06-13-2015
thanks robin, but the results files were back already. Is there anyway to read it from kerberos from rc2.d, if kerberos is there what will it look like.
8 More Discussions You Might Find Interesting
1. Shell Programming and Scripting
I am writing a script that needs to access various servers some of which are not ssh enabled. In order to access the ssh enabled servers I am using the following command to generate the public key :
ssh-keygen -t rsa
Is there a similar command for the other servers as well.
If I try to use... (1 Reply)
Discussion started by: ravneet123
1 Replies
2. Shell Programming and Scripting
I am writing a script which will execute commands on remote host only if they have a passwordless ssh setup. How do i check for that in my script (5 Replies)
Discussion started by: vickylife
5 Replies
3. Shell Programming and Scripting
Hi Experts,
Few more words to the title, both the servers are ssh enabled but I have read only access to the second server, so I cannot automate SFTP process using RSA/DSA keys.
I am using Control M to trigger the script and do not want any manual intervention to enter the password to complete... (4 Replies)
Discussion started by: nchourasiya
4 Replies
4. Solaris
Hi, FYI, I'm new in Solaris
I'm trying to use Kerberos on authenticating LDAP Client with the Active Directory on Windows Server 2003 on both Solaris 10 5/08 and Solaris 10 9/10 by referring to the pdf file kerberos_s10.pdf available at sun official site.
... (0 Replies)
Discussion started by: chongzh
0 Replies
5. Red Hat
Dear all
I am appearing for the RHCE exam next week (wish me luck). While training for the exam, i am supposed to configure the client to log on using an LDAP server that is also using TLS and Kerberos for authentication. Server setup is not included in the exam requirements only the client... (7 Replies)
Discussion started by: abohmeed
7 Replies
6. BSD
Hi,
in the log file there is line when the ticket is issued but when an user destroys the ticket there is no record.
Does someone have an idea? (0 Replies)
Discussion started by: gaspar
0 Replies
7. HP-UX
Hi,
I am getting this error during kerberos server setup in HPUX 11.31 :
kdb_create: unknown LDAP backend error while adding master entry to the database
ps -ef|grep ldap
root 3905 1 0 13:11:36 ? 0:00 /opt/ldapux/bin/ldapclientd
Unable to find out the meaning of this... (1 Reply)
Discussion started by: Amit Kulkarni
1 Replies
8. UNIX for Advanced & Expert Users
I'm authenticating with SSSD / Kerberos against Windows Server 2012 R2. I've setup credentails delegation using these options:
Host *
GSSAPIAuthentication yes
GSSAPIDelegateCredentials yes
GSSAPITrustDns yes
For both client/server but no luck. I've read online that I need to run... (2 Replies)
Discussion started by: Devyn
2 Replies
LEARN ABOUT CENTOS
ipa-rmkeytab
ipa-rmkeytab(1) IPA Manual Pages ipa-rmkeytab(1)
NAME
ipa-rmkeytab - Remove a kerberos principal from a keytab
SYNOPSIS
ipa-rmkeytab [ -p principal-name ] [ -k keytab-file ] [ -r realm ] [ -d ]
DESCRIPTION
Removes a kerberos principal from a keytab.
Kerberos keytabs are used for services (like sshd) to perform kerberos authentication. A keytab is a file with one or more secrets (or
keys) for a kerberos principal.
A kerberos service principal is a kerberos identity that can be used for authentication. Service principals contain the name of the ser-
vice, the hostname of the server, and the realm name.
ipa-rmkeytab provides two ways to remove principals. A specific principal can be removed or all principals for a given realm can be
removed.
All encryption types and versions of a principal are removed.
The realm may be included when removing a specific principal but it is not required.
NOTE: removing a principal from the keytab does not affect the Kerberos principal stored in the IPA server. It merely removes the entry
from the local keytab.
OPTIONS
-p principal-name
The non-realm part of the full principal name.
-k keytab-file
The keytab file to append the principal(s) from.
-r realm
A realm to remove all principals for.
-d Debug mode. Additional information is displayed.
EXAMPLES
Remove the NFS service principal on the host foo.example.com from /tmp/nfs.keytab.
# ipa-rmkeytab -p nfs/foo.example.com -k /tmp/nfs.keytab
Remove the ldap service principal on the host foo.example.com from /etc/krb5.keytab.
# ipa-rmkeytab -p ldap/foo.example.com -k /etc/krb5.keytab
Remove all principals for the realm EXAMPLE.COM.
# ipa-rmkeytab -r EXAMPLE.COM -k /etc/krb5.keytab
EXIT STATUS
The exit status is 0 on success, nonzero on error.
1 Kerberos initialization failed
2 Memory allocation error
3 Unable to open keytab
4 Unable to parse the principal name
5 Principal name or realm not found in keytab
6 Unable to remove principal from keytab
IPA
Oct 30 2009 ipa-rmkeytab(1)