kadmind.8 (76371) | kadmind.8 (78527) |
---|---|
1.Dd June 7, 2000 2.Dt KADMIND 8 3.Os HEIMDAL 4.Sh NAME 5.Nm kadmind 6.Nd "server for administrative access to kerberos database" 7.Sh SYNOPSIS 8.Nm 9.Oo Fl c Ar file \*(Ba Xo | 1.Dd June 7, 2000 2.Dt KADMIND 8 3.Os HEIMDAL 4.Sh NAME 5.Nm kadmind 6.Nd "server for administrative access to kerberos database" 7.Sh SYNOPSIS 8.Nm 9.Oo Fl c Ar file \*(Ba Xo |
10.Fl -config-file= Ns Ar file Oc | 10.Fl -config-file= Ns Ar file |
11.Xc | 11.Xc |
12.Oc |
|
12.Oo Fl k Ar file \*(Ba Xo | 13.Oo Fl k Ar file \*(Ba Xo |
13.Fl -key-file= Ns Ar file Oc | 14.Fl -key-file= Ns Ar file |
14.Xc | 15.Xc |
16.Oc |
|
15.Op Fl -keytab= Ns Ar keytab 16.Oo Fl r Ar realm \*(Ba Xo | 17.Op Fl -keytab= Ns Ar keytab 18.Oo Fl r Ar realm \*(Ba Xo |
17.Fl -realm= Ns Ar realm Oc | 19.Fl -realm= Ns Ar realm |
18.Xc | 20.Xc |
21.Oc |
|
19.Op Fl d | Fl -debug 20.Oo Fl p Ar port \*(Ba Xo | 22.Op Fl d | Fl -debug 23.Oo Fl p Ar port \*(Ba Xo |
21.Fl -ports= Ns Ar port Oc | 24.Fl -ports= Ns Ar port |
22.Xc | 25.Xc |
26.Oc |
|
23.Sh DESCRIPTION 24.Nm 25listens for requests for changes to the Kerberos database and performs 26these, subject to permissions. When starting, if stdin is a socket it assumes that it has been started by 27.Xr inetd 8 , 28otherwise it behaves as a daemon, forking processes for each new 29connection. The 30.Fl -debug --- 4 unchanged lines hidden (view full) --- 35If built with krb4 support, it implements both the Heimdal Kerberos 5 36administrative protocol and the Kerberos 4 protocol. Password changes 37via the Kerberos 4 protocol are also performed by 38.Nm kadmind , 39but the 40.Xr kpasswdd 8 41daemon is responsible for the Kerberos 5 password changing protocol 42(used by | 27.Sh DESCRIPTION 28.Nm 29listens for requests for changes to the Kerberos database and performs 30these, subject to permissions. When starting, if stdin is a socket it assumes that it has been started by 31.Xr inetd 8 , 32otherwise it behaves as a daemon, forking processes for each new 33connection. The 34.Fl -debug --- 4 unchanged lines hidden (view full) --- 39If built with krb4 support, it implements both the Heimdal Kerberos 5 40administrative protocol and the Kerberos 4 protocol. Password changes 41via the Kerberos 4 protocol are also performed by 42.Nm kadmind , 43but the 44.Xr kpasswdd 8 45daemon is responsible for the Kerberos 5 password changing protocol 46(used by |
43.Xr kpasswd 1 ). | 47.Xr kpasswd 1 ) 48. |
44.Pp 45This daemon should only be run on ther master server, and not on any 46slaves. 47.Pp 48Principals are always allowed to change their own password and list 49their own principals. Apart from that, doing any operation requires 50permission explicitly added in the ACL file 51.Pa /var/heimdal/kadmind.acl . --- 81 unchanged lines hidden --- | 49.Pp 50This daemon should only be run on ther master server, and not on any 51slaves. 52.Pp 53Principals are always allowed to change their own password and list 54their own principals. Apart from that, doing any operation requires 55permission explicitly added in the ACL file 56.Pa /var/heimdal/kadmind.acl . --- 81 unchanged lines hidden --- |