summaryrefslogtreecommitdiffstats
path: root/doc/user/user_config/k5login.rst
blob: 90e486593f0df810c587c98ff84933d470372951 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
.. _.k5login(5):

.k5login
========

DESCRIPTION
-----------

The .k5login file, which resides in a user's home directory, contains
a list of the Kerberos principals.  Anyone with valid tickets for a
principal in the file is allowed host access with the UID of the user
in whose home directory the file resides.  One common use is to place
a .k5login file in root's home directory, thereby granting system
administrators remote root access to the host via Kerberos.


EXAMPLES
--------

Suppose the user ``alice`` had a .k5login file in her home directory
containing just the following line:

 ::

    bob@FOOBAR.ORG

This would allow ``bob`` to use Kerberos network applications, such as
ssh(1), to access ``alice``'s account, using ``bob``'s Kerberos
tickets.  In a default configuration (with **k5login_authoritative** set
to true in :ref:`krb5.conf(5)`), this .k5login file would not let
``alice`` use those network applications to access her account, since
she is not listed!  With no .k5login file, or with **k5login_authoritative**
set to false, a default rule would permit the principal ``alice`` in the
machine's default realm to access the ``alice`` account.

Let us further suppose that ``alice`` is a system administrator.
Alice and the other system administrators would have their principals
in root's .k5login file on each host:

 ::

    alice@BLEEP.COM

    joeadmin/root@BLEEP.COM

This would allow either system administrator to log in to these hosts
using their Kerberos tickets instead of having to type the root
password.  Note that because ``bob`` retains the Kerberos tickets for
his own principal, ``bob@FOOBAR.ORG``, he would not have any of the
privileges that require ``alice``'s tickets, such as root access to
any of the site's hosts, or the ability to change ``alice``'s
password.


SEE ALSO
--------

kerberos(1)