krb_slaves - a list of Kerberos slaves
The command takes as a parameter the name of a file in which a list of Kerberos slave machines is stored. This file must be in format.
Each line of a file consists of the machine name of a machine which is running a Kerberos secondary server.
If and run a Kerberos secondary server, the file for the Kerberos primary is as follows:
See Alsokpropd(8krb), kprop(8krb)krb_slaves(5krb)
Check Out this Related Man Page
kinit - Kerberos login utility
/usr/bin/kinit [ -irv ]
You use the command to log into the Kerberos authentication and authorization system. You also use the command when your original tickets
have expired. When you use the command without options, the utility prompts for a username and a Kerberos password and attempts to authen-
ticate to the local Kerberos server.
If Kerberos authenticates you correctly, retrieves your initial ticket and puts it in the ticket file specified by the KRBTKFILE environ-
ment variable. If you have not defined this variable, the ticket is stored in the file
Make sure you use the command to destroy any active tickets before ending your login session. You may want to put the command in a file so
that all tickets are destroyed automatically when you log out. Only registered Kerberos users can use the Kerberos system.
Options-i Causes to prompt you for a Kerberos instance.
-r Causes to prompt you for a Kerberos realm. This option lets you authenticate yourself with a remote Kerberos server.
-v Initiates verbose mode. This causes to print the name of the ticket file used and a status message indicating the success or fail-
ure of your login attempt.
Although user-level authentication is not supported, is useful for testing the installation of Kerberos functionality, by determining if a
newly installed principal can obtain a ticket-granting ticket. For example, to determine if the running on machine X can obtain its
ticket-granting ticket, you can run input the principal name, the instance, X, and the password of If succeeds, then Kerberos is correctly
installed on machine X.
The option has not been fully implemented.
<h1>A short history of UNIX</h1>
<p>In the late 1960's Ken Thompsom joined the computing-science research group at Bell
Laboratories, which is the research arm of the giant American corporation ATT. He and many
colleagues had been collaborating with MIT and GE on the development of an... (0 Replies)
We have quite a few threads about this subject. I have collected some of them and arranged them by the OS which is primarily discussed in the thread. That is because the exact procedure depends on the OS involved. What's more, since you often need to interact with the boot process, the... (0 Replies)
I'm writing a command shell, and I want to be able to detect when the user presses an arrow key (otherwise it just prints [[A, [[B, etc.). I know it's relatively easy (although somewhat more time-consuming) to detect keystrokes in noncanonical mode, but I've noticed that the bash shell detects... (4 Replies)
I'm learning off Linux (Ubuntu) right now. I want to move up to Unix, but I don't want to rush like I did when it came to Windows --> to Linux. What is the best Unix OS that fits in pretty well with Ubuntu.
In other words is there kind of an equal Linux with Unix?
Also what do I need to... (10 Replies)
I noticed my hostname is <my-full-name>s-macbook.local. I'm not sure exactly what information leaves the local network, and whether the hostname is included, but if it is, this would mean people on the Internet can look at my hostname and see who I am. Before anyone says that's not possible,... (4 Replies)