⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 kerberos.1

📁 早期freebsd实现
💻 1
字号:
.\" $Source: /mit/kerberos/src/man/RCS/kerberos.1,v $.\" $Author: jtkohl $.\" $Header: kerberos.1,v 4.7 89/01/23 11:39:33 jtkohl Exp $.\" Copyright 1989 by the Massachusetts Institute of Technology..\".\" For copying and distribution information,.\" please see the file <mit-copyright.h>..\".TH KERBEROS 1 "Kerberos Version 4.0" "MIT Project Athena".SH NAMEkerberos \- introduction to the Kerberos system.SH DESCRIPTIONTheKerberossystem authenticatesindividual users in a network environment.After authenticating yourself toKerberos,you can use network utilities such as.IR rlogin ,.IR rcp ,and.IR rshwithouthaving to present passwords to remote hosts and without having to botherwith.I \.rhostsfiles.Note that these utilities will work without passwords only ifthe remote machines you deal withsupport theKerberossystem.All Athena timesharing machines and public workstations supportKerberos..PPBefore you can useKerberos,you must register as an Athena user,and you must make sure you have been added totheKerberosdatabase.You can use the.I kinitcommand to find out.This commandtries to log you into theKerberossystem..I kinitwill prompt you for a username and password.Enter your username and password.If the utility lets you login without giving you a message,you have already been registered..PPIf you enter your username and.I kinitresponds with this message:.nfPrincipal unknown (kerberos).fiyou haven't been registered as aKerberosuser.See your system administrator..PPA Kerberos name contains three parts.The first is the.I principal name,which is usually a user's or service's name.The second is the.I instance,which in the case of a user is usually null.Some users may have privileged instances, however,such as ``root'' or ``admin''.In the case of a service, the instance is thename of the machine on which it runs; i.e. therecan be an.I rloginservice running on the machine ABC, whichis different from the rlogin service running onthe machine XYZ.The third part of a Kerberos nameis the.I realm.The realm corresponds to the Kerberos service providingauthentication for the principal.For example, at MIT there is a Kerberos running at theLaboratory for Computer Science and one running atProject Athena..PPWhen writing a Kerberos name, the principal name isseparated from the instance (if not null) by a period,and the realm (if not the local realm) follows, preceded byan ``@'' sign.The following are examples of valid Kerberos names:.sp.nf.in +8billbjis.adminsrz@lcs.mit.edutreese.root@athena.mit.edu.in -8.fi.PPWhen you authenticate yourself withKerberos,through either the workstation.I toeholdsystem or the.I kinitcommand,Kerberosgives you an initialKerberos.IR ticket .(AKerberosticketis an encrypted protocol message that provides authentication.)Kerberosuses this ticket for network utilitiessuch as.I rloginand.IR rcp .The ticket transactions are done transparently,so you don't have to worry about their management..PPNote, however, that tickets expire.Privileged tickets, such as root instance tickets,expire in a few minutes, while tickets that carry more ordinaryprivileges may be good for several hours or a day, depending on theinstallation's policy.If your login session extends beyond the time limit,you will have to re-authenticate yourself toKerberosto get new tickets.Use the.IR kinitcommand to re-authenticate yourself..PPIf you use the.I kinitcommand to get your tickets,make sure you use the.I kdestroycommandto destroy your tickets before you end your login session.You should probably put the.I kdestroycommand in your.I \.logoutfile so that your tickets will be destroyed automatically when you logout.For more information about the.I kinitand.I kdestroycommands,see the.I kinit(1)and.I kdestroy(1)manual pages..PPCurrently,Kerberossupports the following network services:.IR rlogin ,.IR rsh ,and.IR rcp .Other services are being worked on,such as the.IR popmail system and NFS (network file system),but are not yet available..SH "SEE ALSO"kdestroy(1), kinit(1), klist(1), kpasswd(1), des_crypt(3), kerberos(3),kadmin(8).SH BUGSKerberoswill not do authentication forwarding.In other words,if you use.I rloginto login to a remote host,you cannot useKerberosservices from that hostuntil you authenticate yourself explicitly on that host.Although you may need to authenticate yourself on the remotehost,be aware that when you do so,.I rloginsends your password across the network in clear text..SH AUTHORSSteve Miller, MIT Project Athena/Digital Equipment Corporation.brClifford Neuman, MIT Project AthenaThe following people helped out on various aspects of the system:Jeff Schiller designed and wrote the administration server and itsuser interface, kadmin.He also wrote the dbm version of the database management system.Mark Colan developed theKerberosversions of.IR rlogin ,.IR rsh ,and.IR rcp ,as well as contributing work on the servers.John Ostlund developed theKerberosversions of.I passwdand.IR userreg .Stan Zanarotti pioneered Kerberos in a foreign realm (LCS),and made many contributions based on that experience.Many people contributed code and/or useful ideas, includingJim Aspnes,Bob Baldwin,John Barba,Richard Basch,Jim Bloom,Bill Bryant,Rob French,Dan Geer,David Jedlinsky,John Kohl,John Kubiatowicz,Bob McKie,Brian Murphy,Ken Raeburn,Chris Reed,Jon Rochlis,Mike Shanzer,Bill Sommerfeld,Jennifer Steiner,Ted Ts'o,andWin Treese..SH RESTRICTIONSCOPYRIGHT 1985,1986 Massachusetts Institute of Technology

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -