freebsd-dev/crypto/heimdal/kadmin/kadmind.8

156 lines
3.2 KiB
Groff
Raw Normal View History

.\" $Id: kadmind.8,v 1.10.2.1 2002/10/21 14:53:39 joda Exp $
.\"
.Dd March 5, 2002
2001-02-13 16:46:19 +00:00
.Dt KADMIND 8
.Os HEIMDAL
.Sh NAME
.Nm kadmind
2001-05-08 14:57:13 +00:00
.Nd "server for administrative access to kerberos database"
2001-02-13 16:46:19 +00:00
.Sh SYNOPSIS
.Nm
.Oo Fl c Ar file \*(Ba Xo
2001-06-21 02:12:07 +00:00
.Fl -config-file= Ns Ar file
2001-02-13 16:46:19 +00:00
.Xc
2001-06-21 02:12:07 +00:00
.Oc
2001-02-13 16:46:19 +00:00
.Oo Fl k Ar file \*(Ba Xo
2001-06-21 02:12:07 +00:00
.Fl -key-file= Ns Ar file
2001-02-13 16:46:19 +00:00
.Xc
2001-06-21 02:12:07 +00:00
.Oc
2001-02-13 16:46:19 +00:00
.Op Fl -keytab= Ns Ar keytab
.Oo Fl r Ar realm \*(Ba Xo
2001-06-21 02:12:07 +00:00
.Fl -realm= Ns Ar realm
2001-02-13 16:46:19 +00:00
.Xc
2001-06-21 02:12:07 +00:00
.Oc
2001-02-13 16:46:19 +00:00
.Op Fl d | Fl -debug
.Oo Fl p Ar port \*(Ba Xo
2001-06-21 02:12:07 +00:00
.Fl -ports= Ns Ar port
2001-02-13 16:46:19 +00:00
.Xc
2001-06-21 02:12:07 +00:00
.Oc
.Op Fl -no-kerberos4
2001-02-13 16:46:19 +00:00
.Sh DESCRIPTION
.Nm
listens for requests for changes to the Kerberos database and performs
these, subject to permissions. When starting, if stdin is a socket it
assumes that it has been started by
2001-02-13 16:46:19 +00:00
.Xr inetd 8 ,
otherwise it behaves as a daemon, forking processes for each new
connection. The
2001-02-13 16:46:19 +00:00
.Fl -debug
option causes
2001-02-13 16:46:19 +00:00
.Nm
to accept exactly one connection, which is useful for debugging.
2001-05-08 14:57:13 +00:00
.Pp
2001-02-13 16:46:19 +00:00
If built with krb4 support, it implements both the Heimdal Kerberos 5
administrative protocol and the Kerberos 4 protocol. Password changes
via the Kerberos 4 protocol are also performed by
.Nm kadmind ,
but the
.Xr kpasswdd 8
2001-02-13 16:46:19 +00:00
daemon is responsible for the Kerberos 5 password changing protocol
(used by
2001-06-21 02:12:07 +00:00
.Xr kpasswd 1 )
.
2001-02-13 16:46:19 +00:00
.Pp
This daemon should only be run on ther master server, and not on any
slaves.
.Pp
Principals are always allowed to change their own password and list
their own principal. Apart from that, doing any operation requires
2001-02-13 16:46:19 +00:00
permission explicitly added in the ACL file
.Pa /var/heimdal/kadmind.acl .
The format of this file is:
.Bd -ragged
.Va principal
.Va rights
.Op Va principal-pattern
.Ed
.Pp
Where rights is any (comma separated) combination of:
.Bl -bullet -compact
2001-02-13 16:46:19 +00:00
.It
change-password or cpw
2001-02-13 16:46:19 +00:00
.It
list
.It
delete
.It
modify
.It
add
.It
get
.It
all
.El
.Pp
And the optional
.Ar principal-pattern
restricts the rights to operations on principals that match the
glob-style pattern.
2001-02-13 16:46:19 +00:00
.Pp
Supported options:
.Bl -tag -width Ds
.It Xo
.Fl c Ar file ,
2001-02-13 16:46:19 +00:00
.Fl -config-file= Ns Ar file
.Xc
location of config file
.It Xo
.Fl k Ar file ,
2001-02-13 16:46:19 +00:00
.Fl -key-file= Ns Ar file
.Xc
location of master key file
.It Xo
.Fl -keytab= Ns Ar keytab
.Xc
what keytab to use
.It Xo
.Fl r Ar realm ,
2001-02-13 16:46:19 +00:00
.Fl -realm= Ns Ar realm
.Xc
realm to use
.It Xo
.Fl d ,
2001-02-13 16:46:19 +00:00
.Fl -debug
.Xc
enable debugging
.It Xo
.Fl p Ar port ,
2001-02-13 16:46:19 +00:00
.Fl -ports= Ns Ar port
.Xc
ports to listen to. By default, if run as a daemon, it listen to ports
749, and 751 (if Kerberos 4 support is built and enabled), but you can
add any number of ports with this option. The port string is a
whitespace separated list of port specifications, with the special
string
2001-02-13 16:46:19 +00:00
.Dq +
representing the default set of ports.
.It Fl -no-kerberos4
make
.Nm
ignore Kerberos 4 kadmin requests.
2001-02-13 16:46:19 +00:00
.El
.\".Sh ENVIRONMENT
.Sh FILES
.Pa /var/heimdal/kadmind.acl
.Sh EXAMPLES
This will cause
.Nm
to listen to port 4711 in addition to any
2001-02-13 16:46:19 +00:00
compiled in defaults:
.Pp
.D1 Nm Fl -ports Ns Li "=\*[q]+ 4711\*[q] &"
.Pp
This acl file will grant Joe all rights, and allow Mallory to view and
add host principals.
.Bd -literal -offset indent
joe/admin@EXAMPLE.COM all
mallory/admin@EXAMPLE.COM add,get host/*@EXAMPLE.COM
.Ed
2001-02-13 16:46:19 +00:00
.\".Sh DIAGNOSTICS
.Sh SEE ALSO
.Xr kpasswd 1 ,
.Xr kadmin 8 ,
.Xr kdc 8 ,
.Xr kpasswdd 8