summaryrefslogtreecommitdiff
path: root/doc/html/admin/admin_commands/kadmin_local.html
diff options
context:
space:
mode:
authorCy Schubert <cy@FreeBSD.org>2025-03-19 22:12:25 +0000
committerCy Schubert <cy@FreeBSD.org>2025-03-19 22:12:25 +0000
commit8f7d3ef26dec89a92ec0665de84a5936310a5574 (patch)
tree9a465418bd4056bf0d369751320a414eaed29fa4 /doc/html/admin/admin_commands/kadmin_local.html
parent1a79b20663ca26acc2998b90ea2ff2aefd8af5b1 (diff)
Diffstat (limited to 'doc/html/admin/admin_commands/kadmin_local.html')
-rw-r--r--doc/html/admin/admin_commands/kadmin_local.html790
1 files changed, 400 insertions, 390 deletions
diff --git a/doc/html/admin/admin_commands/kadmin_local.html b/doc/html/admin/admin_commands/kadmin_local.html
index 6c8e131ac9ca..1b6e42b31ac4 100644
--- a/doc/html/admin/admin_commands/kadmin_local.html
+++ b/doc/html/admin/admin_commands/kadmin_local.html
@@ -1,35 +1,26 @@
-<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
- "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
+<!DOCTYPE html>
-<html xmlns="http://www.w3.org/1999/xhtml">
+<html>
<head>
- <meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
+ <meta charset="utf-8" />
+ <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="generator" content="Docutils 0.17.1: http://docutils.sourceforge.net/" />
+
<title>kadmin &#8212; MIT Kerberos Documentation</title>
- <link rel="stylesheet" href="../../_static/agogo.css" type="text/css" />
- <link rel="stylesheet" href="../../_static/pygments.css" type="text/css" />
- <link rel="stylesheet" href="../../_static/kerb.css" type="text/css" />
- <script type="text/javascript">
- var DOCUMENTATION_OPTIONS = {
- URL_ROOT: '../../',
- VERSION: '1.21.2',
- COLLAPSE_INDEX: false,
- FILE_SUFFIX: '.html',
- HAS_SOURCE: true,
- SOURCELINK_SUFFIX: '.txt'
- };
- </script>
- <script type="text/javascript" src="../../_static/jquery.js"></script>
- <script type="text/javascript" src="../../_static/underscore.js"></script>
- <script type="text/javascript" src="../../_static/doctools.js"></script>
+ <link rel="stylesheet" type="text/css" href="../../_static/pygments.css" />
+ <link rel="stylesheet" type="text/css" href="../../_static/agogo.css" />
+ <link rel="stylesheet" type="text/css" href="../../_static/kerb.css" />
+ <script data-url_root="../../" id="documentation_options" src="../../_static/documentation_options.js"></script>
+ <script src="../../_static/jquery.js"></script>
+ <script src="../../_static/underscore.js"></script>
+ <script src="../../_static/doctools.js"></script>
<link rel="author" title="About these documents" href="../../about.html" />
<link rel="index" title="Index" href="../../genindex.html" />
<link rel="search" title="Search" href="../../search.html" />
<link rel="copyright" title="Copyright" href="../../copyright.html" />
<link rel="next" title="kadmind" href="kadmind.html" />
<link rel="prev" title="Administration programs" href="index.html" />
- </head>
- <body>
+ </head><body>
<div class="header-wrapper">
<div class="header">
@@ -61,9 +52,9 @@
<div class="bodywrapper">
<div class="body" role="main">
- <div class="section" id="kadmin">
+ <section id="kadmin">
<span id="kadmin-1"></span><h1>kadmin<a class="headerlink" href="#kadmin" title="Permalink to this headline">¶</a></h1>
-<div class="section" id="synopsis">
+<section id="synopsis">
<h2>SYNOPSIS<a class="headerlink" href="#synopsis" title="Permalink to this headline">¶</a></h2>
<p id="kadmin-synopsis"><strong>kadmin</strong>
[<strong>-O</strong>|<strong>-N</strong>]
@@ -83,8 +74,8 @@
[<strong>-m</strong>]
[<strong>-x</strong> <em>db_args</em>]
[command args…]</p>
-</div>
-<div class="section" id="description">
+</section>
+<section id="description">
<h2>DESCRIPTION<a class="headerlink" href="#description" title="Permalink to this headline">¶</a></h2>
<p>kadmin and kadmin.local are command-line interfaces to the Kerberos V5
administration system. They provide nearly identical functionalities;
@@ -95,7 +86,7 @@ to refer to both versions. kadmin provides for the maintenance of
Kerberos principals, password policies, and service key tables
(keytabs).</p>
<p>The remote kadmin client uses Kerberos to authenticate to kadmind
-using the service principal <code class="docutils literal"><span class="pre">kadmin/admin</span></code> or <code class="docutils literal"><span class="pre">kadmin/ADMINHOST</span></code>
+using the service principal <code class="docutils literal notranslate"><span class="pre">kadmin/admin</span></code> or <code class="docutils literal notranslate"><span class="pre">kadmin/ADMINHOST</span></code>
