2 .\" This manual page is derived from documentation obtained from The Massachusetts Institute of Technology.
3 .\" Portions Copyright (c) 2007, Sun Microsystems, Inc. All Rights Reserved
4 .\" The contents of this file are subject to the terms of the Common Development and Distribution License (the "License"). You may not use this file except in compliance with the License.
5 .\" You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE or http://www.opensolaris.org/os/licensing. See the License for the specific language governing permissions and limitations under the License.
6 .\" When distributing Covered Code, include this CDDL HEADER in each file and include the License file at usr/src/OPENSOLARIS.LICENSE. If applicable, add the following below this CDDL HEADER, with the fields enclosed by brackets "[]" replaced with your own identifying information: Portions Copyright [yyyy] [name of copyright owner]
7 .TH KDB5_LDAP_UTIL 8 "Aug 28, 2007"
9 kdb5_ldap_util \- Kerberos configuration utility
13 \fBkdb5_ldap_util\fR [\fB-D\fR \fIuser_dn\fR [\fB-w\fR \fIpasswd\fR]] [\fB-H\fR \fIldap_uri\fR] \fIcommand\fR
14 [\fIcommand_options\fR]
20 The \fBkdb5_ldap_util\fR utility allows an administrator to manage realms,
21 Kerberos services, and ticket policies. The utility offers a set of general
22 options, described under OPTIONS, and a set of commands, which, in turn, have
23 their own options. Commands and their options are described in their own
28 \fBkdb5_ldap_util\fR has a small set of general options that apply to the
29 \fBkdb5_ldap_util\fR utility itself and a larger number of options that apply
30 to specific commands. A number of these command-specific options apply to
31 multiple commands and are described in their own section, below.
35 The following general options are supported:
39 \fB\fB-D\fR \fIuser_dn\fR\fR
43 Specifies the distinguished name (DN) of a user who has sufficient rights to
44 perform the operation on the LDAP server.
50 \fB\fB-H\fR \fIldap_uri\fR\fR
54 Specifies the URI of the LDAP server.
60 \fB\fB-w\fR \fIpasswd\fR\fR
64 Specifies the password of \fIuser_dn\fR. This option is not recommended.
67 .SS "Common Command-specific Options"
70 The following options apply to a number of \fBkdb5_ldap_util\fR commands.
74 \fB\fB-subtrees\fR \fIsubtree_dn_list\fR\fR
78 Specifies the list of subtrees containing the principals of a realm. The list
79 contains the DNs of the subtree objects separated by a colon.
85 \fB\fB-sscope\fR \fIsearch_scope\fR\fR
89 Specifies the scope for searching the principals under a subtree. The possible
90 values are 1 or \fBone\fR (one level), 2 or \fBsub\fR (subtrees).
96 \fB\fB-containerref\fR \fIcontainer_reference_dn\fR\fR
100 Specifies the DN of the container object in which the principals of a realm
101 will be created. If the container reference is not configured for a realm, the
102 principals will be created in the realm container.
108 \fB\fB-maxtktlife\fR \fImax_ticket_life\fR\fR
112 Specifies maximum ticket life for principals in this realm.
118 \fB\fB-maxrenewlife\fR \fImax_renewable_ticket_life\fR\fR
122 Specifies maximum renewable life of tickets for principals in this realm.
128 \fB\fB-r\fR \fIrealm\fR\fR
132 Specifies the Kerberos realm of the database; by default the realm returned by
133 \fBkrb5_default_local_realm\fR(3LIB) is used.
136 .SH \fBkdb5_ldap_util\fR COMMANDS
139 The \fBkdb5_ldap_util\fR utility comprises a set of commands, each with its own
140 set of options. These commands are described in the following subsections.
141 .SS "The \fBcreate\fR Command"
144 The \fBcreate\fR command creates a realm in a directory. The command has the
150 [-subtrees \fIsubtree_dn_list\fR]
151 [-sscope \fIsearch_scope\fR]
152 [-containerref \fIcontainer_reference_dn\fR]
154 [-m|-P \fIpassword\fR| -sf \fIstashfilename\fR]
157 [-maxtktlife \fImax_ticket_life\fR]
158 [-kdcdn \fIkdc_service_list\fR]
159 [-admindn \fIadmin_service_list\fR]
160 [-maxrenewlife \fImax_renewable_ticket_life\fR]
168 The \fBcreate\fR command has the following options:
172 \fB\fB-subtree\fR \fIsubtree_dn_list\fR\fR
176 See "Common Command-specific Options," above.
182 \fB\fB-sscope\fR \fIsearch_scope\fR\fR
186 See "Common Command-specific Options," above.
192 \fB\fB-containerref\fR \fIcontainer_reference_dn\fR\fR
196 See "Common Command-specific Options," above.
202 \fB\fB-k\fR \fImkeytype\fR\fR
206 Specifies the key type of the master key in the database; the default is that
207 given in \fBkdc.conf\fR(4).
217 Specifies that the master database password should be read from the TTY rather
218 than fetched from a file on the disk.
224 \fB\fB-P\fR \fIpassword\fR\fR
228 Specifies the master database password. This option is not recommended.
234 \fB\fB-sf\fR \fIstashfilename\fR\fR
238 Specifies the stash file of the master database password.
248 Specifies that the stash file is to be created.
254 \fB\fB-maxtktlife\fR \fImax_ticket_life\fR\fR
258 See "Common Command-specific Options," above.
264 \fB\fB-maxrenewlife\fR \fImax_renewable_ticket_life\fR\fR
268 See "Common Command-specific Options," above.
274 \fB\fB-r\fR \fIrealm\fR\fR
278 See "Common Command-specific Options," above.
284 \fB\fIticket_flags\fR\fR
288 Specifies the ticket flags. If this option is not specified, by default, none
289 of the flags are set. This means all the ticket options will be allowed and no
290 restriction will be set. See "Ticket Flags" for a list and descriptions of
294 .SS "The \fBmodify\fR Command"
297 The \fBmodify\fR command modifies the attributes of a realm. The command has
298 the following syntax:
303 [-subtrees \fIsubtree_dn_list\fR]
304 [-sscope \fIsearch_scope\fR]
305 [-containerref \fIcontainer_reference_dn\fR]
307 [-maxtktlife \fImax_ticket_life\fR]
308 [-maxrenewlife \fImax_renewable_ticket_life\fR]
316 The \fBmodify\fR command has the following options:
320 \fB\fB-subtree\fR \fIsubtree_dn_list\fR\fR
324 See "Common Command-specific Options," above.
330 \fB\fB-sscope\fR \fIsearch_scope\fR\fR
334 See "Common Command-specific Options," above.
340 \fB\fB-containerref\fR \fIcontainer_reference_dn\fR\fR
344 See "Common Command-specific Options," above.
350 \fB\fB-maxtktlife\fR \fImax_ticket_life\fR\fR
354 See "Common Command-specific Options," above.
360 \fB\fB-maxrenewlife\fR \fImax_renewable_ticket_life\fR\fR
364 See "Common Command-specific Options," above.
370 \fB\fB-r\fR \fIrealm\fR\fR
374 See "Common Command-specific Options," above.
380 \fB\fIticket_flags\fR\fR
384 Specifies the ticket flags. If this option is not specified, by default, none
385 of the flags are set. This means all the ticket options will be allowed and no
386 restriction will be set. See "Ticket Flags" for a list and descriptions of
390 .SS "The \fBview\fR Command"
393 The \fBview\fR command displays the attributes of a realm. The command has the
398 view [-r \fIrealm\fR]
405 The \fBview\fR command has the following option:
409 \fB\fB-r\fR \fIrealm\fR\fR
413 See "Common Command-specific Options," above.
416 .SS "The \fBdestroy\fR Command"
419 The \fBdestroy\fR command destroys a realm, including the master key stash
420 file. The command has the following syntax:
424 destroy [-f] [-r \fIrealm\fR]
431 The \fBdestroy\fR command has the following options:
439 If specified, \fBdestroy\fR does not prompt you for confirmation.
445 \fB\fB-r\fR \fIrealm\fR\fR
449 See "Common Command-specific Options," above.
452 .SS "The \fBlist\fR Command"
455 The \fBlist\fR command displays the names of realms. The command has the
467 The \fBlist\fR command has no options.
468 .SS "The \fBstashsrvpw\fR Command"
471 The \fBstashsrvpw\fR command enables you to store the password for service
472 object in a file so that a KDC and Administration server can use it to
473 authenticate to the LDAP server. The command has the following syntax:
477 stashsrvpw [-f \fIfilename\fR] \fIservicedn\fR
484 The \fBstashsrvpw\fR command has the following option and argument:
488 \fB\fB-f\fR \fIfilename\fR\fR
492 Specifies the complete path of the service password file. The default is:
496 /var/krb5/service_passwd
506 \fB\fIservicedn\fR\fR
510 Specifies the distinguished name (DN) of the service object whose password is
511 to be stored in file.
