1 .\" $NetBSD: kadmind.8,v 1.4 2014/04/24 13:45:33 pettai Exp $
3 .\" Copyright (c) 2002 - 2004 Kungliga Tekniska Högskolan
4 .\" (Royal Institute of Technology, Stockholm, Sweden).
5 .\" All rights reserved.
7 .\" Redistribution and use in source and binary forms, with or without
8 .\" modification, are permitted provided that the following conditions
11 .\" 1. Redistributions of source code must retain the above copyright
12 .\" notice, this list of conditions and the following disclaimer.
14 .\" 2. Redistributions in binary form must reproduce the above copyright
15 .\" notice, this list of conditions and the following disclaimer in the
16 .\" documentation and/or other materials provided with the distribution.
18 .\" 3. Neither the name of the Institute nor the names of its contributors
19 .\" may be used to endorse or promote products derived from this software
20 .\" without specific prior written permission.
22 .\" THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
23 .\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
24 .\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
25 .\" ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
26 .\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
27 .\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
28 .\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
29 .\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
30 .\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
31 .\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
41 .Nd "server for administrative access to Kerberos database"
45 .Oo Fl c Ar file \*(Ba Xo
46 .Fl Fl config-file= Ns Ar file
49 .Oo Fl k Ar file \*(Ba Xo
50 .Fl Fl key-file= Ns Ar file
53 .Op Fl Fl keytab= Ns Ar keytab
54 .Oo Fl r Ar realm \*(Ba Xo
55 .Fl Fl realm= Ns Ar realm
58 .Op Fl d | Fl Fl debug
59 .Oo Fl p Ar port \*(Ba Xo
60 .Fl Fl ports= Ns Ar port
66 listens for requests for changes to the Kerberos database and performs
67 these, subject to permissions. When starting, if stdin is a socket it
68 assumes that it has been started by
70 otherwise it behaves as a daemon, forking processes for each new
75 to accept exactly one connection, which is useful for debugging.
79 daemon is responsible for the Kerberos 5 password changing protocol
83 This daemon should only be run on the master server, and not on any
86 Principals are always allowed to change their own password and list
87 their own principal. Apart from that, doing any operation requires
88 permission explicitly added in the ACL file
89 .Pa /var/heimdal/kadmind.acl .
90 The format of this file is:
94 .Op Va principal-pattern
97 Where rights is any (comma separated) combination of:
100 change-password or cpw
116 .Ar principal-pattern
117 restricts the rights to operations on principals that match the
122 .It Fl c Ar file , Fl Fl config-file= Ns Ar file
123 location of config file
124 .It Fl k Ar file , Fl Fl key-file= Ns Ar file
125 location of master key file
126 .It Fl Fl keytab= Ns Ar keytab
128 .It Fl r Ar realm , Fl Fl realm= Ns Ar realm
130 .It Fl d , Fl Fl debug
132 .It Fl p Ar port , Fl Fl ports= Ns Ar port
133 ports to listen to. By default, if run as a daemon, it listens to port
134 749, but you can add any number of ports with this option. The port
135 string is a whitespace separated list of port specifications, with the
138 representing the default port.
142 .Pa /var/heimdal/kadmind.acl
146 to listen to port 4711 in addition to any
147 compiled in defaults:
149 .D1 Nm Fl Fl ports Ns Li "=\*[q]+ 4711\*[q] &"
151 This acl file will grant Joe all rights, and allow Mallory to view and
153 .Bd -literal -offset indent
154 joe/admin@EXAMPLE.COM all
155 mallory/admin@EXAMPLE.COM add,get host/*@EXAMPLE.COM