(where <em>ADMINHOST</em> is the fully-qualified hostname of the admin
server). If the credentials cache contains a ticket for one of these
principals, and the <strong>-c</strong> credentials_cache option is specified, that
@@ -108,250 +99,250 @@ ticket to authenticate to kadmind.</p>
be run directly on the primary KDC with sufficient permissions to read
the KDC database. If the KDC database uses the LDAP database module,
kadmin.local can be run on any host which can access the LDAP server.</p>
-</div>
-<div class="section" id="options">
+</section>
+<section id="options">
<h2>OPTIONS<a class="headerlink" href="#options" title="Permalink to this headline">¶</a></h2>
-<dl class="docutils" id="kadmin-options">
-<dt><strong>-r</strong> <em>realm</em></dt>
-<dd>Use <em>realm</em> as the default database realm.</dd>
-<dt><strong>-p</strong> <em>principal</em></dt>
-<dd>Use <em>principal</em> to authenticate. Otherwise, kadmin will append
-<code class="docutils literal"><span class="pre">/admin</span></code> to the primary principal name of the default ccache,
+<dl class="simple" id="kadmin-options">
+<dt><strong>-r</strong> <em>realm</em></dt><dd><p>Use <em>realm</em> as the default database realm.</p>
+</dd>
+<dt><strong>-p</strong> <em>principal</em></dt><dd><p>Use <em>principal</em> to authenticate. Otherwise, kadmin will append
+<code class="docutils literal notranslate"><span class="pre">/admin</span></code> to the primary principal name of the default ccache,
the value of the <strong>USER</strong> environment variable, or the username as
-obtained with getpwuid, in order of preference.</dd>
-<dt><strong>-k</strong></dt>
-<dd>Use a keytab to decrypt the KDC response instead of prompting for
+obtained with getpwuid, in order of preference.</p>
+</dd>
+<dt><strong>-k</strong></dt><dd><p>Use a keytab to decrypt the KDC response instead of prompting for
a password. In this case, the default principal will be
-<code class="docutils literal"><span class="pre">host/hostname</span></code>. If there is no keytab specified with the
-<strong>-t</strong> option, then the default keytab will be used.</dd>
-<dt><strong>-t</strong> <em>keytab</em></dt>
-<dd>Use <em>keytab</em> to decrypt the KDC response. This can only be used
-with the <strong>-k</strong> option.</dd>
-<dt><strong>-n</strong></dt>
-<dd>Requests anonymous processing. Two types of anonymous principals
+<code class="docutils literal notranslate"><span class="pre">host/hostname</span></code>. If there is no keytab specified with the
+<strong>-t</strong> option, then the default keytab will be used.</p>
+</dd>
+<dt><strong>-t</strong> <em>keytab</em></dt><dd><p>Use <em>keytab</em> to decrypt the KDC response. This can only be used
+with the <strong>-k</strong> option.</p>
+</dd>
+<dt><strong>-n</strong></dt><dd><p>Requests anonymous processing. Two types of anonymous principals
are supported. For fully anonymous Kerberos, configure PKINIT on
the KDC and configure <strong>pkinit_anchors</strong> in the client’s
<a class="reference internal" href="../conf_files/krb5_conf.html#krb5-conf-5"><span class="std std-ref">krb5.conf</span></a>. Then use the <strong>-n</strong> option with a principal
-of the form <code class="docutils literal"><span class="pre">&#64;REALM</span></code> (an empty principal name followed by the
+of the form <code class="docutils literal notranslate"><span class="pre">&#64;REALM</span></code> (an empty principal name followed by the
at-sign and a realm name). If permitted by the KDC, an anonymous
ticket will be returned. A second form of anonymous tickets is
supported; these realm-exposed tickets hide the identity of the
-client but not the client’s realm. For this mode, use <code class="docutils literal"><span class="pre">kinit</span>
+client but not the client’s realm. For this mode, use <code class="docutils literal notranslate"><span class="pre">kinit</span>
<span class="pre">-n</span></code> with a normal principal name. If supported by the KDC, the
principal (but not realm) will be replaced by the anonymous
principal. As of release 1.8, the MIT Kerberos KDC only supports
-fully anonymous operation.</dd>
-<dt><strong>-c</strong> <em>credentials_cache</em></dt>
-<dd>Use <em>credentials_cache</em> as the credentials cache. The cache
-should contain a service ticket for the <code class="docutils literal"><span class="pre">kadmin/admin</span></code> or
-<code class="docutils literal"><span class="pre">kadmin/ADMINHOST</span></code> (where <em>ADMINHOST</em> is the fully-qualified
