/ kadmin / kadmin.8
kadmin.8
  1  .\" Copyright (c) 2000 - 2007 Kungliga Tekniska Högskolan
  2  .\" (Royal Institute of Technology, Stockholm, Sweden).
  3  .\" All rights reserved.
  4  .\"
  5  .\" Redistribution and use in source and binary forms, with or without
  6  .\" modification, are permitted provided that the following conditions
  7  .\" are met:
  8  .\"
  9  .\" 1. Redistributions of source code must retain the above copyright
 10  .\"    notice, this list of conditions and the following disclaimer.
 11  .\"
 12  .\" 2. Redistributions in binary form must reproduce the above copyright
 13  .\"    notice, this list of conditions and the following disclaimer in the
 14  .\"    documentation and/or other materials provided with the distribution.
 15  .\"
 16  .\" 3. Neither the name of the Institute nor the names of its contributors
 17  .\"    may be used to endorse or promote products derived from this software
 18  .\"    without specific prior written permission.
 19  .\"
 20  .\" THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
 21  .\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
 22  .\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
 23  .\" ARE DISCLAIMED.  IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
 24  .\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
 25  .\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
 26  .\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
 27  .\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
 28  .\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
 29  .\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
 30  .\" SUCH DAMAGE.
 31  .\"
 32  .\" $Id$
 33  .\"
 34  .Dd Feb  22, 2007
 35  .Dt KADMIN 8
 36  .Os HEIMDAL
 37  .Sh NAME
 38  .Nm kadmin
 39  .Nd Kerberos administration utility
 40  .Sh SYNOPSIS
 41  .Nm
 42  .Bk -words
 43  .Op Fl p Ar string \*(Ba Fl Fl principal= Ns Ar string
 44  .Op Fl K Ar string \*(Ba Fl Fl keytab= Ns Ar string
 45  .Op Fl c Ar file \*(Ba Fl Fl config-file= Ns Ar file
 46  .Op Fl k Ar file \*(Ba Fl Fl key-file= Ns Ar file
 47  .Op Fl r Ar realm \*(Ba Fl Fl realm= Ns Ar realm
 48  .Op Fl a Ar host \*(Ba Fl Fl admin-server= Ns Ar host
 49  .Op Fl s Ar port number \*(Ba Fl Fl server-port= Ns Ar port number
 50  .Op Fl l | Fl Fl local
 51  .Op Fl h | Fl Fl help
 52  .Op Fl v | Fl Fl version
 53  .Op Ar command
 54  .Ek
 55  .Sh DESCRIPTION
 56  The
 57  .Nm
 58  program is used to make modifications to the Kerberos database, either remotely via the
 59  .Xr kadmind 8
 60  daemon, or locally (with the
 61  .Fl l
 62  option).
 63  .Pp
 64  Supported options:
 65  .Bl -tag -width Ds
 66  .It Fl p Ar string , Fl Fl principal= Ns Ar string
 67  principal to authenticate as
 68  .It Fl K Ar string , Fl Fl keytab= Ns Ar string
 69  keytab for authentication principal
 70  .It Fl c Ar file , Fl Fl config-file= Ns Ar file
 71  location of config file
 72  .It Fl k Ar file , Fl Fl key-file= Ns Ar file
 73  location of master key file
 74  .It Fl r Ar realm , Fl Fl realm= Ns Ar realm
 75  realm to use
 76  .It Fl a Ar host , Fl Fl admin-server= Ns Ar host
 77  server to contact
 78  .It Fl s Ar port number , Fl Fl server-port= Ns Ar port number
 79  port to use
 80  .It Fl l , Fl Fl local
 81  local admin mode
 82  .El
 83  .Pp
 84  If no
 85  .Ar command
 86  is given on the command line,
 87  .Nm
 88  will prompt for commands to process. Some of the commands that take
 89  one or more principals as argument
 90  .Ns ( Nm delete ,
 91  .Nm ext_keytab ,
 92  .Nm get ,
 93  .Nm modify ,
 94  and
 95  .Nm passwd )
 96  will accept a glob style wildcard, and perform the operation on all
 97  matching principals.
