bOP
\bPS
\bSI
\bIS
\bS
8 k
\bka
\bad
\bdm
\bmi
\bin
\bn [-
\b-p
\bp _
\bs_
\bt_
\br_
\bi_
\bn_
\bg | -
\b--
\b-p
\bpr
\bri
\bin
\bnc
\bci
\bip
\bpa
\bal
\bl=
\b=_
\bs_
\bt_
\br_
\bi_
\bn_
\bg] [-
\b-K
\bK _
\bs_
\bt_
\br_
\bi_
\bn_
\bg | -
\b--
\b-k
\bke
\bey
\byt
\bta
\bab
\bb=
\b=_
\bs_
\bt_
\br_
\bi_
\bn_
\bg] [-
\b-c
\bc
9 _
\bf_
\bi_
\bl_
\be | -
\b--
\b-c
\bco
\bon
\bnf
\bfi
\big
\bg-
\b-f
\bfi
\bil
\ble
\be=
\b=_
\bf_
\bi_
\bl_
\be] [-
\b-k
\bk _
\bf_
\bi_
\bl_
\be | -
\b--
\b-k
\bke
\bey
\by-
\b-f
\bfi
\bil
\ble
\be=
\b=_
\bf_
\bi_
\bl_
\be] [-
\b-r
\br _
\br_
\be_
\ba_
\bl_
\bm |
10 -
\b--
\b-r
\bre
\bea
\bal
\blm
\bm=
\b=_
\br_
\be_
\ba_
\bl_
\bm] [-
\b-a
\ba _
\bh_
\bo_
\bs_
\bt | -
\b--
\b-a
\bad
\bdm
\bmi
\bin
\bn-
\b-s
\bse
\ber
\brv
\bve
\ber
\br=
\b=_
\bh_
\bo_
\bs_
\bt] [-
\b-s
\bs _
\bp_
\bo_
\br_
\bt _
\bn_
\bu_
\bm_
\bb_
\be_
\br |
11 -
\b--
\b-s
\bse
\ber
\brv
\bve
\ber
\br-
\b-p
\bpo
\bor
\brt
\bt=
\b=_
\bp_
\bo_
\br_
\bt _
\bn_
\bu_
\bm_
\bb_
\be_
\br] [-
\b-l
\bl | -
\b--
\b-l
\blo
\boc
\bca
\bal
\bl] [-
\b-h
\bh | -
\b--
\b-h
\bhe
\bel
\blp
\bp] [-
\b-v
\bv | -
\b--
\b-v
\bve
\ber
\brs
\bsi
\bio
\bon
\bn]
12 [_
\bc_
\bo_
\bm_
\bm_
\ba_
\bn_
\bd]
14 D
\bDE
\bES
\bSC
\bCR
\bRI
\bIP
\bPT
\bTI
\bIO
\bON
\bN
15 The k
\bka
\bad
\bdm
\bmi
\bin
\bn program is used to make modifications to the Kerberos
16 database, either remotely via the kadmind(8) daemon, or locally (with the
21 -
\b-p
\bp _
\bs_
\bt_
\br_
\bi_
\bn_
\bg, -
\b--
\b-p
\bpr
\bri
\bin
\bnc
\bci
\bip
\bpa
\bal
\bl=
\b=_
\bs_
\bt_
\br_
\bi_
\bn_
\bg
22 principal to authenticate as
24 -
\b-K
\bK _
\bs_
\bt_
\br_
\bi_
\bn_
\bg, -
\b--
\b-k
\bke
\bey
\byt
\bta
\bab
\bb=
\b=_
\bs_
\bt_
\br_
\bi_
\bn_
\bg
25 keytab for authentication principal
27 -
\b-c
\bc _
\bf_
\bi_
\bl_
\be, -
\b--
\b-c
\bco
\bon
\bnf
\bfi
\big
\bg-
\b-f
\bfi
\bil
\ble
\be=
\b=_
\bf_
\bi_
\bl_
\be
28 location of config file
30 -
\b-k
\bk _
\bf_
\bi_
\bl_
\be, -
\b--
\b-k
\bke
\bey
\by-
\b-f
\bfi
\bil
\ble
\be=
\b=_
\bf_
\bi_
\bl_
\be
31 location of master key file
33 -
\b-r
\br _
\br_
\be_
\ba_
\bl_
\bm, -
\b--
\b-r
\bre
\bea
\bal
\blm
\bm=
\b=_
\br_
\be_
\ba_
\bl_
\bm
36 -
\b-a
\ba _
\bh_
\bo_
\bs_
\bt, -
\b--
\b-a
\bad
\bdm
\bmi
\bin
\bn-
\b-s
\bse
\ber
\brv
\bve
\ber
\br=
\b=_
\bh_
\bo_
\bs_
\bt
39 -
\b-s
\bs _
\bp_
\bo_
\br_
\bt _
\bn_
\bu_
\bm_
\bb_
\be_
\br, -
\b--
\b-s
\bse
\ber
\brv
\bve
\ber
\br-
\b-p
\bpo
\bor
\brt
\bt=
\b=_
\bp_
\bo_
\br_
\bt _
\bn_
\bu_
\bm_
\bb_