+fully anonymous operation.</p>
+</dd>
+<dt><strong>-c</strong> <em>credentials_cache</em></dt><dd><p>Use <em>credentials_cache</em> as the credentials cache. The cache
+should contain a service ticket for the <code class="docutils literal notranslate"><span class="pre">kadmin/admin</span></code> or
+<code class="docutils literal notranslate"><span class="pre">kadmin/ADMINHOST</span></code> (where <em>ADMINHOST</em> is the fully-qualified
hostname of the admin server) service; it can be acquired with the
<a class="reference internal" href="../../user/user_commands/kinit.html#kinit-1"><span class="std std-ref">kinit</span></a> program. If this option is not specified, kadmin
requests a new service ticket from the KDC, and stores it in its
-own temporary ccache.</dd>
-<dt><strong>-w</strong> <em>password</em></dt>
-<dd>Use <em>password</em> instead of prompting for one. Use this option with
+own temporary ccache.</p>
+</dd>
+<dt><strong>-w</strong> <em>password</em></dt><dd><p>Use <em>password</em> instead of prompting for one. Use this option with
care, as it may expose the password to other users on the system
-via the process list.</dd>
-<dt><strong>-q</strong> <em>query</em></dt>
-<dd>Perform the specified query and then exit.</dd>
-<dt><strong>-d</strong> <em>dbname</em></dt>
-<dd>Specifies the name of the KDC database. This option does not
-apply to the LDAP database module.</dd>
-<dt><strong>-s</strong> <em>admin_server</em>[:<em>port</em>]</dt>
-<dd>Specifies the admin server which kadmin should contact.</dd>
-<dt><strong>-m</strong></dt>
-<dd>If using kadmin.local, prompt for the database master password
-instead of reading it from a stash file.</dd>
-<dt><strong>-e</strong> “<em>enc</em>:<em>salt</em> …”</dt>
-<dd>Sets the keysalt list to be used for any new keys created. See
+via the process list.</p>
+</dd>
+<dt><strong>-q</strong> <em>query</em></dt><dd><p>Perform the specified query and then exit.</p>
+</dd>
+<dt><strong>-d</strong> <em>dbname</em></dt><dd><p>Specifies the name of the KDC database. This option does not
+apply to the LDAP database module.</p>
+</dd>
+<dt><strong>-s</strong> <em>admin_server</em>[:<em>port</em>]</dt><dd><p>Specifies the admin server which kadmin should contact.</p>
+</dd>
+<dt><strong>-m</strong></dt><dd><p>If using kadmin.local, prompt for the database master password
+instead of reading it from a stash file.</p>
+</dd>
+<dt><strong>-e</strong> “<em>enc</em>:<em>salt</em> …”</dt><dd><p>Sets the keysalt list to be used for any new keys created. See
<a class="reference internal" href="../conf_files/kdc_conf.html#keysalt-lists"><span class="std std-ref">Keysalt lists</span></a> in <a class="reference internal" href="../conf_files/kdc_conf.html#kdc-conf-5"><span class="std std-ref">kdc.conf</span></a> for a list of possible
-values.</dd>
-<dt><strong>-O</strong></dt>
-<dd>Force use of old AUTH_GSSAPI authentication flavor.</dd>
-<dt><strong>-N</strong></dt>
-<dd>Prevent fallback to AUTH_GSSAPI authentication flavor.</dd>
-<dt><strong>-x</strong> <em>db_args</em></dt>
-<dd>Specifies the database specific arguments. See the next section
-for supported options.</dd>
+values.</p>
+</dd>
+<dt><strong>-O</strong></dt><dd><p>Force use of old AUTH_GSSAPI authentication flavor.</p>
+</dd>
+<dt><strong>-N</strong></dt><dd><p>Prevent fallback to AUTH_GSSAPI authentication flavor.</p>
+</dd>
+<dt><strong>-x</strong> <em>db_args</em></dt><dd><p>Specifies the database specific arguments. See the next section
+for supported options.</p>
+</dd>
</dl>
<p>Starting with release 1.14, if any command-line arguments remain after
the options, they will be treated as a single query to be executed.
This mode of operation is intended for scripts and behaves differently
from the interactive mode in several respects:</p>
<ul class="simple">
-<li>Query arguments are split by the shell, not by kadmin.</li>
-<li>Informational and warning messages are suppressed. Error messages
+<li><p>Query arguments are split by the shell, not by kadmin.</p></li>
+<li><p>Informational and warning messages are suppressed. Error messages
and query output (e.g. for <strong>get_principal</strong>) will still be
-displayed.</li>
-<li>Confirmation prompts are disabled (as if <strong>-force</strong> was given).
-Password prompts will still be issued as required.</li>
-<li>The exit status will be non-zero if the query fails.</li>
+displayed.</p></li>
+<li><p>Confirmation prompts are disabled (as if <strong>-force</strong> was given).
