2 .\" Copyright 1987, 1989 by the Student Information Processing Board of the Massachusetts Institute of Technology. For copying and distribution information, please see the file kerberosv5/mit-sipb-copyright.h.
3 .\" Portions Copyright (c) 2004, Sun Microsystems, Inc. All Rights Reserved
4 .\" The contents of this file are subject to the terms of the Common Development and Distribution License (the "License"). You may not use this file except in compliance with the License.
5 .\" You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE or http://www.opensolaris.org/os/licensing. See the License for the specific language governing permissions and limitations under the License.
6 .\" When distributing Covered Code, include this CDDL HEADER in each file and include the License file at usr/src/OPENSOLARIS.LICENSE. If applicable, add the following below this CDDL HEADER, with the fields enclosed by brackets "[]" replaced with your own identifying information: Portions Copyright [yyyy] [name of copyright owner]
7 .TH KLIST 1 "Nov 16, 2006"
9 klist \- list currently held Kerberos tickets
13 \fB/usr/bin/klist\fR [\fB-e\fR]
14 [ [\fB-c\fR] [\fB-f\fR] [\fB-s\fR] [\fB-a\fR [\fB-n\fR]] [\fIcache_name\fR]]
15 [\fB-k\fR [\fB-t\fR] [\fB-K\fR] [\fIkeytab_file\fR]]
21 The \fBklist\fR utility prints the name of the credentials cache, the identity
22 of the principal that the tickets are for (as listed in the ticket file), and
23 the principal names of all Kerberos tickets currently held by the user, along
24 with the issue and expiration time for each authenticator. Principal names are
25 listed in the form \fIname\fR\fB/\fR\fIinstance\fR\fB@\fR\fIrealm\fR, with
26 the '\fB/\fR' omitted if the instance is not included, and the '\fB@\fR' omitted if
27 the realm is not included.
30 If \fIcache_file\fR or \fIkeytab_name\fR is not specified, \fBklist\fR displays
31 the credentials in the default credentials cache or keytab files as
32 appropriate. By default, your ticket is stored in the file
33 \fB/tmp/krb5cc_\fIuid\fR\fR, where \fIuid\fR is the current user-ID of the
38 The following options are supported:
45 Displays list of addresses in credentials. Uses the configured nameservice to
46 translate numeric network addresses to the associated hostname if possible.
52 \fB\fB-c\fR [\fIcache_name\fR]\fR
55 Lists tickets held in a credentials cache. This is the default if neither
56 \fB-c\fR nor \fB-k\fR is specified.
65 Displays the encryption types of the session key and the ticket for each
66 credential in the credential cache, or each key in the keytab file.
75 Shows the flags present in the credentials, using the following abbreviations:
136 Hardware authenticated
199 Transit policy checked
207 \fB\fB-k\fR [\fIkeytab_file\fR]\fR
210 List keys held in a \fBkeytab\fR file.
219 Displays the value of the encryption key in each keytab entry in the keytab
229 Shows numeric \fBIP\fR addresses instead of reverse-resolving addresses. Only
230 valid with \fB-a\fR option.
239 Causes \fBklist\fR to run silently (produce no output), but to still set the
240 exit status according to whether it finds the credentials cache. The exit
241 status is \fB0\fR if \fBklist\fR finds a credentials cache, and `\fB1\fRif it
242 does not, or if the local-realm TGT has expired.
251 Displays the time entry timestamps for each keytab entry in the keytab file.
254 .SH ENVIRONMENT VARIABLES
257 \fBklist\fR uses the following environment variable:
261 \fB\fBKRB5CCNAME\fR\fR
264 Location of the credentials (ticket) cache. See \fBkrb5envvar\fR(5) for syntax
272 \fB\fB/tmp/krb5cc_\fIuid\fR\fR\fR
275 Default credentials cache (\fIuid\fR is the decimal \fBUID\fR of the user).
281 \fB\fB/etc/krb5/krb5.keytab\fR\fR
284 Default location for the local host's \fBkeytab\fR file.
290 \fB\fB/etc/krb5/krb5.conf\fR\fR
293 Default location for the local host's configuration file. See
300 See \fBattributes\fR(5) for descriptions of the following attributes:
308 ATTRIBUTE TYPE ATTRIBUTE VALUE
310 Interface Stability See below.
315 The command arguments are Evolving. The command output is Unstable.
319 \fBkdestroy\fR(1), \fBkinit\fR(1), \fBkrb5.conf\fR(4), \fBattributes\fR(5),
320 \fBkrb5envvar\fR(5), \fBkerberos\fR(5)
324 When reading a file as a service key file, very little error checking is