514 .SS "The \fBcreate_policy\fR Command"
517 The \fBcreate_policy\fR command creates a ticket policy in a directory. The
518 command has the following syntax:
524 [-maxtktlife \fImax_ticket_life\fR]
525 [-maxrenewlife \fImax_renewable_ticket_life\fR]
534 The \fBcreate_policy\fR command has the following options:
538 \fB\fB-r\fR \fIrealm\fR\fR
542 See "Common Command-specific Options," above.
548 \fB\fB-maxtktlife\fR \fImax_ticket_life\fR\fR
552 See "Common Command-specific Options," above.
558 \fB\fB-maxrenewlife\fR \fImax_renewable_ticket_life\fR\fR
562 See "Common Command-specific Options," above.
568 \fB\fIticket_flags\fR\fR
572 Specifies the ticket flags. If this option is not specified, by default, none
573 of the flags are set. This means all the ticket options will be allowed and no
574 restriction will be set. See "Ticket Flags" for a list and descriptions of
581 \fB\fIpolicy_name\fR\fR
585 Specifies the name of the ticket policy.
588 .SS "The \fBmodify_policy\fR Command"
591 The \fBmodify_policy\fR command modifies the attributes of a ticket policy. The
592 command has the following syntax:
598 [-maxtktlife \fImax_ticket_life\fR]
599 [-maxrenewlife \fImax_renewable_ticket_life\fR]
608 The \fBmodify_policy\fR command has the same options and argument as those for
609 the \fBcreate_policy\fR command.
610 .SS "The \fBview_policy\fR Command"
613 The \fBview_policy\fR command displays the attributes of a ticket policy. The
614 command has the following syntax:
618 view_policy [-r \fIrealm\fR] \fIpolicy_name\fR
625 The \fBview_policy\fR command has the following options:
629 \fB\fB-r\fR \fIrealm\fR\fR
633 See "Common Command-specific Options," above.
639 \fB\fIpolicy_name\fR\fR
643 Specifies the name of the ticket policy.
646 .SS "The \fBdestroy_policy\fR Command"
649 The \fBdestroy_policy\fR command destroys an existing ticket policy. The
650 command has the following syntax:
654 destroy_policy [-r \fIrealm\fR] [-force] \fIpolicy_name\fR
661 The \fBdestroy_policy\fR command has the following options:
665 \fB\fB-r\fR \fIrealm\fR\fR
669 See "Common Command-specific Options," above.
679 Forces the deletion of the policy object. If not specified, you will be
680 prompted for confirmation before the policy is deleted. Enter \fByes\fR to
681 confirm the deletion.
687 \fB\fIpolicy_name\fR\fR
691 Specifies the name of the ticket policy.
694 .SS "The \fBlist_policy\fR Command"
697 The \fBlist_policy\fR command lists the ticket policies in the default or a
698 specified realm. The command has the following syntax:
702 list_policy [-r \fIrealm\fR]
709 The \fBlist_policy\fR command has the following option:
713 \fB\fB-r\fR \fIrealm\fR\fR
717 See "Common Command-specific Options," above.
723 A number of \fBkdb5_ldap_util\fR commands have \fBticket_flag\fR options. These
724 flags are described as follows:
728 \fB\fB{-|+}allow_dup_skey\fR\fR
732 \fB-allow_dup_skey\fR disables user-to-user authentication for principals by
733 prohibiting principals from obtaining a session key for another user. This
734 setting sets the \fBKRB5_KDB_DISALLOW_DUP_SKEY\fR flag. \fB+allow_dup_skey\fR
741 \fB\fB{-|+}allow_forwardable\fR\fR
745 \fB-allow_forwardable\fR prohibits principals from obtaining forwardable
746 tickets. This setting sets the \fBKRB5_KDB_DISALLOW_FORWARDABLE\fR flag.
747 \fB+allow_forwardable\fR clears this flag.
753 \fB\fB{-|+}allow_postdated\fR\fR
757 \fB-allow_postdated\fR prohibits principals from obtaining postdated tickets.
