1 .\" $NetBSD: kinit.1,v 1.3 2014/04/24 13:45:34 pettai Exp $
3 .\" Copyright (c) 1998 - 2003, 2006 Kungliga Tekniska Högskolan
4 .\" (Royal Institute of Technology, Stockholm, Sweden).
5 .\" All rights reserved.
7 .\" Redistribution and use in source and binary forms, with or without
8 .\" modification, are permitted provided that the following conditions
11 .\" 1. Redistributions of source code must retain the above copyright
12 .\" notice, this list of conditions and the following disclaimer.
14 .\" 2. Redistributions in binary form must reproduce the above copyright
15 .\" notice, this list of conditions and the following disclaimer in the
16 .\" documentation and/or other materials provided with the distribution.
18 .\" 3. Neither the name of the Institute nor the names of its contributors
19 .\" may be used to endorse or promote products derived from this software
20 .\" without specific prior written permission.
22 .\" THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
23 .\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
24 .\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
25 .\" ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
26 .\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
27 .\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
28 .\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
29 .\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
30 .\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
31 .\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
41 .Nd acquire initial tickets
45 .Oo Fl c Ar cachename \*(Ba Xo
46 .Fl Fl cache= Ns Ar cachename
49 .Op Fl f | Fl Fl no-forwardable
50 .Oo Fl t Ar keytabname \*(Ba Xo
51 .Fl Fl keytab= Ns Ar keytabname
54 .Oo Fl l Ar time \*(Ba Xo
55 .Fl Fl lifetime= Ns Ar time
58 .Op Fl p | Fl Fl proxiable
59 .Op Fl R | Fl Fl renew
61 .Oo Fl r Ar time \*(Ba Xo
62 .Fl Fl renewable-life= Ns Ar time
65 .Oo Fl S Ar principal \*(Ba Xo
66 .Fl Fl server= Ns Ar principal
69 .Oo Fl s Ar time \*(Ba Xo
70 .Fl Fl start-time= Ns Ar time
73 .Op Fl k | Fl Fl use-keytab
74 .Op Fl v | Fl Fl validate
75 .Oo Fl e Ar enctypes \*(Ba Xo
76 .Fl Fl enctypes= Ns Ar enctypes
79 .Oo Fl a Ar addresses \*(Ba Xo
80 .Fl Fl extra-addresses= Ns Ar addresses
83 .Op Fl Fl password-file= Ns Ar filename
84 .Op Fl Fl fcache-version= Ns Ar version-number
85 .Op Fl A | Fl Fl no-addresses
90 .Op Ar principal Op Ar command
93 is used to authenticate to the Kerberos server as
95 or if none is given, a system generated default (typically your login
96 name at the default realm), and acquire a ticket granting ticket that
97 can later be used to obtain tickets for other services.
101 .It Fl c Ar cachename Fl Fl cache= Ns Ar cachename
102 The credentials cache to put the acquired ticket in, if other than
104 .It Fl f Fl Fl no-forwardable
105 Get ticket that can be forwarded to another host, or if the negative
106 flags use, don't get a forwardable flag.
107 .It Fl t Ar keytabname , Fl Fl keytab= Ns Ar keytabname
108 Don't ask for a password, but instead get the key from the specified
110 .It Fl l Ar time , Fl Fl lifetime= Ns Ar time
111 Specifies the lifetime of the ticket.
112 The argument can either be in seconds, or a more human readable string
115 .It Fl p , Fl Fl proxiable
116 Request tickets with the proxiable flag set.
117 .It Fl R , Fl Fl renew
119 The ticket must have the
121 flag set, and must not be expired.
124 .Fl Fl renewable-life ,
125 with an infinite time.
126 .It Fl r Ar time , Fl Fl renewable-life= Ns Ar time
127 The max renewable ticket life.
128 .It Fl S Ar principal , Fl Fl server= Ns Ar principal
129 Get a ticket for a service other than krbtgt/LOCAL.REALM.
130 .It Fl s Ar time , Fl Fl start-time= Ns Ar time
131 Obtain a ticket that starts to be valid
133 (which can really be a generic time specification, like
135 seconds into the future.
136 .It Fl k , Fl Fl use-keytab
139 but with the default keytab name (normally
140 .Ar FILE:/etc/krb5.keytab ) .
141 .It Fl v , Fl Fl validate
142 Try to validate an invalid ticket.
143 .It Fl e , Fl Fl enctypes= Ns Ar enctypes
144 Request tickets with this particular enctype.
145 .It Fl Fl password-file= Ns Ar filename
146 read the password from the first line of
152 the password will be read from the standard input.
153 .It Fl Fl fcache-version= Ns Ar version-number
154 Create a credentials cache of version
156 .It Fl a , Fl Fl extra-addresses= Ns Ar enctypes
157 Adds a set of addresses that will, in addition to the systems local
158 addresses, be put in the ticket.
159 This can be useful if all addresses a client can use can't be
160 automatically figured out.
161 One such example is if the client is behind a firewall.
163 .Li libdefaults/extra_addresses
166 .It Fl A , Fl Fl no-addresses
167 Request a ticket with no addresses.
169 Request an anonymous ticket (which means that the ticket will be
170 issued to an anonymous principal, typically
171 .Dq anonymous@REALM ) .
173 Parse principal as a enterprise (KRB5-NT-ENTERPRISE) name. Enterprise
174 names are email like principals that are stored in the name part of
175 the principal, and since there are two @ characters the parser needs
176 to know that the first is not a realm.
177 An example of an enterprise name is
178 .Dq lha@e.kth.se@KTH.SE ,
179 and this option is usually used with canonicalize so that the
180 principal returned from the KDC will typically be the real principal
183 Gets AFS tickets, converts them to version 4 format, and stores them
185 Only useful if you have AFS.
194 options can be set to a default value from the
196 section in krb5.conf, see
197 .Xr krb5_appdefault 3 .
203 will set up new credentials caches, and AFS PAG, and then run the given
205 When it finishes the credentials will be removed.
209 Specifies the default credentials cache.
216 Specifies the Kerberos 4 ticket file to store version 4 tickets in.
224 .Xr krb5_appdefault 3 ,