summaryrefslogtreecommitdiffstats
path: root/src/gen-manpages/k5login.M
blob: dc0a84c745b64560bc6b84b2f9b533e4a2253af8 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
.TH .K5LOGIN 5
.SH NAME
\&.k5login \- Kerberos V5 acl file for host access.
.SH DESCRIPTION
The
.B .k5login
file, which resides in a user's home directory, contains a list of the
Kerberos principals.  Anyone with valid tickets for a principal in the
file is allowed host access with the UID of the user in whose home
directory the file resides.  One common use is to place a
.B .k5login
file in root's home directory, thereby granting system administrators
remote root access to the host via Kerberos.
.SH EXAMPLES
Suppose the user "alice" had a 
.B .k5login
file in her home directory containing the following line:
.sp
.nf
.in +1i
bob@FUBAR.ORG
.in -1i
.fi
.sp
This would allow "bob" to use any of the Kerberos network
applications, such as
.IR telnet (1),
.IR rlogin (1),
.IR rsh (1),
and
.IR rcp (1),
to access alice's account, using bob's Kerberos tickets.
.PP
Let us further suppose that "alice" is a system administrator.  Alice
and the other system administrators would have their principals in
root's
.B .k5login
file on each host:
.sp
.nf
.in +1i
alice@BLEEP.COM
joeadmin/root@BLEEP.COM
.in -1i
.fi
.sp
This would allow either system administrator to log in to these hosts
using their Kerberos tickets instead of having to type the root
password.  Note that because "bob" retains the Kerberos tickets for
his own principal, "bob@FUBAR.ORG", he would not have any of the
privileges that require alice's tickets, such as root access to any of
the site's hosts, or the ability to change alice's password.
.SH SEE ALSO
telnet(1), rlogin(1), rsh(1), rcp(1), ksu(1), telnetd(8), klogind(8)