+Password prompts will still be issued as required.</p></li>
+<li><p>The exit status will be non-zero if the query fails.</p></li>
</ul>
<p>The <strong>-q</strong> option does not carry these behavior differences; the query
will be processed as if it was entered interactively. The <strong>-q</strong>
option cannot be used in combination with a query in the remaining
arguments.</p>
-</div>
-<div class="section" id="database-options">
+</section>
+<section id="database-options">
<span id="dboptions"></span><h2>DATABASE OPTIONS<a class="headerlink" href="#database-options" title="Permalink to this headline">¶</a></h2>
<p>Database options can be used to override database-specific defaults.
Supported options for the DB2 module are:</p>
<blockquote>
-<div><dl class="docutils">
-<dt><strong>-x dbname=</strong>*filename*</dt>
-<dd>Specifies the base filename of the DB2 database.</dd>
-<dt><strong>-x lockiter</strong></dt>
-<dd>Make iteration operations hold the lock for the duration of
+<div><dl class="simple">
+<dt><strong>-x dbname=</strong>*filename*</dt><dd><p>Specifies the base filename of the DB2 database.</p>
+</dd>
+<dt><strong>-x lockiter</strong></dt><dd><p>Make iteration operations hold the lock for the duration of
the entire operation, rather than temporarily releasing the
lock while handling each principal. This is the default
behavior, but this option exists to allow command line
override of a [dbmodules] setting. First introduced in
-release 1.13.</dd>
-<dt><strong>-x unlockiter</strong></dt>
-<dd>Make iteration operations unlock the database for each
+release 1.13.</p>
+</dd>
+<dt><strong>-x unlockiter</strong></dt><dd><p>Make iteration operations unlock the database for each
principal, instead of holding the lock for the duration of the
-entire operation. First introduced in release 1.13.</dd>
+entire operation. First introduced in release 1.13.</p>
+</dd>
</dl>
</div></blockquote>
<p>Supported options for the LDAP module are:</p>
<blockquote>
-<div><dl class="docutils">
-<dt><strong>-x host=</strong><em>ldapuri</em></dt>
-<dd>Specifies the LDAP server to connect to by a LDAP URI.</dd>
-<dt><strong>-x binddn=</strong><em>bind_dn</em></dt>
-<dd>Specifies the DN used to bind to the LDAP server.</dd>
-<dt><strong>-x bindpwd=</strong><em>password</em></dt>
-<dd>Specifies the password or SASL secret used to bind to the LDAP
+<div><dl class="simple">
+<dt><strong>-x host=</strong><em>ldapuri</em></dt><dd><p>Specifies the LDAP server to connect to by a LDAP URI.</p>
+</dd>
+<dt><strong>-x binddn=</strong><em>bind_dn</em></dt><dd><p>Specifies the DN used to bind to the LDAP server.</p>
+</dd>
+<dt><strong>-x bindpwd=</strong><em>password</em></dt><dd><p>Specifies the password or SASL secret used to bind to the LDAP
server. Using this option may expose the password to other
users on the system via the process list; to avoid this,
instead stash the password using the <strong>stashsrvpw</strong> command of
-<a class="reference internal" href="kdb5_ldap_util.html#kdb5-ldap-util-8"><span class="std std-ref">kdb5_ldap_util</span></a>.</dd>
-<dt><strong>-x sasl_mech=</strong><em>mechanism</em></dt>
-<dd>Specifies the SASL mechanism used to bind to the LDAP server.
+<a class="reference internal" href="kdb5_ldap_util.html#kdb5-ldap-util-8"><span class="std std-ref">kdb5_ldap_util</span></a>.</p>
+</dd>
+<dt><strong>-x sasl_mech=</strong><em>mechanism</em></dt><dd><p>Specifies the SASL mechanism used to bind to the LDAP server.
