Deleted Added
full compact
kadmind.8 (76371) kadmind.8 (78527)
1.Dd June 7, 2000
2.Dt KADMIND 8
3.Os HEIMDAL
4.Sh NAME
5.Nm kadmind
6.Nd "server for administrative access to kerberos database"
7.Sh SYNOPSIS
8.Nm
9.Oo Fl c Ar file \*(Ba Xo
1.Dd June 7, 2000
2.Dt KADMIND 8
3.Os HEIMDAL
4.Sh NAME
5.Nm kadmind
6.Nd "server for administrative access to kerberos database"
7.Sh SYNOPSIS
8.Nm
9.Oo Fl c Ar file \*(Ba Xo
10.Fl -config-file= Ns Ar file Oc
10.Fl -config-file= Ns Ar file
11.Xc
11.Xc
12.Oc
12.Oo Fl k Ar file \*(Ba Xo
13.Oo Fl k Ar file \*(Ba Xo
13.Fl -key-file= Ns Ar file Oc
14.Fl -key-file= Ns Ar file
14.Xc
15.Xc
16.Oc
15.Op Fl -keytab= Ns Ar keytab
16.Oo Fl r Ar realm \*(Ba Xo
17.Op Fl -keytab= Ns Ar keytab
18.Oo Fl r Ar realm \*(Ba Xo
17.Fl -realm= Ns Ar realm Oc
19.Fl -realm= Ns Ar realm
18.Xc
20.Xc
21.Oc
19.Op Fl d | Fl -debug
20.Oo Fl p Ar port \*(Ba Xo
22.Op Fl d | Fl -debug
23.Oo Fl p Ar port \*(Ba Xo
21.Fl -ports= Ns Ar port Oc
24.Fl -ports= Ns Ar port
22.Xc
25.Xc
26.Oc
23.Sh DESCRIPTION
24.Nm
25listens for requests for changes to the Kerberos database and performs
26these, subject to permissions. When starting, if stdin is a socket it assumes that it has been started by
27.Xr inetd 8 ,
28otherwise it behaves as a daemon, forking processes for each new
29connection. The
30.Fl -debug

--- 4 unchanged lines hidden (view full) ---

35If built with krb4 support, it implements both the Heimdal Kerberos 5
36administrative protocol and the Kerberos 4 protocol. Password changes
37via the Kerberos 4 protocol are also performed by
38.Nm kadmind ,
39but the
40.Xr kpasswdd 8
41daemon is responsible for the Kerberos 5 password changing protocol
42(used by
27.Sh DESCRIPTION
28.Nm
29listens for requests for changes to the Kerberos database and performs
30these, subject to permissions. When starting, if stdin is a socket it assumes that it has been started by
31.Xr inetd 8 ,
32otherwise it behaves as a daemon, forking processes for each new
33connection. The
34.Fl -debug

--- 4 unchanged lines hidden (view full) ---

39If built with krb4 support, it implements both the Heimdal Kerberos 5
40administrative protocol and the Kerberos 4 protocol. Password changes
41via the Kerberos 4 protocol are also performed by
42.Nm kadmind ,
43but the
44.Xr kpasswdd 8
45daemon is responsible for the Kerberos 5 password changing protocol
46(used by
43.Xr kpasswd 1 ).
47.Xr kpasswd 1 )
48.
44.Pp
45This daemon should only be run on ther master server, and not on any
46slaves.
47.Pp
48Principals are always allowed to change their own password and list
49their own principals. Apart from that, doing any operation requires
50permission explicitly added in the ACL file
51.Pa /var/heimdal/kadmind.acl .

--- 81 unchanged lines hidden ---
49.Pp
50This daemon should only be run on ther master server, and not on any
51slaves.
52.Pp
53Principals are always allowed to change their own password and list
54their own principals. Apart from that, doing any operation requires
55permission explicitly added in the ACL file
56.Pa /var/heimdal/kadmind.acl .

--- 81 unchanged lines hidden ---