1 .\" Copyright (c) 2000 - 2007 Kungliga Tekniska Högskolan
2 .\" (Royal Institute of Technology, Stockholm, Sweden).
3 .\" All rights reserved.
5 .\" Redistribution and use in source and binary forms, with or without
6 .\" modification, are permitted provided that the following conditions
9 .\" 1. Redistributions of source code must retain the above copyright
10 .\" notice, this list of conditions and the following disclaimer.
12 .\" 2. Redistributions in binary form must reproduce the above copyright
13 .\" notice, this list of conditions and the following disclaimer in the
14 .\" documentation and/or other materials provided with the distribution.
16 .\" 3. Neither the name of the Institute nor the names of its contributors
17 .\" may be used to endorse or promote products derived from this software
18 .\" without specific prior written permission.
20 .\" THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
21 .\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22 .\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23 .\" ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
24 .\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25 .\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26 .\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27 .\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28 .\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29 .\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
39 .Nd Kerberos administration utility
43 .Oo Fl p Ar string \*(Ba Xo
44 .Fl -principal= Ns Ar string
47 .Oo Fl K Ar string \*(Ba Xo
48 .Fl -keytab= Ns Ar string
51 .Oo Fl c Ar file \*(Ba Xo
52 .Fl -config-file= Ns Ar file
55 .Oo Fl k Ar file \*(Ba Xo
56 .Fl -key-file= Ns Ar file
59 .Oo Fl r Ar realm \*(Ba Xo
60 .Fl -realm= Ns Ar realm
63 .Oo Fl a Ar host \*(Ba Xo
64 .Fl -admin-server= Ns Ar host
67 .Oo Fl s Ar port number \*(Ba Xo
68 .Fl -server-port= Ns Ar port number
73 .Op Fl v | Fl -version
79 program is used to make modifications to the Kerberos database, either remotely via the
81 daemon, or locally (with the
89 .Fl -principal= Ns Ar string
91 principal to authenticate as
94 .Fl -keytab= Ns Ar string
96 keytab for authentication principal
99 .Fl -config-file= Ns Ar file
101 location of config file
104 .Fl -key-file= Ns Ar file
106 location of master key file
109 .Fl -realm= Ns Ar realm
114 .Fl -admin-server= Ns Ar host
118 .Fl s Ar port number ,
119 .Fl -server-port= Ns Ar port number
131 is given on the command line,
133 will prompt for commands to process. Some of the commands that take
134 one or more principals as argument
141 will accept a glob style wildcard, and perform the operation on all
145 .\" not using a list here, since groff apparently gets confused
146 .\" with nested Xo/Xc
147 .Bd -ragged -offset indent
149 .Op Fl r | Fl -random-key
150 .Op Fl -random-password
151 .Oo Fl p Ar string \*(Ba Xo
152 .Fl -password= Ns Ar string
155 .Op Fl -key= Ns Ar string
156 .Op Fl -max-ticket-life= Ns Ar lifetime
157 .Op Fl -max-renewable-life= Ns Ar lifetime
158 .Op Fl -attributes= Ns Ar attributes
159 .Op Fl -expiration-time= Ns Ar time
160 .Op Fl -pw-expiration-time= Ns Ar time
163 .Bd -ragged -offset indent
164 Adds a new principal to the database. The options not passed on the
165 command line will be promped for.
169 .Op Fl r | Fl -random-key
170 .Ar principal enctypes...
172 .Bd -ragged -offset indent
173 Adds a new encryption type to the principal, only random key are
180 .Bd -ragged -offset indent
185 .Ar principal enctypes...
187 .Bd -ragged -offset indent
188 Removes some enctypes from a principal; this can be useful if the
189 service belonging to the principal is known to not handle certain
194 .Oo Fl k Ar string \*(Ba Xo
195 .Fl -keytab= Ns Ar string
200 .Bd -ragged -offset indent
201 Creates a keytab with the keys of the specified principals.
208 .Op Fl o Ar string | Fl -column-info= Ns Ar string
211 .Bd -ragged -offset indent
212 Lists the matching principals, short prints the result as a table,
213 while long format produces a more verbose output. Which columns to
214 print can be selected with the
216 option. The argument is a comma separated list of column names
217 optionally appended with an equal sign
219 and a column header. Which columns are printed by default differ
220 slightly between short and long output.
