2 .\" Copyright (c) 1998, Sun Microsystems, Inc. All Rights Reserved
3 .\" The contents of this file are subject to the terms of the Common Development and Distribution License (the "License"). You may not use this file except in compliance with the License.
4 .\" You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE or http://www.opensolaris.org/os/licensing. See the License for the specific language governing permissions and limitations under the License.
5 .\" When distributing Covered Code, include this CDDL HEADER in each file and include the License file at usr/src/OPENSOLARIS.LICENSE. If applicable, add the following below this CDDL HEADER, with the fields enclosed by brackets "[]" replaced with your own identifying information: Portions Copyright [yyyy] [name of copyright owner]
6 .TH GSSCRED 8 "Feb 11, 2004"
8 gsscred \- add, remove, and list gsscred table entries
12 \fBgsscred\fR [\fB-n\fR \fIuser\fR [\fB-o\fR \fIoid\fR] [\fB-u\fR \fIuid\fR]] [\fB-c\fR \fIcomment\fR] \fB-m\fR \fImech\fR \fB-a\fR
17 \fBgsscred\fR [\fB-n\fR \fIuser\fR [\fB-o\fR \fIoid\fR]] [\fB-u\fR \fIuid\fR] [\fB-m\fR \fImech\fR] \fB-r\fR
22 \fBgsscred\fR [\fB-n\fR \fIuser\fR [\fB-o\fR \fIoid\fR]] [\fB-u\fR \fIuid\fR] [\fB-m\fR \fImech\fR] \fB-l\fR
28 The \fBgsscred\fR utility is used to create and maintain a mapping between a
29 security principal name and a local UNIX \fIuid\fR. The format of the user name
30 is assumed to be \fBGSS_C_NT_USER_NAME\fR. You can use the \fB-o\fR option to
31 specify the object identifier of the \fIname\fR type. The \fBOID\fR must be
32 specified in dot-separated notation, for example: \fB1.2.3.45464.3.1\fR
35 The \fBgsscred\fR table is used on server machines to lookup the \fIuid\fR of
36 incoming clients connected using \fBRPCSEC_GSS\fR.
39 When adding users, if no \fIuser\fR name is specified, an entry is created in
40 the table for each user from the \fBpasswd\fR table. If no \fIcomment\fR is
41 specified, the \fBgsscred\fR utility inserts a comment that specifies the user
42 name as an \fBASCII\fR string and the \fBGSS-API\fRsecurity mechanism that
43 applies to it. The security mechanism will be in string representation as
44 defined in the \fB/etc/gss/mech\fR file.
47 The parameters are interpreted the same way by the \fBgsscred\fR utility to
48 delete users as they are to create users. At least one of the following options
49 must be specified: \fB-n\fR, \fB-u\fR, or \fB-m\fR. If no security mechanism is
50 specified, then all entries will be deleted for the user identified by either
51 the \fIuid\fR or \fIuser\fR name. If only the security mechanism is specified,
52 then all \fIuser\fR entries for that security mechanism will be deleted.
55 Again, the parameters are interpreted the same way by the \fBgsscred\fR utility
56 to search for users as they are to create users. If no options are specified,
57 then the entire table is returned. If the \fIuser\fR name or \fIuid\fR is
58 specified, then all entries for that \fIuser\fR are returned. If a security
59 mechanism is specified, then all \fIuser\fR entries for that security mechanism
74 \fB\fB-c\fR \fIcomment\fR\fR
77 Insert comment about this table entry.
86 Search table for entry.
92 \fB\fB-m\fR \fImech\fR\fR
95 Specify the mechanism for which this name is to be translated.
101 \fB\fB-n\fR \fIuser\fR\fR
104 Specify the optional principal name.
110 \fB\fB-o\fR \fIoid\fR\fR
113 Specify the OID indicating the name type of the user.
122 Remove the entry from the table.
128 \fB\fB-u\fR \fIuid\fR\fR
131 Specify the \fIuid\fR for the \fIuser\fR if the \fIuser\fR is not local.
136 \fBExample 1 \fRCreating a \fBgsscred\fR Table for the Kerberos v5 Security
140 The following shows how to create a \fBgsscred\fR table for the kerberos v5
141 security mechanism. \fBgsscred\fR obtains \fIuser\fR names and \fIuid\fR's from
142 the \fBpasswd\fR table to populate the table.
147 example% \fBgsscred -m kerberos_v5 -a\fR
153 \fBExample 2 \fRAdding an Entry for \fBroot/host1\fR for the Kerberos v5
157 The following shows how to add an entry for \fBroot/host1\fR with a specified
158 \fIuid\fR of \fB0\fR for the kerberos v5 security mechanism.
163 example% \fBgsscred -m kerberos_v5 -n root/host1 -u 0 -a\fR
169 \fBExample 3 \fRListing All User Mappings for the Kerberos v5 Security
173 The following lists all user mappings for the kerberos v5 security mechanism.
178 example% \fBgsscred -m kerberos_v5 -l\fR
184 \fBExample 4 \fRListing All Mappings for All Security Mechanism for a Specified
188 The following lists all mappings for all security mechanisms for the user
194 example% \fBgsscred -n bsimpson -l\fR
202 The following exit values are returned:
209 Successful completion.
224 See \fBattributes\fR(5) for descriptions of the following attributes:
232 ATTRIBUTE TYPE ATTRIBUTE VALUE
234 Interface Stability Evolving
240 \fBgssd\fR(1m), \fBgsscred.conf\fR(4), \fBattributes\fR(5)
244 Some GSS mechanisms, such as \fBkerberos_v5\fR, provide their own
245 authenticated-name-to-local-name (uid) mapping and thus do not usually have to
246 be mapped using \fBgsscred\fR. See \fBgsscred.conf\fR(4) for more information.