\be_
\br
42 -
\b-l
\bl, -
\b--
\b-l
\blo
\boc
\bca
\bal
\bl
45 If no _
\bc_
\bo_
\bm_
\bm_
\ba_
\bn_
\bd is given on the command line, k
\bka
\bad
\bdm
\bmi
\bin
\bn will prompt for com-
46 mands to process. Commands include:
48 a
\bad
\bdd
\bd [-
\b-r
\br | -
\b--
\b-r
\bra
\ban
\bnd
\bdo
\bom
\bm-
\b-k
\bke
\bey
\by] [-
\b--
\b-r
\bra
\ban
\bnd
\bdo
\bom
\bm-
\b-p
\bpa
\bas
\bss
\bsw
\bwo
\bor
\brd
\bd] [-
\b-p
\bp _
\bs_
\bt_
\br_
\bi_
\bn_
\bg |
49 -
\b--
\b-p
\bpa
\bas
\bss
\bsw
\bwo
\bor
\brd
\bd=
\b=_
\bs_
\bt_
\br_
\bi_
\bn_
\bg] [-
\b--
\b-k
\bke
\bey
\by=
\b=_
\bs_
\bt_
\br_
\bi_
\bn_
\bg] [-
\b--
\b-m
\bma
\bax
\bx-
\b-t
\bti
\bic
\bck
\bke
\bet
\bt-
\b-l
\bli
\bif
\bfe
\be=
\b=_
\bl_
\bi_
\bf_
\be_
\bt_
\bi_
\bm_
\be]
50 [-
\b--
\b-m
\bma
\bax
\bx-
\b-r
\bre
\ben
\bne
\bew
\bwa
\bab
\bbl
\ble
\be-
\b-l
\bli
\bif
\bfe
\be=
\b=_
\bl_
\bi_
\bf_
\be_
\bt_
\bi_
\bm_
\be] [-
\b--
\b-a
\bat
\btt
\btr
\bri
\bib
\bbu
\but
\bte
\bes
\bs=
\b=_
\ba_
\bt_
\bt_
\br_
\bi_
\bb_
\bu_
\bt_
\be_
\bs]
51 [-
\b--
\b-e
\bex
\bxp
\bpi
\bir
\bra
\bat
\bti
\bio
\bon
\bn-
\b-t
\bti
\bim
\bme
\be=
\b=_
\bt_
\bi_
\bm_
\be] [-
\b--
\b-p
\bpw
\bw-
\b-e
\bex
\bxp
\bpi
\bir
\bra
\bat
\bti
\bio
\bon
\bn-
\b-t
\bti
\bim
\bme
\be=
\b=_
\bt_
\bi_
\bm_
\be] _
\bp_
\br_
\bi_
\bn_
\bc_
\bi_
\bp_
\ba_
\bl_
\b._
\b._
\b.
53 creates a new principal
55 p
\bpa
\bas
\bss
\bsw
\bwd
\bd [-
\b-r
\br | -
\b--
\b-r
\bra
\ban
\bnd
\bdo
\bom
\bm-
\b-k
\bke
\bey
\by] [-
\b--
\b-r
\bra
\ban
\bnd
\bdo
\bom
\bm-
\b-p
\bpa
\bas
\bss
\bsw
\bwo
\bor
\brd
\bd] [-
\b-p
\bp _
\bs_
\bt_
\br_
\bi_
\bn_
\bg |
56 -
\b--
\b-p
\bpa
\bas
\bss
\bsw
\bwo
\bor
\brd
\bd=
\b=_
\bs_
\bt_
\br_
\bi_
\bn_
\bg] [-
\b--
\b-k
\bke
\bey
\by=
\b=_
\bs_
\bt_
\br_
\bi_
\bn_
\bg] _
\bp_
\br_
\bi_
\bn_
\bc_
\bi_
\bp_
\ba_
\bl_
\b._
\b._
\b.
58 changes the password of an existing principal
60 d
\bde
\bel
\ble
\bet
\bte
\be _
\bp_
\br_
\bi_
\bn_
\bc_
\bi_
\bp_
\ba_
\bl_
\b._
\b._
\b.
64 d
\bde
\bel
\bl_
\b_e
\ben
\bnc
\bct
\bty
\byp
\bpe
\be _
\bp_
\br_
\bi_
\bn_
\bc_
\bi_
\bp_
\ba_
\bl _
\be_
\bn_
\bc_
\bt_
\by_
\bp_
\be_
\bs_
\b._
\b._
\b.
67 removes some enctypes from a principal. This can be useful
68 the service belonging to the principal is known to not handle
71 e
\bex
\bxt
\bt_
\b_k
\bke
\bey
\byt
\bta
\bab
\bb [-
\b-k
\bk _
\bs_
\bt_
\br_
\bi_
\bn_
\bg | -
\b--
\b-k
\bke
\bey
\byt
\bta
\bab
\bb=
\b=_
\bs_
\bt_
\br_
\bi_
\bn_
\bg] _
\bp_
\br_
\bi_
\bn_
\bc_
\bi_
\bp_
\ba_
\bl_
\b._
\b._
\b.
