1 .\" Copyright (c) 2002 - 2007 Kungliga Tekniska Högskolan
2 .\" (Royal Institute of Technology, Stockholm, Sweden).
3 .\" All rights reserved.
5 .\" Redistribution and use in source and binary forms, with or without
6 .\" modification, are permitted provided that the following conditions
9 .\" 1. Redistributions of source code must retain the above copyright
10 .\" notice, this list of conditions and the following disclaimer.
12 .\" 2. Redistributions in binary form must reproduce the above copyright
13 .\" notice, this list of conditions and the following disclaimer in the
14 .\" documentation and/or other materials provided with the distribution.
16 .\" 3. Neither the name of the Institute nor the names of its contributors
17 .\" may be used to endorse or promote products derived from this software
18 .\" without specific prior written permission.
20 .\" THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
21 .\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22 .\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23 .\" ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
24 .\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25 .\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26 .\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27 .\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28 .\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29 .\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
44 .Op Fl u | Fl Fl unlog
45 .Op Fl v | Fl Fl verbose
47 .Oo Fl c Ar cell \*(Ba Xo
48 .Fl Fl cell= Ns Ar cell
51 .Oo Fl k Ar realm \*(Ba Xo
52 .Fl Fl realm= Ns Ar realm
55 .Oo Fl P Ar principal \*(Ba Xo
56 .Fl Fl principal= Ns Ar principal
60 .Oo Fl p Ar path \*(Ba Xo
61 .Fl Fl file= Ns Ar path
65 .Op Ar cell | path ...
68 obtains AFS tokens for a number of cells. What cells to get tokens for
69 can either be specified as an explicit list, as file paths to get
70 tokens for, or be left unspecified, in which case
72 will use whatever magic
81 not try using Kerberos 5.
84 .Fl Fl principal Ar principal
86 select what Kerberos 5 principal to use.
87 .It Fl Fl cache Ar cache
88 select what Kerberos 5 credential cache to use.
90 overrides this option.
95 Destroy tokens instead of obtaining new. If this is specified, all
96 other options are ignored (except for
104 Adds more verbosity for what is actually going on.
107 .Fl Fl cell= Ns Ar cell
109 This specified one or more cell names to get tokens for.
112 .Fl Fl realm= Ns Ar realm
114 This is the Kerberos realm the AFS servers live in, this should
115 normally not be specified.
118 .Fl Fl file= Ns Ar path
120 This specified one or more file paths for which tokens should be
128 you may also pass a list of cells and file paths after any other
129 options. These arguments are considered files if they are either
134 or they contain a slash, or if there exists a file by that name.
136 Assuming that there is no file called
138 in the current directory, and that
140 points to that cell, the follwing should be identical:
141 .Bd -literal -offset indent
142 $ afslog -c openafs.org
144 $ afslog /afs/openafs.org/some/file