758 This setting sets the \fBKRB5_KDB_DISALLOW_POSTDATED\fR flag.
759 \fB+allow_postdated\fR clears this flag.
765 \fB\fB{-|+}allow_proxiable\fR\fR
769 \fB-allow_proxiable\fR prohibits principals from obtaining proxiable tickets.
770 This setting sets the \fBKRB5_KDB_DISALLOW_PROXIABLE\fR flag.
771 \fB+allow_proxiable\fR clears this flag.
777 \fB\fB{-|+}allow_renewable\fR\fR
781 \fB-allow_renewable\fR prohibits principals from obtaining renewable tickets.
782 This setting sets the \fBKRB5_KDB_DISALLOW_RENEWABLE\fR flag.
783 \fB+allow_renewable\fR clears this flag.
789 \fB\fB{-|+}allow_svr\fR\fR
793 \fB-allow_svr\fR prohibits the issuance of service tickets for principals. This
794 setting sets the \fBKRB5_KDB_DISALLOW_SVR\fR flag. \fB+allow_svr\fR clears
801 \fB\fB{-|+}allow_tgs_req\fR\fR
805 \fB-allow_tgs_req\fR specifies that a Ticket-Granting Service (TGS) request for
806 a service ticket for principals is not permitted. This option is useless for
807 most purposes. \fB+allow_tgs_req\fR clears this flag. The default is
808 \fB+allow_tgs_req\fR. In effect, \fB-allow_tgs_req\fR sets the
809 \fBKRB5_KDB_DISALLOW_TGT_BASED\fR flag on principals in the database.
815 \fB\fB{-|+}allow_tix\fR\fR
819 \fB-allow_tix\fR forbids the issuance of any tickets for principals.
820 \fB+allow_tix\fR clears this flag. The default is \fB+allow_tix\fR. In effect,
821 \fB-allow_tix\fR sets the \fBKRB5_KDB_DISALLOW_ALL_TIX\fR flag on principals in
828 \fB\fB{-|+}needchange\fR\fR
832 \fB+needchange\fR sets a flag in the attributes field to force a password
833 change; \fB-needchange\fR clears that flag. The default is \fB-needchange\fR.
834 In effect, \fB+needchange\fR sets the \fBKRB5_KDB_REQUIRES_PWCHANGE\fR flag on
835 principals in the database.
841 \fB\fB{-|+}password_changing_service\fR\fR
845 \fB+password_changing_service\fR sets a flag in the attributes field marking a
846 principal as a password-change-service principal (a designation that is most
847 often not useful). \fB-password_changing_service\fR clears the flag. That this
848 flag has a long name is intentional. The default is
849 \fB-password_changing_service\fR. In effect, \fB+password_changing_service\fR
850 sets the \fBKRB5_KDB_PWCHANGE_SERVICE\fR flag on principals in the database.
856 \fB\fB{-|+}requires_hwauth\fR\fR
860 \fB+requires_hwauth\fR requires principals to preauthenticate using a hardware
861 device before being allowed to \fBkinit\fR(1). This setting sets the
862 \fBKRB5_KDB_REQUIRES_HW_AUTH\fR flag. \fB-requires_hwauth\fR clears this flag.
