Kinit linux что это

Kinit linux что это

If you have compiled kinit with Kerberos 4 support and you have a Kerberos 4 server, kinit will detect this and get you Kerberos 4 tickets.

— c cachename — -cache= cachename The credentials cache to put the acquired ticket in, if other than default. — f — -forwardable Get ticket that can be forwarded to another host. — t keytabname — -keytab= keytabname Don’t ask for a password, but instead get the key from the specified keytab. — l time — -lifetime= time Specifies the lifetime of the ticket. The argument can either be in seconds, or a more human readable string like `1h’ — p — -proxiable Request tickets with the proxiable flag set. — R — -renew Try to renew ticket. The ticket must have the `renewable’ flag set, and must not be expired. —renewable The same as — -renewable-life with an infinite time. — r time — -renewable-life= time The max renewable ticket life. — S principal — -server= principal Get a ticket for a service other than krbtgt/LOCAL.REALM. — s time — -start-time= time Obtain a ticket that starts to be valid time (which can really be a generic time specification, like `1h’ seconds into the future. — k — -use-keytab The same as — -keytab but with the default keytab name (normally FILE:/etc/krb5.keytab ) — v — -validate Try to validate an invalid ticket. — e — -enctypes= enctypes Request tickets with this particular enctype. — -fcache-version= version Create a credentials cache of version version — a — -extra-addresses= enctypes Adds a set of addresses that will, in addition to the systems local addresses, be put in the ticket. This can be useful if all addresses a client can use can’t be automatically figured out. One such example is if the client is behind a firewall. Also settable via libdefaults/extra_addresses in krb5.conf5. — -no-addresses Request a ticket with no addresses. — -anonymous Request an anonymous ticket (which means that the ticket will be issued to an anonymous principal, typically «anonymous@REALM )»

The following options are only available if kinit has been compiled with support for Kerberos 4.

— 4 — -524init Try to convert the obtained Kerberos 5 krbtgt to a version 4 compatible ticket. It will store this ticket in the default Kerberos 4 ticket file. — 9 — -524convert only convert ticket to version 4 —afslog Gets AFS tickets, converts them to version 4 format, and stores them in the kernel. Only useful if you have AFS.

The forwardable proxiable ticket_life and renewable_life options can be set to a default value from the appdefaults section in krb5.conf, see krb5_appdefault3.

If a command is given, kinit will setup new credentials caches, and AFS PAG, and then run the given command. When it finishes the credentials will be removed.

ENVIRONMENT

KRB5CCNAME Specifies the default credentials cache. KRB5_CONFIG The file name of krb5.conf , the default being /etc/krb5.conf KRBTKFILE Specifies the Kerberos 4 ticket file to store version 4 tickets in.

Источник

Kinit linux что это

The kinit command is used to obtain and cache an initial ticket-granting ticket (credential) for principal . This ticket is used for authentication by the Kerberos system. Only users with Kerberos principals can use the Kerberos system. For information about Kerberos principals, see kerberos (5).

When you use kinit without options, the utility prompts for your principal and Kerberos password, and tries to authenticate your login with the local Kerberos server. The principal can be specified on the command line if desired.

Читайте также:  Как windows для геймера

If Kerberos authenticates the login attempt, kinit retrieves your initial ticket-granting ticket and puts it in the ticket cache. By default your ticket is stored in the file /tmp/krb5cc_ uid , where uid specifies your user identification number. Tickets expire after a specified lifetime, after which kinit must be run again. Any existing contents of the cache are destroyed by kinit .

Values specified in the command line override the values specified in the Kerberos configuration file for lifetime and renewable_life .

The kdestroy (1) command can be used to destroy any active tickets before you end your login session.

OPTIONS

The following options are supported:

-a Requests tickets with the local addresses.

-A Requests address-less tickets.

-c cache_name Uses cache_name as the credentials (ticket) cache name and location. If this option is not used, the default cache name and location are used.

-f Requests forwardable tickets.

-F Not forwardable. Does not request forwardable tickets.

Tickets that have been acquired on one host cannot normally be used on another host. A client can request that the ticket be marked forwardable. Once the TKT_FLG_FORWARDABLE flag is set on a ticket, the user can use this ticket to request a new ticket, but with a different IP address. Thus, users can use their current credentials to get credentials valid on another machine. This option allows a user to explicitly obtain a non-forwardable ticket.