73 creates a keytab with the keys of the specified principals
75 g
\bge
\bet
\bt [-
\b-l
\bl | -
\b--
\b-l
\blo
\bon
\bng
\bg] [-
\b-s
\bs | -
\b--
\b-s
\bsh
\bho
\bor
\brt
\bt] [-
\b-t
\bt | -
\b--
\b-t
\bte
\ber
\brs
\bse
\be] _
\be_
\bx_
\bp_
\br_
\be_
\bs_
\bs_
\bi_
\bo_
\bn_
\b._
\b._
\b.
77 lists the principals that match the expressions (which are
78 shell glob like), long format gives more information, and
79 terse just prints the names
81 r
\bre
\ben
\bna
\bam
\bme
\be _
\bf_
\br_
\bo_
\bm _
\bt_
\bo
85 m
\bmo
\bod
\bdi
\bif
\bfy
\by [-
\b-a
\ba _
\ba_
\bt_
\bt_
\br_
\bi_
\bb_
\bu_
\bt_
\be_
\bs | -
\b--
\b-a
\bat
\btt
\btr
\bri
\bib
\bbu
\but
\bte
\bes
\bs=
\b=_
\ba_
\bt_
\bt_
\br_
\bi_
\bb_
\bu_
\bt_
\be_
\bs]
86 [-
\b--
\b-m
\bma
\bax
\bx-
\b-t
\bti
\bic
\bck
\bke
\bet
\bt-
\b-l
\bli
\bif
\bfe
\be=
\b=_
\bl_
\bi_
\bf_
\be_
\bt_
\bi_
\bm_
\be] [-
\b--
\b-m
\bma
\bax
\bx-
\b-r
\bre
\ben
\bne
\bew
\bwa
\bab
\bbl
\ble
\be-
\b-l
\bli
\bif
\bfe
\be=
\b=_
\bl_
\bi_
\bf_
\be_
\bt_
\bi_
\bm_
\be]
87 [-
\b--
\b-e
\bex
\bxp
\bpi
\bir
\bra
\bat
\bti
\bio
\bon
\bn-
\b-t
\bti
\bim
\bme
\be=
\b=_
\bt_
\bi_
\bm_
\be] [-
\b--
\b-p
\bpw
\bw-
\b-e
\bex
\bxp
\bpi
\bir
\bra
\bat
\bti
\bio
\bon
\bn-
\b-t
\bti
\bim
\bme
\be=
\b=_
\bt_
\bi_
\bm_
\be]
88 [-
\b--
\b-k
\bkv
\bvn
\bno
\bo=
\b=_
\bn_
\bu_
\bm_
\bb_
\be_
\br] _
\bp_
\br_
\bi_
\bn_
\bc_
\bi_
\bp_
\ba_
\bl
90 modifies certain attributes of a principal
92 p
\bpr
\bri
\biv
\bvi
\bil
\ble
\beg
\bge
\bes
\bs
94 lists the operations you are allowed to perform
96 When running in local mode, the following commands can also be used:
98 d
\bdu
\bum
\bmp
\bp [-
\b-d
\bd | -
\b--
\b-d
\bde
\bec
\bcr
\bry
\byp
\bpt
\bt] [_
\bd_
\bu_
\bm_
\bp_
\b-_
\bf_
\bi_
\bl_
\be]
100 writes the database in ``human readable'' form to the speci-
101 fied file, or standard out
103 i
\bin
\bni
\bit
\bt [-
\b--
\b-r
\bre
\bea
\bal
\blm
\bm-
\b-m
\bma
\bax
\bx-
\b-t
\bti
\bic
\bck
\bke
\bet
\bt-
\b-l
\bli
\bif
\bfe
\be=
\b=_
\bs_
\bt_
\br_
\bi_
\bn_
\bg]
104 [-
\b--
\b-r
\bre
\bea
\bal
\blm
\bm-
\b-m
\bma
\bax
\bx-
\b-r
\bre
\ben
\bne
\bew
\bwa
\bab
\bbl
\ble
\be-
\b-l
\bli
\bif
\bfe
\be=
\b=_
\bs_
\bt_
\br_
\bi_
\bn_
\bg] _
\br_
\be_
\ba_
\bl_
\bm
106 initializes the Kerberos database with entries for a new
107 realm. It's possible to have more than one realm served by
110 l
\blo
\boa
\bad
\bd _
\bf_
\bi_
\bl_
\be
112 reads a previously dumped database, and re-creates that
113 database from scratch
115 m
\bme
\ber
\brg
\bge
\be _
\bf_
\bi_
\bl_
\be
117 similar to l
\bli
\bis
\bst
\bt but just modifies the database with the en-
118 tries in the dump file
120 S
\bSE
\bEE
\bE A
\bAL
\bLS
\bSO
\bO
123 HEIMDAL September 10, 2000 2