The bind DN is ignored if a SASL mechanism is used. New in
-release 1.13.</dd>
-<dt><strong>-x sasl_authcid=</strong><em>name</em></dt>
-<dd>Specifies the authentication name used when binding to the
+release 1.13.</p>
+</dd>
+<dt><strong>-x sasl_authcid=</strong><em>name</em></dt><dd><p>Specifies the authentication name used when binding to the
LDAP server with a SASL mechanism, if the mechanism requires
-one. New in release 1.13.</dd>
-<dt><strong>-x sasl_authzid=</strong><em>name</em></dt>
-<dd>Specifies the authorization name used when binding to the LDAP
-server with a SASL mechanism. New in release 1.13.</dd>
-<dt><strong>-x sasl_realm=</strong><em>realm</em></dt>
-<dd>Specifies the realm used when binding to the LDAP server with
+one. New in release 1.13.</p>
+</dd>
+<dt><strong>-x sasl_authzid=</strong><em>name</em></dt><dd><p>Specifies the authorization name used when binding to the LDAP
+server with a SASL mechanism. New in release 1.13.</p>
+</dd>
+<dt><strong>-x sasl_realm=</strong><em>realm</em></dt><dd><p>Specifies the realm used when binding to the LDAP server with
a SASL mechanism, if the mechanism uses one. New in release
-1.13.</dd>
-<dt><strong>-x debug=</strong><em>level</em></dt>
-<dd>sets the OpenLDAP client library debug level. <em>level</em> is an
+1.13.</p>
+</dd>
+<dt><strong>-x debug=</strong><em>level</em></dt><dd><p>sets the OpenLDAP client library debug level. <em>level</em> is an
integer to be interpreted by the library. Debugging messages
-are printed to standard error. New in release 1.12.</dd>
+are printed to standard error. New in release 1.12.</p>
+</dd>
</dl>
</div></blockquote>
-</div>
-<div class="section" id="commands">
+</section>
+<section id="commands">
<h2>COMMANDS<a class="headerlink" href="#commands" title="Permalink to this headline">¶</a></h2>
<p>When using the remote client, available commands may be restricted
according to the privileges specified in the <a class="reference internal" href="../conf_files/kadm5_acl.html#kadm5-acl-5"><span class="std std-ref">kadm5.acl</span></a> file
on the admin server.</p>
-<div class="section" id="add-principal">
+<section id="add-principal">
<span id="id1"></span><h3>add_principal<a class="headerlink" href="#add-principal" title="Permalink to this headline">¶</a></h3>
<blockquote>
-<div><strong>add_principal</strong> [<em>options</em>] <em>newprinc</em></div></blockquote>
+<div><p><strong>add_principal</strong> [<em>options</em>] <em>newprinc</em></p>
+</div></blockquote>
<p>Creates the principal <em>newprinc</em>, prompting twice for a password. If
no password policy is specified with the <strong>-policy</strong> option, and the
-policy named <code class="docutils literal"><span class="pre">default</span></code> is assigned to the principal if it exists.
-However, creating a policy named <code class="docutils literal"><span class="pre">default</span></code> will not automatically
+policy named <code class="docutils literal notranslate"><span class="pre">default</span></code> is assigned to the principal if it exists.
+However, creating a policy named <code class="docutils literal notranslate"><span class="pre">default</span></code> will not automatically
assign this policy to previously existing principals. This policy
assignment can be suppressed with the <strong>-clearpolicy</strong> option.</p>
<p>This command requires the <strong>add</strong> privilege.</p>
<p>Aliases: <strong>addprinc</strong>, <strong>ank</strong></p>
<p>Options:</p>
-<dl class="docutils">
-<dt><strong>-expire</strong> <em>expdate</em></dt>
-<dd>(<a class="reference internal" href="../../basic/date_format.html#getdate"><span class="std std-ref">getdate time</span></a> string) The expiration date of the principal.</dd>
-<dt><strong>-pwexpire</strong> <em>pwexpdate</em></dt>
-<dd>(<a class="reference internal" href="../../basic/date_format.html#getdate"><span class="std std-ref">getdate time</span></a> string) The password expiration date.</dd>
-<dt><strong>-maxlife</strong> <em>maxlife</em></dt>
-<dd>(<a class="reference internal" href="../../basic/date_format.html#duration"><span class="std std-ref">Time duration</span></a> or <a class="reference internal" href="../../basic/date_format.html#getdate"><span class="std std-ref">getdate time</span></a> string) The maximum ticket life
-for the principal.</dd>
-<dt><strong>-maxrenewlife</strong> <em>maxrenewlife</em></dt>
-<dd>(<a class="reference internal" href="../../basic/date_format.html#duration"><span class="std std-ref">Time duration</span></a> or <a class="reference internal" href="../../basic/date_format.html#getdate"><span class="std std-ref">getdate time</span></a> string) The maximum renewable
-life of tickets for the principal.</dd>
-<dt><strong>-kvno</strong> <em>kvno</em></dt>
-<dd>The initial key version number.</dd>
-<dt><strong>-policy</strong> <em>policy</em></dt>
-<dd>The password policy used by this principal. If not specified, the
-policy <code class="docutils literal"><span class="pre">default</span></code> is used if it exists (unless <strong>-clearpolicy</strong>
