Using keychains with MobileMe, troubleshooting keychain issues


 
Thread Tools Search this Thread
Operating Systems OS X (Apple) OS X Support RSS Using keychains with MobileMe, troubleshooting keychain issues
# 1  
Old 10-31-2008
Using keychains with MobileMe, troubleshooting keychain issues

You can use keychains with .Mac. This article applies to Mac OS X 10.4, 10.5 or later and contains troubleshooting information that you can use if you encounter keychain issues.

More from Apple OS X Support ...
Login or Register to Ask a Question

Previous Thread | Next Thread

2 More Discussions You Might Find Interesting

1. Cybersecurity

john with Apple Keychains (/Users/$USER/Library/Keychains/login.keychain)

Hi I try to "crack" my OS X login password. Our company purchased an old Openwall wordlists collection (very old!!) $ john --wordlist=/Users/$USER/Downloads/wordlist_john/Wordlists-20031009/all.lst login.keychain.bak Loaded 1 password hash (Tripcode DES ) guesses: 0 time:... (1 Reply)
Discussion started by: slashdotweenie
1 Replies

2. Solaris

Troubleshooting Issues in SOLARIS wanted..Please..

Hi, I want some troubleshooting Issues which are faced in the real-time experience. Like...SERVER CRASH..How do you recover it? OR How do you recover Root File-System ? If server goes down,how to bring it Up? Regards, Aparna. (2 Replies)
Discussion started by: aparna66
2 Replies
Login or Register to Ask a Question
SSH-KEYCHAIN(8) 					    BSD System Manager's Manual 					   SSH-KEYCHAIN(8)

NAME
ssh-keychain.dylib -- smartcard/keychain support library DESCRIPTION
The ssh-keychain.dylib library is used as a PKCS11 module replacement for the family of ssh tools. It provides certificates on SmartCards and/or in user keychains to the tools. OVERVIEW
By default, all valid certificates from all SmartCards currently inserted into attached readers are provided. Manual configuration of ssh-keychain.dylib is required if certificates in user keychains are desired, or if there is a need to limit which SmartCard certificates are provided. The public key hash is used to select which certificates should be provided. This hash is usually in hexadecimal string form, without the leading 0x. To determine the hash for certificate on a SmartCard, the sc_auth hash or sc_auth identities commands can be used. For certificates in user keychains, it is the value of the hpky attribute from security find-certificate output. ENVIRONMENT
Configuration passed through the environment always takes precedence over the configuration file. The variable KEYCHAIN_CERTIFICATES is used to specify hashes. It should contain a semicolon-separated list of public key hashes of certificates which will be provided to the ssh tools. CONFIG FILE
If no enviroment variable configuration is provided, ssh-keychain.dylib looks for a configuration file located at ~/.ssh/sshkeychain.plist. This file is a standard property-list with a dictionary root object. It should contain the key KeychainCertificates with a value that is either a string or an array of strings. If a string, then the expected value is semicolon-separated list of public key hashes like the envi- ronment variable. If the value is an array, then each hash is an array entry. EXAMPLES
Environment: KEYCHAIN_CERTIFICATES="AE31125DA4AAA294A4FED97B815D7F8DD1A78FF3;168D2C4CDDFCDADD465BAF3E6BCFE8193D8D42D1" ssh -o PKCS11Provider=/usr/lib/ssh-keychain.dylib machine Configuration plist: { "KeychainCertificates" => [ 0 => "AE31125DA4AAA294A4FED97B815D7F8DD1A78FF3" 1 => "168D2C4CDDFCDADD465BAF3E6BCFE8193D8D42D1" ] } FILES
~/.ssh/sshkeychain.plist SEE ALSO
sc_auth(8), ssh-add(1), ssh_config(5) Darwin June 1, 2019 Darwin