Linux and UNIX Man Pages

Linux & Unix Commands - Search Man Pages

kadmin_util(8) [osx man page]

kadmin_util(8)						    BSD System Manager's Manual 					    kadmin_util(8)

NAME
kadmin_util -- Kerberos -- Open Directory Single Sign On SYNOPSIS
kadmin_util -a principal_name -d principal_name [-r REALM] [-h] [-p] [-v debug_level] DESCRIPTION
kadmin_util is a tool for managing the access control list used by kadmind to control which users have the ability to modify the Kerberos database of user information. It will look at the acl_file item in the realm section of the kdc config file to determine which acl files to update. -a principal_name Adds the given principal name to the acl file with administrator privs. -d principal_name Removes the given principal name from the acl. (-a & -d are mutually exclusinve) -h Send a HUP signal to kadmind if the update completes without errors -p Write the output error to standard out in an XML Plist format -r REALM Denotes which realm to update. If this parameter is omitted, kadmin_util will operate on the first realm it finds in the kdc config file. To operate on all the available realms use '*' for the realm name -v debug_level Sets the debug level (1 = progress >1 for more detail) EXAMPLES
To add adminuser@REALM.COM to the acl file as kerberos administrator for realm REALM.COM kadmin_util -a adminuser@REALM.COM -r REALM.COM To remove adminuser@REALM.COM from all the realms serviced by this kdc (you need the quotes around the * to keep the shell from substituting filenames) kadmin_util -d adminuser@REALM.COM -r '*' FILES
/var/db/krb5kdc/kadm5.acl the standard acl file location /var/db/krb5kdc/kdc.conf the default kdc config file DIAGNOSTICS
You can add -v debug_level to any kadmin_util command. Debug level 1 provides status information, higher levels add progressivly more levels of detail. NOTES
The kadmin_util tool is used by the Apple Single Sign On system to set up a KDC integrated with the rest of the Single Sign On components. SEE ALSO
DirectoryService(1), kerberos(1), kadmind(8), kerberosautoconfig(8), krbservicesetup(8), krb5kdc(8), sso_util(8) Darwin June 2, 2019 Darwin

Check Out this Related Man Page

sso_util(8)						    BSD System Manager's Manual 					       sso_util(8)

NAME
sso_util -- Kerberos -- Open Directory Single Sign On SYNOPSIS
sso_util command [-args] DESCRIPTION
sso_util is a tool for setting up, interrogating and removing Kerberos configurations within the Apple Single Sign On environment. This tool can configure services, create and consume encrypted config records and tear down Kerberos installations Commands for sso_util : info [-p] [-g | -l | -L | -r dir_node_path [dir_node_path]] Returns information about the current Single Sign On environment info command arguments: -p Returns the data in XML format -g Returns the default Kerberos realm name -l Returns a list of the services sso_util knows how to Kerberize -L Returns the default Kerberos log file paths -r dir_node_path Returns whether or not the given node has a Kerberos record associated with it. If it does, it returns the default realm name. If dir_node_path is '.' (default) it also returns all the realm names available on the search path dir_node_path specifies the directory node in which to search for the computer record configure -r REALM -a admin_name [-p password] service Configures Kerberized services on the local machine for the given realm configure command arguments: -r REALM Kerberos realm for the service principals -a admin_name Account name of an administrator authorized to make changes in the Kerberos database -p password Password for the above administrator. The password can also be stored in a file and the path to the file can be passed as an environment variable - SSO_PASSWD_PATH. service Service can be any number of afp, ftp, imap, pop, smtp, ssh, fcsvr, DNS, or all useconfig [-u] [-R record_name] [-f dir_node_path] -a admin_name [-p password] Uses a secure config record to configure a server for Kerberos configure command arguments: -u Forces the update, ignoring that the update may already have been installed -R record_name Name of the Computer record containing the secure config record -f dir_node_path Specifies the directory node in which to find the given computer record -a admin_name Account name of an user authorized to use the secure config record (see generateconfig) -p password Password for the above user. The password can also be stored in a file and the path to the file can be passed as an envi- ronment variable - SSO_PASSWD_PATH. EXAMPLES
To configure a server in realm FOO.COM when you have the Kerberos administrator's password. Store the password in a file and set env var SSO_PASSWD_PATH to the file path sso_util configure -r FOO.COM -a kerberos_admin all To create a secure config record to allow the delegated administrators, Fred and Barney, to configure a server named fred.foo.com in realm FOO.COM (using an existing computer record). The Open Directory Master for foo.com is odmaster.foo.com. This can be run on any server and neither Fred nor Barney need to have the Kerberos administrator's password. Store the password in a file and set env var SSO_PASSWD_PATH to the file path. sso_util generateconfig -r FOO.COM -R fred.foo.com -f /LDAPv3/odmaster.foo.com -U Fred,Barney -a kerberos_admin all To use the secure config record to allow Barney to configure the server named fred.foo.com. Store the password in a file and set env var SSO_PASSWD_PATH to the file path. sso_util useconfig -R fred.foo.com -f /LDAPv3/odmaster.foo.com -a Barney FILES
/etc/krb5.keytab The configure and useconfig commands create or modify the krb5.keytab file. DIAGNOSTICS
You can add -v debug_level to any of the sso_util commands. Debug level 1 provides status information, higher levels add progressively more levels of detail. The maximum is level 7. NOTES
The sso_util tool is used by the Apple Single Sign On system to set up Kerberized services integrated with the rest of the Single Sign On components. SEE ALSO
kdc(8), kdcsetup(8), kerberos(8), krbservicesetup(8) Darwin June 2, 2019 Darwin
Man Page