-is specified).</dd>
-<dt><strong>-clearpolicy</strong></dt>
-<dd>Prevents any policy from being assigned when <strong>-policy</strong> is not
-specified.</dd>
-<dt>{-|+}<strong>allow_postdated</strong></dt>
-<dd><strong>-allow_postdated</strong> prohibits this principal from obtaining
-postdated tickets. <strong>+allow_postdated</strong> clears this flag.</dd>
-<dt>{-|+}<strong>allow_forwardable</strong></dt>
-<dd><strong>-allow_forwardable</strong> prohibits this principal from obtaining
-forwardable tickets. <strong>+allow_forwardable</strong> clears this flag.</dd>
-<dt>{-|+}<strong>allow_renewable</strong></dt>
-<dd><strong>-allow_renewable</strong> prohibits this principal from obtaining
-renewable tickets. <strong>+allow_renewable</strong> clears this flag.</dd>
-<dt>{-|+}<strong>allow_proxiable</strong></dt>
-<dd><strong>-allow_proxiable</strong> prohibits this principal from obtaining
-proxiable tickets. <strong>+allow_proxiable</strong> clears this flag.</dd>
-<dt>{-|+}<strong>allow_dup_skey</strong></dt>
-<dd><strong>-allow_dup_skey</strong> disables user-to-user authentication for this
+<dl>
+<dt><strong>-expire</strong> <em>expdate</em></dt><dd><p>(<a class="reference internal" href="../../basic/date_format.html#getdate"><span class="std std-ref">getdate time</span></a> string) The expiration date of the principal.</p>
+</dd>
+<dt><strong>-pwexpire</strong> <em>pwexpdate</em></dt><dd><p>(<a class="reference internal" href="../../basic/date_format.html#getdate"><span class="std std-ref">getdate time</span></a> string) The password expiration date.</p>
+</dd>
+<dt><strong>-maxlife</strong> <em>maxlife</em></dt><dd><p>(<a class="reference internal" href="../../basic/date_format.html#duration"><span class="std std-ref">Time duration</span></a> or <a class="reference internal" href="../../basic/date_format.html#getdate"><span class="std std-ref">getdate time</span></a> string) The maximum ticket life
+for the principal.</p>
+</dd>
+<dt><strong>-maxrenewlife</strong> <em>maxrenewlife</em></dt><dd><p>(<a class="reference internal" href="../../basic/date_format.html#duration"><span class="std std-ref">Time duration</span></a> or <a class="reference internal" href="../../basic/date_format.html#getdate"><span class="std std-ref">getdate time</span></a> string) The maximum renewable
+life of tickets for the principal.</p>
+</dd>
+<dt><strong>-kvno</strong> <em>kvno</em></dt><dd><p>The initial key version number.</p>
+</dd>
+<dt><strong>-policy</strong> <em>policy</em></dt><dd><p>The password policy used by this principal. If not specified, the
+policy <code class="docutils literal notranslate"><span class="pre">default</span></code> is used if it exists (unless <strong>-clearpolicy</strong>
+is specified).</p>
+</dd>
+<dt><strong>-clearpolicy</strong></dt><dd><p>Prevents any policy from being assigned when <strong>-policy</strong> is not
+specified.</p>
+</dd>
+<dt>{-|+}<strong>allow_postdated</strong></dt><dd><p><strong>-allow_postdated</strong> prohibits this principal from obtaining
+postdated tickets. <strong>+allow_postdated</strong> clears this flag.</p>
+</dd>
+<dt>{-|+}<strong>allow_forwardable</strong></dt><dd><p><strong>-allow_forwardable</strong> prohibits this principal from obtaining
+forwardable tickets. <strong>+allow_forwardable</strong> clears this flag.</p>
+</dd>
+<dt>{-|+}<strong>allow_renewable</strong></dt><dd><p><strong>-allow_renewable</strong> prohibits this principal from obtaining
+renewable tickets. <strong>+allow_renewable</strong> clears this flag.</p>
+</dd>
+<dt>{-|+}<strong>allow_proxiable</strong></dt><dd><p><strong>-allow_proxiable</strong> prohibits this principal from obtaining
+proxiable tickets. <strong>+allow_proxiable</strong> clears this flag.</p>
+</dd>
+<dt>{-|+}<strong>allow_dup_skey</strong></dt><dd><p><strong>-allow_dup_skey</strong> disables user-to-user authentication for this
principal by prohibiting others from obtaining a service ticket
encrypted in this principal’s TGT session key.
-<strong>+allow_dup_skey</strong> clears this flag.</dd>
-<dt>{-|+}<strong>requires_preauth</strong></dt>
-<dd><strong>+requires_preauth</strong> requires this principal to preauthenticate
+<strong>+allow_dup_skey</strong> clears this flag.</p>
+</dd>
+<dt>{-|+}<strong>requires_preauth</strong></dt><dd><p><strong>+requires_preauth</strong> requires this principal to preauthenticate
before being allowed to kinit. <strong>-requires_preauth</strong> clears this
flag. When <strong>+requires_preauth</strong> is set on a service principal,
the KDC will only issue service tickets for that service principal
if the client’s initial authentication was performed using
-preauthentication.</dd>
-<dt>{-|+}<strong>requires_hwauth</strong></dt>
-<dd><strong>+requires_hwauth</strong> requires this principal to preauthenticate
+preauthentication.</p>
+</dd>
+<dt>{-|+}<strong>requires_hwauth</strong></dt><dd><p><strong>+requires_hwauth</strong> requires this principal to preauthenticate
using a hardware device before being allowed to kinit.