222 The default terse output format is similar to
223 .Fl s o Ar principal= ,
224 just printing the names of matched principals.
226 Possible column names include:
228 .Li princ_expire_time ,
230 .Li last_pwd_change ,
240 .Li fail_auth_count ,
247 .Oo Fl a Ar attributes \*(Ba Xo
248 .Fl -attributes= Ns Ar attributes
251 .Op Fl -max-ticket-life= Ns Ar lifetime
252 .Op Fl -max-renewable-life= Ns Ar lifetime
253 .Op Fl -expiration-time= Ns Ar time
254 .Op Fl -pw-expiration-time= Ns Ar time
255 .Op Fl -kvno= Ns Ar number
258 .Bd -ragged -offset indent
259 Modifies certain attributes of a principal. If run without command
260 line options, you will be prompted. With command line options, it will
261 only change the ones specified.
263 Possible attributes are:
266 .Li pwchange-service ,
268 .Li requires-pw-change ,
269 .Li requires-hw-auth ,
270 .Li requires-pre-auth ,
271 .Li disallow-all-tix ,
272 .Li disallow-dup-skey ,
273 .Li disallow-proxiable ,
274 .Li disallow-renewable ,
275 .Li disallow-tgt-based ,
276 .Li disallow-forwardable ,
277 .Li disallow-postdated
279 Attributes may be negated with a "-", e.g.,
281 kadmin -l modify -a -disallow-proxiable user
285 .Op Fl r | Fl -random-key
286 .Op Fl -random-password
287 .Oo Fl p Ar string \*(Ba Xo
288 .Fl -password= Ns Ar string
291 .Op Fl -key= Ns Ar string
294 .Bd -ragged -offset indent
295 Changes the password of an existing principal.
302 .Bd -ragged -offset indent
303 Run the password quality check function locally.
304 You can run this on the host that is configured to run the kadmind
305 process to verify that your configuration file is correct.
306 The verification is done locally, if kadmin is run in remote mode,
307 no rpc call is done to the server.
312 .Bd -ragged -offset indent
313 Lists the operations you are allowed to perform. These include
316 .Li change-password ,
328 .Bd -ragged -offset indent
329 Renames a principal. This is normally transparent, but since keys are
330 salted with the principal name, they will have a non-standard salt,
331 and clients which are unable to cope with this will fail. Kerberos 4
338 .Bd -ragged -offset indent
339 Check database for strange configurations on important principals. If
340 no realm is given, the default realm is used.
345 When running in local mode, the following commands can also be used:
346 .Bd -ragged -offset indent
348 .Op Fl d | Fl -decrypt
351 .Bd -ragged -offset indent
352 Writes the database in
354 form to the specified file, or standard out. If the database is
355 encrypted, the dump will also have encrypted keys, unless
361 .Op Fl -realm-max-ticket-life= Ns Ar string
362 .Op Fl -realm-max-renewable-life= Ns Ar string
365 .Bd -ragged -offset indent
366 Initializes the Kerberos database with entries for a new realm. It's
367 possible to have more than one realm served by one server.
373 .Bd -ragged -offset indent
374 Reads a previously dumped database, and re-creates that database from
381 .Bd -ragged -offset indent
384 but just modifies the database with the entries in the dump file.
388 .Oo Fl e Ar enctype \*(Ba Xo
389 .Fl -enctype= Ns Ar enctype
392 .Oo Fl k Ar keyfile \*(Ba Xo
393 .Fl -key-file= Ns Ar keyfile
397 .Op Fl -master-key-fd= Ns Ar fd
399 .Bd -ragged -offset indent
400 Writes the Kerberos master key to a file used by the KDC.