868 \fB\fB{-|+}requires_preauth\fR\fR
872 +\fBrequires_preauth\fR requires principals to preauthenticate before being
873 allowed to \fBkinit\fR(1). This setting sets the
874 \fBKRB5_KDB_REQUIRES_PRE_AUTH\fR flag. \fB-requires_preauth\fR clears this
880 \fBExample 1 \fRUsing \fBcreate\fR
883 The following is an example of the use of the \fBcreate\fR command.
888 # \fBkdb5_ldap_util -D cn=admin,o=org -H ldaps://ldap-server1.mit.edu \e
889 create -subtrees o=org -sscope SUB -r ATHENA.MIT.EDU\fR
890 Password for "cn=admin,o=org": \fIpassword entered\fR
891 Initializing database for realm 'ATHENA.MIT.EDU'
892 You will be prompted for the database Master Password.
893 It is important that you NOT FORGET this password.
894 Enter KDC database master key: \fImaster key entered\fR
895 Re-enter KDC database master key to verify: \fImaster key re-entered\fRjjjjjj
901 \fBExample 2 \fRUsing \fBmodify\fR
904 The following is an example of the use of the \fBmodify\fR command.
909 # \fBkdb5_ldap_util -D cn=admin,o=org -H ldaps://ldap-server1.mit.edu \e
910 modify +requires_preauth -r ATHENA.MIT.EDU\fR
911 Password for "cn=admin,o=org": \fIpassword entered\fR
912 Password for "cn=admin,o=org": \fIpassword entered\fR
918 \fBExample 3 \fRUsing \fBview\fR
921 The following is an example of the use of the \fBview\fR command.
926 # \fBkdb5_ldap_util -D cn=admin,o=org -H ldaps://ldap-server1.mit.edu \e
927 view -r ATHENA.MIT.EDU\fR
928 Password for "cn=admin,o=org":
929 Realm Name: ATHENA.MIT.EDU
930 Subtree: ou=users,o=org
931 Subtree: ou=servers,o=org
933 Maximum ticket life: 0 days 01:00:00
934 Maximum renewable life: 0 days 10:00:00
935 Ticket flags: DISALLOW_FORWARDABLE REQUIRES_PWCHANGE
941 \fBExample 4 \fRUsing \fBdestroy\fR
944 The following is an example of the use of the \fBdestroy\fR command.
949 # \fBkdb5_ldap_util -D cn=admin,o=org -H ldaps://ldap-server1.mit.edu \e
950 destroy -r ATHENA.MIT.EDU\fR
951 Password for "cn=admin,o=org": \fIpassword entered\fR
952 Deleting KDC database of 'ATHENA.MIT.EDU', are you sure?
953 (type 'yes' to confirm)? \fByes\fR
954 OK, deleting database of 'ATHENA.MIT.EDU'...
960 \fBExample 5 \fRUsing \fBlist\fR
963 The following is an example of the use of the \fBlist\fR command.
968 # \fBkdb5_ldap_util -D cn=admin,o=org -H ldaps://ldap-server1.mit.edu list\fR
969 Password for "cn=admin,o=org": \fIpassword entered\fR
970 Re-enter Password for "cn=admin,o=org": \fIpassword re-entered\fR
979 \fBExample 6 \fRUsing \fBstashsrvpw\fR
982 The following is an example of the use of the \fBstashsrvpw\fR command.
987 # \fBkdb5_ldap_util stashsrvpw -f \e
988 /home/andrew/conf_keyfile cn=service-kdc,o=org\fR
989 Password for "cn=service-kdc,o=org": \fIpassword entered\fR
990 Re-enter password for "cn=service-kdc,o=org": \fIpassword re-entered\fR
996 \fBExample 7 \fRUsing \fBcreate_policy\fR
999 The following is an example of the use of the \fBcreate_policy\fR command.
1004 # \fBkdb5_ldap_util -D cn=admin,o=org -H ldaps://ldap-server1.mit.edu \e
1005 create_policy -r ATHENA.MIT.EDU \e
1006 -maxtktlife "1 day" -maxrenewlife "1 week" \e
1007 -allow_postdated +needchange -allow_forwardable \fItktpolicy\fR\fR
1008 Password for "cn=admin,o=org": \fIpassword entered\fR
1014 \fBExample 8 \fRUsing \fBmodify_policy\fR
1017 The following is an example of the use of the \fBmodify_policy\fR command.
1022 # \fBkdb5_ldap_util -D cn=admin,o=org -H ldaps://ldap-server1.mit.edu \e
1023 modify_policy -r ATHENA.MIT.EDU \e
1024 -maxtktlife "60 minutes" -maxrenewlife "10 hours" \e
1025 +allow_postdated -requires_preauth \fItktpolicy\fR\fR
1026 Password for "cn=admin,o=org": \fIpassword entered\fR
1032 \fBExample 9 \fRUsing \fBview_policy\fR
1035 The following is an example of the use of the \fBview_policy\fR command.
1040 # \fBkdb5_ldap_util -D cn=admin,o=org -H ldaps://ldap-server1.mit.edu \e
1041 view_policy -r ATHENA.MIT.EDU \fItktpolicy\fR\fR
1042 Password for "cn=admin,o=org": \fIpassword entered\fR
1043 Ticket policy: tktpolicy
1044 Maximum ticket life: 0 days 01:00:00
1045 Maximum renewable life: 0 days 10:00:00
1046 Ticket flags: DISALLOW_FORWARDABLE REQUIRES_PWCHANGE
1052 \fBExample 10 \fRUsing \fBdestroy_policy\fR
1055 The following is an example of the use of the \fBdestroy_policy\fR command.
1060 # \fBkdb5_ldap_util -D cn=admin,o=org -H ldaps://ldap-server1.mit.edu \e
1061 destroy_policy -r ATHENA.MIT.EDU \fItktpolicy\fR\fR
1062 Password for "cn=admin,o=org": \fIpassword entered\fR
1063 This will delete the policy object 'tktpolicy', are you sure?
1064 (type 'yes' to confirm)? \fByes\fR
1065 ** policy object '\fItktpolicy\fR' deleted.