<strong>-requires_hwauth</strong> clears this flag. When <strong>+requires_hwauth</strong> is
set on a service principal, the KDC will only issue service tickets
for that service principal if the client’s initial authentication was
-performed using a hardware device to preauthenticate.</dd>
-<dt>{-|+}<strong>ok_as_delegate</strong></dt>
-<dd><strong>+ok_as_delegate</strong> sets the <strong>okay as delegate</strong> flag on tickets
+performed using a hardware device to preauthenticate.</p>
+</dd>
+<dt>{-|+}<strong>ok_as_delegate</strong></dt><dd><p><strong>+ok_as_delegate</strong> sets the <strong>okay as delegate</strong> flag on tickets
issued with this principal as the service. Clients may use this
flag as a hint that credentials should be delegated when
authenticating to the service. <strong>-ok_as_delegate</strong> clears this
-flag.</dd>
-<dt>{-|+}<strong>allow_svr</strong></dt>
-<dd><strong>-allow_svr</strong> prohibits the issuance of service tickets for this
+flag.</p>
+</dd>
+<dt>{-|+}<strong>allow_svr</strong></dt><dd><p><strong>-allow_svr</strong> prohibits the issuance of service tickets for this
principal. In release 1.17 and later, user-to-user service
tickets are still allowed unless the <strong>-allow_dup_skey</strong> flag is
-also set. <strong>+allow_svr</strong> clears this flag.</dd>
-<dt>{-|+}<strong>allow_tgs_req</strong></dt>
-<dd><strong>-allow_tgs_req</strong> specifies that a Ticket-Granting Service (TGS)
+also set. <strong>+allow_svr</strong> clears this flag.</p>
+</dd>
+<dt>{-|+}<strong>allow_tgs_req</strong></dt><dd><p><strong>-allow_tgs_req</strong> specifies that a Ticket-Granting Service (TGS)
request for a service ticket for this principal is not permitted.
-<strong>+allow_tgs_req</strong> clears this flag.</dd>
-<dt>{-|+}<strong>allow_tix</strong></dt>
-<dd><strong>-allow_tix</strong> forbids the issuance of any tickets for this
-principal. <strong>+allow_tix</strong> clears this flag.</dd>
-<dt>{-|+}<strong>needchange</strong></dt>
-<dd><strong>+needchange</strong> forces a password change on the next initial
+<strong>+allow_tgs_req</strong> clears this flag.</p>
+</dd>
+<dt>{-|+}<strong>allow_tix</strong></dt><dd><p><strong>-allow_tix</strong> forbids the issuance of any tickets for this
+principal. <strong>+allow_tix</strong> clears this flag.</p>
+</dd>
+<dt>{-|+}<strong>needchange</strong></dt><dd><p><strong>+needchange</strong> forces a password change on the next initial
authentication to this principal. <strong>-needchange</strong> clears this
-flag.</dd>
-<dt>{-|+}<strong>password_changing_service</strong></dt>
-<dd><strong>+password_changing_service</strong> marks this principal as a password
-change service principal.</dd>
-<dt>{-|+}<strong>ok_to_auth_as_delegate</strong></dt>
-<dd><strong>+ok_to_auth_as_delegate</strong> allows this principal to acquire
+flag.</p>
+</dd>
+<dt>{-|+}<strong>password_changing_service</strong></dt><dd><p><strong>+password_changing_service</strong> marks this principal as a password
+change service principal.</p>
+</dd>
+<dt>{-|+}<strong>ok_to_auth_as_delegate</strong></dt><dd><p><strong>+ok_to_auth_as_delegate</strong> allows this principal to acquire
forwardable tickets to itself from arbitrary users, for use with
-constrained delegation.</dd>
-<dt>{-|+}<strong>no_auth_data_required</strong></dt>
-<dd><strong>+no_auth_data_required</strong> prevents PAC or AD-SIGNEDPATH data from
-being added to service tickets for the principal.</dd>
-<dt>{-|+}<strong>lockdown_keys</strong></dt>
-<dd><strong>+lockdown_keys</strong> prevents keys for this principal from leaving
+constrained delegation.</p>
+</dd>
+<dt>{-|+}<strong>no_auth_data_required</strong></dt><dd><p><strong>+no_auth_data_required</strong> prevents PAC or AD-SIGNEDPATH data from
+being added to service tickets for the principal.</p>
+</dd>
+<dt>{-|+}<strong>lockdown_keys</strong></dt><dd><p><strong>+lockdown_keys</strong> prevents keys for this principal from leaving
the KDC via kadmind. The chpass and extract operations are denied
for a principal with this attribute. The chrand operation is
allowed, but will not return the new keys. The delete and rename
@@ -359,54 +350,54 @@ operations are also denied if this attribute is set, in order to
prevent a malicious administrator from replacing principals like
krbtgt/* or kadmin/* with new principals without the attribute.