 98  .Pp
 99  Commands include:
100  .\" not using a list here, since groff apparently gets confused
101  .\" with nested Xo/Xc
102  .Pp
103  .Nm add
104  .Op Fl r | Fl Fl random-key
105  .Op Fl Fl random-password
106  .Op Fl p Ar string \*(Ba Fl Fl password= Ns Ar string
107  .Op Fl Fl key= Ns Ar string
108  .Op Fl Fl max-ticket-life= Ns Ar lifetime
109  .Op Fl Fl max-renewable-life= Ns Ar lifetime
110  .Op Fl Fl attributes= Ns Ar attributes
111  .Op Fl Fl expiration-time= Ns Ar time
112  .Op Fl Fl pw-expiration-time= Ns Ar time
113  .Ar principal...
114  .Bd -ragged -offset indent
115  Adds a new principal to the database. The options not passed on the
116  command line will be promped for.
117  .Ed
118  .Pp
119  .Nm add_enctype
120  .Op Fl r | Fl Fl random-key
121  .Ar principal enctypes...
122  .Pp
123  .Bd -ragged -offset indent
124  Adds a new encryption type to the principal, only random key are
125  supported.
126  .Ed
127  .Pp
128  .Nm delete
129  .Ar principal...
130  .Bd -ragged -offset indent
131  Removes a principal.
132  .Ed
133  .Pp
134  .Nm del_enctype
135  .Ar principal enctypes...
136  .Bd -ragged -offset indent
137  Removes some enctypes from a principal; this can be useful if the
138  service belonging to the principal is known to not handle certain
139  enctypes.
140  .Ed
141  .Pp
142  .Nm ext_keytab
143  .Oo Fl k Ar string \*(Ba Xo
144  .Fl Fl keytab= Ns Ar string
145  .Xc
146  .Oc
147  .Ar principal...
148  .Bd -ragged -offset indent
149  Creates a keytab with the keys of the specified principals.  Requires
150  get-keys rights.
151  .Ed
152  .Pp
153  .Nm get
154  .Op Fl l | Fl Fl long
155  .Op Fl s | Fl Fl short
156  .Op Fl t | Fl Fl terse
157  .Op Fl o Ar string | Fl Fl column-info= Ns Ar string
158  .Ar principal...
159  .Bd -ragged -offset indent
160  Lists the matching principals, short prints the result as a table,
161  while long format produces a more verbose output. Which columns to
162  print can be selected with the
163  .Fl o
164  option. The argument is a comma separated list of column names
165  optionally appended with an equal sign
166  .Pq Sq =
167  and a column header. Which columns are printed by default differ
168  slightly between short and long output.
169  .Pp
170  The default terse output format is similar to
171  .Fl s o Ar principal= ,
172  just printing the names of matched principals.
173  .Pp
174  Possible column names include:
175  .Li principal ,
176  .Li princ_expire_time ,
177  .Li pw_expiration ,
178  .Li last_pwd_change ,
179  .Li max_life ,
180  .Li max_rlife ,
181  .Li mod_time ,
182  .Li mod_name ,
183  .Li attributes ,
184  .Li kvno ,
185  .Li mkvno ,
186  .Li last_success ,
187  .Li last_failed ,
188  .Li fail_auth_count ,
189  .Li policy ,
190  and
191  .Li keytypes .
192  .Ed
193  .Pp
194  .Nm modify
195  .Oo Fl a Ar attributes \*(Ba Xo
196  .Fl Fl attributes= Ns Ar attributes
197  .Xc
198  .Oc
199  .Op Fl Fl max-ticket-life= Ns Ar lifetime
200  .Op Fl Fl max-renewable-life= Ns Ar lifetime
201  .Op Fl Fl expiration-time= Ns Ar time
202  .Op Fl Fl pw-expiration-time= Ns Ar time
203  .Op Fl Fl kvno= Ns Ar number
204  .Ar principal...
205  .Bd -ragged -offset indent
206  Modifies certain attributes of a principal. If run without command
207  line options, you will be prompted. With command line options, it will
208  only change the ones specified.
