diff options
Diffstat (limited to 'src/man/kadmind.man')
| -rw-r--r-- | src/man/kadmind.man | 302 |
1 files changed, 302 insertions, 0 deletions
diff --git a/src/man/kadmind.man b/src/man/kadmind.man new file mode 100644 index 0000000000..5ee569dcd4 --- /dev/null +++ b/src/man/kadmind.man @@ -0,0 +1,302 @@ +.TH "KADMIND" "8" " " "0.0.1" "MIT Kerberos" +.SH NAME +kadmind \- KADM5 administration server +. +.nr rst2man-indent-level 0 +. +.de1 rstReportMargin +\\$1 \\n[an-margin] +level \\n[rst2man-indent-level] +level margin: \\n[rst2man-indent\\n[rst2man-indent-level]] +- +\\n[rst2man-indent0] +\\n[rst2man-indent1] +\\n[rst2man-indent2] +.. +.de1 INDENT +.\" .rstReportMargin pre: +. RS \\$1 +. nr rst2man-indent\\n[rst2man-indent-level] \\n[an-margin] +. nr rst2man-indent-level +1 +.\" .rstReportMargin post: +.. +.de UNINDENT +. RE +.\" indent \\n[an-margin] +.\" old: \\n[rst2man-indent\\n[rst2man-indent-level]] +.nr rst2man-indent-level -1 +.\" new: \\n[rst2man-indent\\n[rst2man-indent-level]] +.in \\n[rst2man-indent\\n[rst2man-indent-level]]u +.. +.\" Man page generated from reStructeredText. +. +.SH SYNOPSIS +.sp +\fBkadmind\fP +[\fB\-x\fP \fIdb_args\fP] +[\fB\-r\fP \fIrealm\fP] +[\fB\-m\fP] +[\fB\-nofork\fP] +[\fB\-port\fP \fIport\-number\fP] +[\fB\-P\fP \fIpid_file\fP] +.SH DESCRIPTION +.sp +kadmind starts the Kerberos administration server. kadmind typically +runs on the master Kerberos server, which stores the KDC database. If +the KDC database uses the LDAP module, the administration server and +the KDC server need not run on the same machine. kadmind accepts +remote requests from programs such as \fIkadmin(1)\fP and +\fIkpasswd(1)\fP to administer the information in these database. +.sp +kadmind requires a number of configuration files to be set up in order +for it to work: +.INDENT 0.0 +.TP +.B \fIkdc.conf(5)\fP +.sp +The KDC configuration file contains configuration information for +the KDC and admin servers. kadmind uses settings in this file to +locate the Kerberos database, and is also affected by the +\fBacl_file\fP, \fBdict_file\fP, \fBkadmind_port\fP, and iprop\-related +settings. +.TP +.B ACL file +. +kadmind\(aqs ACL (access control list) tells it which principals are +allowed to perform administration actions. The pathname to the +ACL file can be specified with the \fBacl_file\fP kdc.conf variable; +by default, it is \fB@LOCALSTATEDIR@/krb5kdc\fP\fB/kadm5.acl\fP. The syntax of the ACL +file is specified in the ACL FILE SYNTAX section below. +.sp +If the kadmind ACL file is modified, the kadmind daemon needs to +be restarted for changes to take effect. +.UNINDENT +.sp +After the server begins running, it puts itself in the background and +disassociates itself from its controlling terminal. +.sp +kadmind can be configured for incremental database propagation. +Incremental propagation allows slave KDC servers to receive principal +and policy updates incrementally instead of receiving full dumps of +the database. This facility can be enabled in the \fIkdc.conf(5)\fP +file with the \fBiprop_enable\fP option. Incremental propagation +requires the principal \fBkiprop/MASTER\e@REALM\fP (where MASTER is the +master KDC\(aqs canonical host name, and REALM the realm name) to be +registered in the database. +.SH OPTIONS +.INDENT 0.0 +.TP +.B \fB\-r\fP \fIrealm\fP +.sp +specifies the realm that kadmind will serve; if it is not +specified, the default realm of the host is used. +.TP +.B \fB\-m\fP +.sp +causes the master database password to be fetched from the +keyboard (before the server puts itself in the background, if not +invoked with the \fB\-nofork\fP option) rather than from a file on +disk. +.TP +.B \fB\-nofork\fP +.sp +causes the server to remain in the foreground and remain +associated to the terminal. In normal operation, you should allow +the server to place itself in the background. +.TP +.B \fB\-port\fP \fIport\-number\fP +.sp +specifies the port on which the administration server listens for +connections. The default port is determined by the +\fBkadmind_port\fP configuration variable in \fIkdc.conf(5)\fP. +.TP +.B \fB\-P\fP \fIpid_file\fP +.sp +specifies the file to which the PID of kadmind process should be +written after it starts up. This file can be used to identify +whether kadmind is still running and to allow init scripts to stop +the correct process. +.TP +.B \fB\-x\fP \fIdb_args\fP +.sp +specifies database\-specific arguments. +.sp +Options supported for LDAP database are: +.INDENT 7.0 +.INDENT 3.5 +.INDENT 0.0 +.TP +.B \fB\-x nconns=\fP\fInumber_of_connections\fP +.sp +specifies the number of connections to be maintained per +LDAP server. +.TP +.B \fB\-x host=\fP\fIldapuri\fP +.sp +specifies the LDAP server to connect to by URI. +.TP +.B \fB\-x binddn=\fP\fIbinddn\fP +.sp +specifies the DN of the object used by the administration +server to bind to the LDAP server. This object should +have read and write privileges on the realm container, the +principal container, and the subtree that is referenced by +the realm. +.TP +.B \fB\-x bindpwd=\fP\fIbind_password\fP +.sp +specifies the password for the above mentioned binddn. +Using this option may expose the password to other users +on the system via the process list; to avoid this, instead +stash the password using the \fBstashsrvpw\fP command of +\fIkdb5_ldap_util(8)\fP. +.UNINDENT +.UNINDENT +.UNINDENT +.UNINDENT +.SH ACL FILE SYNTAX +.sp +The ACL file controls which principals can or cannot perform which +administrative functions. For operations that affect principals, the +ACL file also controls which principals can operate on which other +principals. Empty lines and lines starting with the sharp sign +(\fB#\fP) are ignored. Lines containing ACL entries have the format: +.INDENT 0.0 +.INDENT 3.5 +.sp +.nf +.ft C +principal operation\-mask [operation\-target] +.ft P +.fi +.UNINDENT +.UNINDENT +.sp +Ordering is important. The first matching entry will control access +for an actor principal on a target principal. +.INDENT 0.0 +.TP +.B \fIprincipal\fP +.sp +may specify a partially or fully qualified Kerberos version 5 +principal name. Each component of the name may be wildcarded +using the \fB*\fP character. +.TP +.B \fIoperation\-target\fP +.sp +[Optional] may specify a partially or fully qualified Kerberos +version 5 principal name. Each component of the name may be +wildcarded using the \fB*\fP character. +.TP +.B \fIoperation\-mask\fP +.sp +Specifies what operations may or may not be performed by a +principal matching a particular entry. This is a string of one or +more of the following list of characters or their upper\-case +counterparts. If the character is upper\-case, then the operation +is disallowed. If the character is lower\-case, then the operation +is permitted. +.TS +center; +|l|l|. +_ +T{ +a +T} T{ +[Dis]allows the addition of principals or policies +T} +_ +T{ +d +T} T{ +[Dis]allows the deletion of principals or policies +T} +_ +T{ +m +T} T{ +[Dis]allows the modification of principals or policies +T} +_ +T{ +c +T} T{ +[Dis]allows the changing of passwords for principals +T} +_ +T{ +i +T} T{ +[Dis]allows inquiries about principals or policies +T} +_ +T{ +l +T} T{ +[Dis]allows the listing of principals or policies +T} +_ +T{ +p +T} T{ +[Dis]allows the propagation of the principal database +T} +_ +T{ +x +T} T{ +Short for admcil. +T} +_ +T{ +* +T} T{ +Same as x. +T} +_ +.TE +.sp +Some examples of valid entries here are: +.INDENT 7.0 +.TP +.B \fBuser/instance@realm adm\fP +.sp +A standard fully qualified name. The \fIoperation\-mask\fP only +applies to this principal and specifies that [s]he may add, +delete, or modify principals and policies, but not change +anybody else\(aqs password. +.TP +.B \fBuser/instance@realm cim service/instance@realm\fP +.sp +A standard fully qualified name and a standard fully qualified +target. The \fIoperation\-mask\fP only applies to this principal +operating on this target and specifies that [s]he may change +the target\(aqs password, request information about the target, +and modify it. +.TP +.B \fBuser/*@realm ac\fP +.sp +A wildcarded name. The \fIoperation\-mask\fP applies to all +principals in realm \fBrealm\fP whose first component is +\fBuser\fP and specifies that [s]he may add principals and +change anybody\(aqs password. +.TP +.B \fBuser/*@realm i */instance@realm\fP +.sp +A wildcarded name and target. The \fIoperation\-mask\fP applies to +all principals in realm \fBrealm\fP whose first component is +\fBuser\fP and specifies that [s]he may perform inquiries on +principals whose second component is \fBinstance\fP and realm is +\fBrealm\fP. +.UNINDENT +.UNINDENT +.SH SEE ALSO +.sp +\fIkpasswd(1)\fP, \fIkadmin(1)\fP, \fIkdb5_util(8)\fP, +\fIkdb5_ldap_util(8)\fP +.SH AUTHOR +MIT +.SH COPYRIGHT +2011, MIT +.\" Generated by docutils manpage writer. +. |