1071 \fBExample 11 \fRUsing \fBlist_policy\fR
1074 The following is an example of the use of the \fBlist_policy\fR command.
1079 # \fBkdb5_ldap_util -D cn=admin,o=org -H ldaps://ldap-server1.mit.edu \e
1080 list_policy -r ATHENA.MIT.EDU\fR
1081 Password for "cn=admin,o=org": \fIpassword entered\fR
1090 \fBExample 12 \fRUsing \fBsetsrvpw\fR
1093 The following is an example of the use of the \fBsetsrvpw\fR command.
1098 # \fBkdb5_ldap_util setsrvpw -D cn=admin,o=org setsrvpw \e
1099 -fileonly -f /home/andrew/conf_keyfile cn=service-kdc,o=org\fR
1100 Password for "cn=admin,o=org": \fIpassword entered\fR
1101 Password for "cn=service-kdc,o=org": \fIpassword entered\fR
1102 Re-enter password for "cn=service-kdc,o=org": \fIpassword re-entered\fR
1108 \fBExample 13 \fRUsing \fBcreate_service\fR
1111 The following is an example of the use of the \fBcreate_service\fR command.
1116 # \fBkdb5_ldap_util -D cn=admin,o=org create_service \e
1117 -kdc -randpw -f /home/andrew/conf_keyfile cn=service-kdc,o=org\fR
1118 Password for "cn=admin,o=org": \fIpassword entered\fR
1119 File does not exist. Creating the file /home/andrew/conf_keyfile...
1125 \fBExample 14 \fRUsing \fBmodify_service\fR
1128 The following is an example of the use of the \fBmodify_service\fR command.
1133 # \fBkdb5_ldap_util -D cn=admin,o=org modify_service \e
1134 -realm ATHENA.MIT.EDU cn=service-kdc,o=org\fR
1135 Password for "cn=admin,o=org": \fIpassword entered\fR
1136 Changing rights for the service object. Please wait ... done
1142 \fBExample 15 \fRUsing \fBview_service\fR
1145 The following is an example of the use of the \fBview_service\fR command.
1150 # \fBkdb5_ldap_util -D cn=admin,o=org view_service \e
1151 cn=service-kdc,o=org\fR
1152 Password for "cn=admin,o=org": \fIpassword entered\fR
1153 Service dn: cn=service-kdc,o=org
1156 Realm DN list: cn=ATHENA.MIT.EDU,cn=Kerberos,cn=Security
1162 \fBExample 16 \fRUsing \fBdestroy_service\fR
1165 The following is an example of the use of the \fBdestroy_service\fR command.
1170 # \fBkdb5_ldap_util -D cn=admin,o=org destroy_service \e
1171 cn=service-kdc,o=org\fR
1172 Password for "cn=admin,o=org": \fIpassword entered\fR
1173 This will delete the service object 'cn=service-kdc,o=org', are you sure?
1174 (type 'yes' to confirm)? \fByes\fR
1175 ** service object 'cn=service-kdc,o=org' deleted.
1181 \fBExample 17 \fRUsing \fBlist_service\fR
1184 The following is an example of the use of the \fBlist_service\fR command.
1189 # \fBkdb5_ldap_util -D cn=admin,o=org list_service\fR
1190 Password for "cn=admin,o=org": \fIpassword entered\fR
1191 cn=service-kdc,o=org
1192 cn=service-adm,o=org
1193 cn=service-pwd,o=org
1201 See \fBattributes\fR(5) for descriptions of the following attributes:
1209 ATTRIBUTE TYPE ATTRIBUTE VALUE
1211 Interface Stability Volatile
1217 \fBkinit\fR(1), \fBkadmin\fR(8), \fBkdc.conf\fR(4), \fBattributes\fR(5)