Linux and UNIX Man Pages

Linux & Unix Commands - Search Man Pages

afslog(1) [debian man page]

AFSLOG(1)						    BSD General Commands Manual 						 AFSLOG(1)

NAME
afslog -- obtain AFS tokens SYNOPSIS
afslog [-h | --help] [--no-v4] [--no-v5] [-u | --unlog] [-v | --verbose] [--version] [-c cell | --cell=cell] [-k realm | --realm=realm] [-P principal | --principal=principal] [-p path | --file=path] [cell | path ...] DESCRIPTION
afslog obtains AFS tokens for a number of cells. What cells to get tokens for can either be specified as an explicit list, as file paths to get tokens for, or be left unspecified, in which case afslog will use whatever magic krb_afslog(3) decides upon. Supported options: --no-v4 This makes afslog not try using Kerberos 4. --no-v5 This makes afslog not try using Kerberos 5. -P principal, --principal principal select what Kerberos 5 principal to use. --cache cache select what Kerberos 5 credential cache to use. --principal overrides this option. -u, --unlog Destroy tokens instead of obtaining new. If this is specified, all other options are ignored (except for --help and --version). -v, --verbose Adds more verbosity for what is actually going on. -c cell, --cell=cell This specified one or more cell names to get tokens for. -k realm, --realm=realm This is the Kerberos realm the AFS servers live in, this should normally not be specified. -p path, --file=path This specified one or more file paths for which tokens should be obtained. Instead of using -c and -p, you may also pass a list of cells and file paths after any other options. These arguments are considered files if they are either the strings ``.'' or ``..'' or they contain a slash, or if there exists a file by that name. EXAMPLES
Assuming that there is no file called ``openafs.org'' in the current directory, and that /afs/openafs.org points to that cell, the follwing should be identical: $ afslog -c openafs.org $ afslog openafs.org $ afslog /afs/openafs.org/some/file SEE ALSO
krb_afslog(3) HEIMDAL
November 26, 2002 HEIMDAL

Check Out this Related Man Page

KEYFILE(5)							AFS File Reference							KEYFILE(5)

NAME
KeyFile - Defines AFS server encryption keys DESCRIPTION
The KeyFile file defines the server encryption keys that the AFS server processes running on the machine use to decrypt the tickets presented by clients during the mutual authentication process. AFS server processes perform privileged actions only for clients that possess a ticket encrypted with one of the keys from the file. The file must reside in the /etc/openafs/server directory on every server machine. For more detailed information on mutual authentication and server encryption keys, see the OpenAFS Administration Guide. Each key has a corresponding a key version number that distinguishes it from the other keys. The tickets that clients present are also marked with a key version number to tell the server process which key to use to decrypt it. The KeyFile file must always include a key with the same key version number and contents as the key currently listed for the "afs/cell" principal in the associated Kerberos v5 realm or Authentication Database. (The principal "afs" may be used if the cell and realm names are the same, but adding the cell name to the principal is recommended even in this case. "afs" must be used as the principal name if the cell uses the Authentication Server rather than a Kerberos v5 realm.) The key must be a DES key; no stronger encryption type is supported. The KeyFile file is in binary format, so always use either the asetkey command or the appropriate commands from the bos command suite to administer it: o The asetkey add or bos addkey command to add a new key. o The asetkey list or bos listkeys command to display the keys. o The asetkey delete or bos removekey command to remove a key from the file. The asetkey commands must be run on the same server as the KeyFile file to update. The bos commands may be run remotely. Normally, new keys should be added from a Kerberos v5 keytab using asetkey add. bos addkey is normally only used if the Authentication Server is in use instead of a Kerberos v5 realm. In cells that use the Update Server to distribute the contents of the /etc/openafs/server directory, it is customary to edit only the copy of the file stored on the system control machine. Otherwise, edit the file on each server machine individually. CAUTIONS
The most common error caused by changes to KeyFile is to add a key that does not match the corresponding key for the Kerberos v5 principal or Authentication Server database entry. Both the key and the key version number must match the key for the corresponding principal, either "afs/cell" or "afs", in the Kerberos v5 realm or Authentication Database. For a Kerberos v5 realm, that principal must only have DES encryption types in the Kerberos KDC. In the unusual case of using bos addkey to add a key with a known password matching a password used to generate Kerberos v5 keys, the keys in the Kerberos v5 KDC database must use "afs3" salt, not the default Kerberos v5 salt. The salt doesn't matter for the more normal procedure of extracting a keytab and then adding the key using asetkey. SEE ALSO
asetkey(8), bos_addkey(8), bos_listkeys(8), bos_removekey(8), kas_setpassword(8), upclient(8), upserver(8) The OpenAFS Administration Guide at <http://docs.openafs.org/AdminGuide/>. COPYRIGHT
IBM Corporation 2000. <http://www.ibm.com/> All Rights Reserved. This documentation is covered by the IBM Public License Version 1.0. It was converted from HTML to POD by software written by Chas Williams and Russ Allbery, based on work by Alf Wachsmann and Elizabeth Cassell. OpenAFS 2012-03-26 KEYFILE(5)
Man Page