Linux and UNIX Man Pages

Linux & Unix Commands - Search Man Pages

krb_slaves(5krb) [ultrix man page]

krb_slaves(5krb)														  krb_slaves(5krb)

Name
       krb_slaves - a list of Kerberos slaves

Description
       The command takes as a parameter the name of a file in which a list of Kerberos slave machines is stored.  This file must be in format.

       Each line of a file consists of the machine name of a machine which is running a Kerberos secondary server.

       If and run a Kerberos secondary server, the file for the Kerberos primary is as follows:
       cactus.dec.com
       dopey
       walrus.dec.com

See Also
       kpropd(8krb), kprop(8krb)

																  krb_slaves(5krb)

Check Out this Related Man Page

kdb_init(8krb)															    kdb_init(8krb)

Name
       kdb_init - initialize the Kerberos master database

Syntax
       /var/dss/kerberos/bin/kdb_init [ realm-name ] [ database-name ]

Arguments
       realm-name   The realm of the Kerberos database.

       database-name
		    A database specified so that the current and files are not overwritten.

Description
       The  utility  creates  and  initializes	the Kerberos master database.  The utility creates the database files: and It also initializes the
       database by adding three database entries: the master database principal, a Kerberos default principal, the ticket-granting service princi-
       pal ( and the password changing principal,

       The master database principal is the entry to the database itself.  You cannot use or modify the database without the master database pass-
       word.  The Kerberos default principal provides a template for service principals.

       The ticket-granting service, is used by Kerberos principals to obtain tickets to communicate with other Kerberos principals.  The password-
       changing principal is not used.

       If  realm-name  is  omitted  when  you enter the command, prompts for it. The program also prompts for the master database key.	You cannot
       manipulate the database without this key.

       By using database-name, you can create another database to prevent the current and files from being overwritten.

       After using to set up the master database, you may want to use the utility to hide the  master  database  password  on  the  database  host
       machine.  This  enables	Kerberos  administration programs to access and manipulate the master database, without needing the password to be
       entered manually.

Files
       See Also
	      kdb_util(8krb), kstash(8krb), kdb_edit(8krb), kdb_destroy(8krb)

																    kdb_init(8krb)
Man Page

5 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

A short history of UNIX by l.madden@ic.ac.uk

<h1>A short history of UNIX</h1> <p>In the late 1960's Ken Thompsom joined the computing-science research group at Bell Laboratories, which is the research arm of the giant American corporation ATT. He and many colleagues had been collaborating with MIT and GE on the development of an... (0 Replies)
Discussion started by: Neo
0 Replies

2. Answers to Frequently Asked Questions

Lost root password / Can't login as root

We have quite a few threads about this subject. I have collected some of them and arranged them by the OS which is primarily discussed in the thread. That is because the exact procedure depends on the OS involved. What's more, since you often need to interact with the boot process, the... (0 Replies)
Discussion started by: Perderabo
0 Replies

3. Programming

How do you detect keystrokes in canonical mode?

I'm writing a command shell, and I want to be able to detect when the user presses an arrow key (otherwise it just prints [[A, [[B, etc.). I know it's relatively easy (although somewhat more time-consuming) to detect keystrokes in noncanonical mode, but I've noticed that the bash shell detects... (4 Replies)
Discussion started by: Ultrix
4 Replies

4. UNIX for Dummies Questions & Answers

Linux (Ubuntu) = Unix (NOT IMPORTANT - NO RUSH)

I'm learning off Linux (Ubuntu) right now. I want to move up to Unix, but I don't want to rush like I did when it came to Windows --> to Linux. What is the best Unix OS that fits in pretty well with Ubuntu. In other words is there kind of an equal Linux with Unix? Also what do I need to... (10 Replies)
Discussion started by: Linux_Guy
10 Replies

5. IP Networking

Can I change my hostname without messing things up?

I noticed my hostname is <my-full-name>s-macbook.local. I'm not sure exactly what information leaves the local network, and whether the hostname is included, but if it is, this would mean people on the Internet can look at my hostname and see who I am. Before anyone says that's not possible,... (4 Replies)
Discussion started by: Ultrix
4 Replies