-k [ -t keytab_file ] Requests a host ticket, obtained from a key in the local host’s keytab file. The name and location of the keytab file can be specified with the -t keytab_file option. Otherwise, the default name and location is used.

-l lifetime Requests a ticket with the lifetime lifetime . If the -l option is not specified, the default ticket lifetime (configured by each site) is used. Specifying a ticket lifetime longer than the maximum ticket lifetime (configured by each site) results in a ticket with the maximum lifetime. See the Time Formats section for the valid time duration formats that you can specify for lifetime . See kdc.conf (4) and kadmin (1M) (for getprinc command to verify the lifetime values for the server principal).

The lifetime of the tickets returned is the minimum of the following: o Value specified in the command line. o Value specified in the KDC configuration file. o Value specified in the Kerberos data base for the server principal. In the case of kinit , it is krbtgt/ realm name . o Value specified in the Kerberos database for the user principal.

-p Requests proxiable tickets.

-P Not proxiable. Does not request proxiable tickets.

A proxiable ticket is a ticket that allows you to get a ticket for a service with IP addresses other than the ones in the Ticket Granting Ticket. This option allows a user to explicitly obtain a non-proxiable ticket.

-r renewable_life Requests renewable tickets, with a total lifetime of renewable_life . See the Time Formats section for the valid time duration formats that you can specify for renewable_life . See kdc.conf (4) and kadmin (1M) (for getprinc command to verify the lifetime values for the server principal).

The renewable lifetime of the tickets returned is the minimum of the following: o Value specified in the command line. o Value specified in the KDC configuration file. o Value specified in the Kerberos data base for the server principal. In the case of kinit , it is krbtgt/ realm name . o Value specified in the Kerberos database for the user principal.

Читайте также:  Acer 4820tg драйвера для windows 10

-R Requests renewal of the ticket-granting ticket. Notice that an expired ticket cannot be renewed, even if the ticket is still within its renewable life.

-s start_time Requests a postdated ticket, valid starting at start_time . Postdated tickets are issued with the invalid flag set, and need to be fed back to the KDC before use. See the Time Formats section for either the valid absolute time or time duration formats that you can specify for start_time . kinit attempts to match an absolute time first before trying to match a time duration.

-S service_name Specifies an alternate service name to use when getting initial tickets.

-v Requests that the ticket granting ticket in the cache (with the invalid flag set) be passed to the KDC for validation. If the ticket is within its requested time range, the cache is replaced with the validated ticket.

-V Verbose output. Displays further information to the user, such as confirmation of authentication and version.

-X attribute [= value ] Specifies a pre-authentication attribute and value to be passed to pre-authentication plugins. The acceptable attribute and value values vary from pre-authentication plugin to plugin. This option can be specified multiple times to specify multiple attributes. If no value is specified, it is assumed to be yes .

The following attributes are recognized by the OpenSSL pkinit pre-authentication mechanism:

X509_user_identity=URI Specifies where to find user’s X509 identity information.

Valid URI types are FILE , DIR , PKCS11 , PKCS12 , and ENV . See the PKINIT URI Types section for details.

X509_anchors=URI Specifies where to find trusted X509 anchor information.

Valid URI types are FILE and DIR . See the PKINIT URI Types section for details.

flag_RSA_PROTOCOL[=yes] Specifies the use of RSA, rather than the default Diffie-Hellman protoco.

PKINIT URI Types

FILE: file-name [, key-file-name ]

This option has context-specific behavior.

X509_user_identity file-name specifies the name of a PEM-format file containing the user’s certificate. If key-file-name is not specified, the user’s private key is expected to be in file-name as well. Otherwise, key-file-name is the name of the file containing the private key.

X509_anchors file-name is assumed to be the name of an OpenSSL-style ca-bundle file. The ca-bundle file should be base-64 encoded.

This option has context-specific behavior.

X509_user_identity directory-name specifies a directory with files named *.crt and *.key , where the first part of the file name is the same for matching pairs of certificate and private key files. When a file with a name ending with .crt is found, a matching file ending with .key is assumed to contain the private key. If no such file is found, then the certificate in the .crt is not used.