209  .Pp
210  Possible attributes are:
211  .Li new-princ ,
212  .Li support-desmd5 ,
213  .Li pwchange-service ,
214  .Li disallow-svr ,
215  .Li requires-pw-change ,
216  .Li requires-hw-auth ,
217  .Li requires-pre-auth ,
218  .Li disallow-all-tix ,
219  .Li disallow-dup-skey ,
220  .Li disallow-proxiable ,
221  .Li disallow-renewable ,
222  .Li disallow-tgt-based ,
223  .Li disallow-forwardable ,
224  .Li disallow-postdated
225  .Pp
226  Attributes may be negated with a "-", e.g.,
227  .Pp
228  kadmin -l modify -a -disallow-proxiable user
229  .Ed
230  .Pp
231  .Nm passwd
232  .Op Fl Fl keepold
233  .Op Fl r | Fl Fl random-key
234  .Op Fl Fl random-password
235  .Oo Fl p Ar string \*(Ba Xo
236  .Fl Fl password= Ns Ar string
237  .Xc
238  .Oc
239  .Op Fl Fl key= Ns Ar string
240  .Ar principal...
241  .Bd -ragged -offset indent
242  Changes the password of an existing principal.
243  .Ed
244  .Pp
245  .Nm password-quality
246  .Ar principal
247  .Ar password
248  .Bd -ragged -offset indent
249  Run the password quality check function locally.
250  You can run this on the host that is configured to run the kadmind
251  process to verify that your configuration file is correct.
252  The verification is done locally, if kadmin is run in remote mode,
253  no rpc call is done to the server.
254  .Ed
255  .Pp
256  .Nm privileges
257  .Bd -ragged -offset indent
258  Lists the operations you are allowed to perform. These include
259  .Li add ,
260  .Li add_enctype ,
261  .Li change-password ,
262  .Li delete ,
263  .Li del_enctype ,
264  .Li get ,
265  .Li get-keys ,
266  .Li list ,
267  and
268  .Li modify .
269  .Ed
270  .Pp
271  .Nm rename
272  .Ar from to
273  .Bd -ragged -offset indent
274  Renames a principal. This is normally transparent, but since keys are
275  salted with the principal name, they will have a non-standard salt,
276  and clients which are unable to cope with this will fail. Kerberos 4
277  suffers from this.
278  .Ed
279  .Pp
280  .Nm check
281  .Op Ar realm
282  .Pp
283  .Bd -ragged -offset indent
284  Check database for strange configurations on important principals. If
285  no realm is given, the default realm is used.
286  .Ed
287  .Pp
288  When running in local mode, the following commands can also be used:
289  .Pp
290  .Nm dump
291  .Op Fl d | Fl Fl decrypt
292  .Op Ar dump-file
293  .Bd -ragged -offset indent
294  Writes the database in
295  .Dq human readable
296  form to the specified file, or standard out. If the database is
297  encrypted, the dump will also have encrypted keys, unless
298  .Fl Fl decrypt
299  is used.
300  .Ed
301  .Pp
302  .Nm init
303  .Op Fl Fl realm-max-ticket-life= Ns Ar string
304  .Op Fl Fl realm-max-renewable-life= Ns Ar string
305  .Ar realm
306  .Bd -ragged -offset indent
307  Initializes the Kerberos database with entries for a new realm. It's
308  possible to have more than one realm served by one server.
309  .Ed
310  .Pp
311  .Nm load
312  .Ar file
313  .Bd -ragged -offset indent
314  Reads a previously dumped database, and re-creates that database from
315  scratch.
316  .Ed
317  .Pp
318  .Nm merge
319  .Ar file
320  .Bd -ragged -offset indent
321  Similar to
322  .Nm load
323  but just modifies the database with the entries in the dump file.
324  .Ed
325  .Pp
326  .Nm stash
327  .Oo Fl e Ar enctype \*(Ba Xo
328  .Fl Fl enctype= Ns Ar enctype
329  .Xc
330  .Oc
331  .Oo Fl k Ar keyfile \*(Ba Xo
332  .Fl Fl key-file= Ns Ar keyfile
333  .Xc
334  .Oc
335  .Op Fl -convert-file
336  .Op Fl -master-key-fd= Ns Ar fd
337  .Op Fl -random-password
338  .Op Fl -no-print-password
339  .Pp
340  .Bd -ragged -offset indent
341  Writes the Kerberos master key to a file used by the KDC.
342  .Ed
343  .\".Sh ENVIRONMENT
344  .\".Sh FILES
345  .\".Sh EXAMPLES
346  .\".Sh DIAGNOSTICS
347  .Sh SEE ALSO
348  .Xr kadmind 8 ,
349  .Xr kdc 8
350  .\".Sh STANDARDS
351  .\".Sh HISTORY
352  .\".Sh AUTHORS
353  .\".Sh BUGS