X509_anchors directory-name is assumed to be an OpenSSL-style hashed CA directory where each CA cert is stored in a file named hash-of-ca-cert. # . This infrastructure is encouraged, but all files in the directory are examined and if they contain certificates (in PEM format), and are used.

pkcs12-file-nam e is the name of a PKCS #12 format file, containing the user’s certificate and private key.

PKCS11:[slotid= slot-id ][:token= token-label ][:certid= cert-id ][:certlabel= cert-label ]

All keyword and values are optional. PKCS11 modules (for example, opensc-pkcs11.so ) must be installed as a crypto provider under libpkcs11 (3LIB). slotid= and/or token= can be specified to force the use of a particular smard card reader or token if there is more than one available. certid= and/or certlabel= can be specified to force the selection of a particular certificate on the device. See the pkinit_cert_match configuration option for more ways to select a particular certificate to use for pkinit .

Читайте также:  Иконки windows 10 оригинал

environment-variable-name specifies the name of an environment variable which has been set to a value conforming to one of the previous values. For example, ENV:X509_PROXY , where environment variable X509_PROXY has been set to FILE:/tmp/my_proxy.pem .

Time Formats

The following absolute time formats can be used for the -s start_time option. The examples are based on the date and time of July 2, 1999, 1:35:30 p.m.

Absolute Time Format Example
yymmddhhmm [ ss ] 990702133530
hhmm [ ss ]
yy . mm . dd . hh . mm . ss
hh : mm [: ss ]
ldate : ltime
dd — month — yyyy : hh : mm [: ss ]

Variable Description
dd day
hh
mm
ss
yy
yyyy
month
ldate
ltime

The following time duration formats can be used for the -l lifetime , -r renewable_life , and -s start_time options. The examples are based on the time duration of 14 days, 7 hours, 5 minutes, and 30 seconds.

Time Duration Format Example
# d 14d
# h
# m
# s
# d # h # m # s
# h # m[ # s]
days — hh : mm : ss
hours : mm [: ss ]

Delimiter Description
d number of days
h
m
s

Variable Description
# number
days
hours
hh
mm
ss

ENVIRONMENT VARIABLES

kinit uses the following environment variable:

KRB5CCNAME Location of the credentials (ticket) cache. See krb5envvar (5) for syntax and details.

FILES

/tmp/krb5cc_ uid Default credentials cache ( uid is the decimal UID of the user).

/etc/krb5/krb5.keytab Default location for the local host’s keytab file.

/etc/krb5/krb5.conf Default location for the local host’s configuration file. See krb5.conf (4).

ATTRIBUTES

See attributes (5) for descriptions of the following attributes:

ATTRIBUTE TYPE ATTRIBUTE VALUE
Availability SUNWkrbu
Interface Stability

The command arguments are Evolving. The command output is Unstable.

SEE ALSO


NOTES

On success, kinit notifies ktkt_warnd (1M) to alert the user when the initial credentials (ticket-granting ticket) are about to expire.

Источник

kinit — Unix, Linux Command

The use must be registered as a principal with the Key Distribution Center (KDC) prior to running kinit.

SYNOPSIS

DESCRIPTION

is obtained from the java.lang.System property user.home. is obtained from java.lang.System property user.name. If is null, the cache file would be stored in the current directory that the program is running from. is the operating system’s login username. This username could be different than the user’s principal name. For example on Solaris, it could be /home/duke/krb5cc_duke, in which duke is the and /home/duke is the .

By default, the keytab name is retrieved from the Kerberos configuration file. If the keytab name is not specifed in the Kerberos configuration file, the name is assumed to be /krb5.keytab

If you do not specify the password using the password option on the command line, kinit will prompt you for the password.

Note: password is provided only for testing purposes. Do not place your password in a script or provide your password on the command line. Doing so will compromise your password.

For more information see the man pages for kinit.

COMMANDS

] [ -help ]

Tag Description
-f Issue a forwardable ticket.
-p Issue a proxiable ticket.
-c The cache name (i.e., FILE:/temp/mykrb5cc).
-k Use keytab
-t The keytab name (i.e., /home/duke/krb5.keytab).
The principal’s Kerberos password. (DO NOT SPECIFY ON COMMAND LINE OR IN A SCRIPT.)
-help Display instructions.

EXAMPLES

Requesting proxiable credentials for a different principal and storing these credentials in a specified file cache:

Requesting proxiable and forwardable credentials for a different principal and storing these credentials in a specified file cache:

Источник

Оцените статью