This attribute can be set via the network protocol, but can only
-be removed using kadmin.local.</dd>
-<dt><strong>-randkey</strong></dt>
-<dd>Sets the key of the principal to a random value.</dd>
-<dt><strong>-nokey</strong></dt>
-<dd>Causes the principal to be created with no key. New in release
-1.12.</dd>
-<dt><strong>-pw</strong> <em>password</em></dt>
-<dd>Sets the password of the principal to the specified string and
+be removed using kadmin.local.</p>
+</dd>
+<dt><strong>-randkey</strong></dt><dd><p>Sets the key of the principal to a random value.</p>
+</dd>
+<dt><strong>-nokey</strong></dt><dd><p>Causes the principal to be created with no key. New in release
+1.12.</p>
+</dd>
+<dt><strong>-pw</strong> <em>password</em></dt><dd><p>Sets the password of the principal to the specified string and
does not prompt for a password. Note: using this option in a
shell script may expose the password to other users on the system
-via the process list.</dd>
-<dt><strong>-e</strong> <em>enc</em>:<em>salt</em>,…</dt>
-<dd>Uses the specified keysalt list for setting the keys of the
+via the process list.</p>
+</dd>
+<dt><strong>-e</strong> <em>enc</em>:<em>salt</em>,…</dt><dd><p>Uses the specified keysalt list for setting the keys of the
principal. See <a class="reference internal" href="../conf_files/kdc_conf.html#keysalt-lists"><span class="std std-ref">Keysalt lists</span></a> in <a class="reference internal" href="../conf_files/kdc_conf.html#kdc-conf-5"><span class="std std-ref">kdc.conf</span></a> for a
-list of possible values.</dd>
-<dt><strong>-x</strong> <em>db_princ_args</em></dt>
-<dd><p class="first">Indicates database-specific options. The options for the LDAP
+list of possible values.</p>
+</dd>
+<dt><strong>-x</strong> <em>db_princ_args</em></dt><dd><p>Indicates database-specific options. The options for the LDAP
database module are:</p>
-<dl class="docutils">
-<dt><strong>-x dn=</strong><em>dn</em></dt>
-<dd>Specifies the LDAP object that will contain the Kerberos
-principal being created.</dd>
-<dt><strong>-x linkdn=</strong><em>dn</em></dt>
-<dd>Specifies the LDAP object to which the newly created Kerberos
-principal object will point.</dd>
-<dt><strong>-x containerdn=</strong><em>container_dn</em></dt>
-<dd>Specifies the container object under which the Kerberos
-principal is to be created.</dd>
-<dt><strong>-x tktpolicy=</strong><em>policy</em></dt>
-<dd>Associates a ticket policy to the Kerberos principal.</dd>
+<dl class="simple">
+<dt><strong>-x dn=</strong><em>dn</em></dt><dd><p>Specifies the LDAP object that will contain the Kerberos
+principal being created.</p>
+</dd>
+<dt><strong>-x linkdn=</strong><em>dn</em></dt><dd><p>Specifies the LDAP object to which the newly created Kerberos
+principal object will point.</p>
+</dd>
+<dt><strong>-x containerdn=</strong><em>container_dn</em></dt><dd><p>Specifies the container object under which the Kerberos
+principal is to be created.</p>
+</dd>
+<dt><strong>-x tktpolicy=</strong><em>policy</em></dt><dd><p>Associates a ticket policy to the Kerberos principal.</p>
+</dd>
</dl>
-<div class="last admonition note">
-<p class="first admonition-title">Note</p>
-<ul class="last simple">
-<li>The <strong>containerdn</strong> and <strong>linkdn</strong> options cannot be
-specified with the <strong>dn</strong> option.</li>
-<li>If the <em>dn</em> or <em>containerdn</em> options are not specified while
+<div class="admonition note">
+<p class="admonition-title">Note</p>
+<ul class="simple">
+<li><p>The <strong>containerdn</strong> and <strong>linkdn</strong> options cannot be
+specified with the <strong>dn</strong> option.</p></li>
+<li><p>If the <em>dn</em> or <em>containerdn</em> options are not specified while
adding the principal, the principals are created under the
principal container configured in the realm or the realm
-container.</li>
-<li><em>dn</em> and <em>containerdn</em> should be within the subtrees or
-principal container configured in the realm.</li>
+container.</p></li>
+<li><p><em>dn</em> and <em>containerdn</em> should be within the subtrees or
+principal container configured in the realm.</p></li>
</ul>
</div>
</dd>
</dl>
<p>Example:</p>
-<div class="highlight-default"><div class="highlight"><pre><span></span><span class="n">kadmin</span><span class="p">:</span> <span class="n">addprinc</span> <span class="n">jennifer</span>
+<div class="highlight-default notranslate"><div class="highlight"><pre><span></span><span class="n">kadmin</span><span class="p">:</span> <span class="n">addprinc</span> <span class="n">jennifer</span>
<span class="n">No</span> <span class="n">policy</span> <span class="n">specified</span> <span class="k">for</span> <span class="s2">&quot;jennifer@ATHENA.MIT.EDU&quot;</span><span class="p">;</span>
<span class="n">defaulting</span> <span class="n">to</span> <span class="n">no</span> <span class="n">policy</span><span class="o">.</span>
<span class="n">Enter</span> <span class="n">password</span> <span class="k">for</span> <span class="n">principal</span> <span class="n">jennifer</span><span class="nd">@ATHENA</span><span class="o">.</span><span class="n">MIT</span><span class="o">.</span><span class="n">EDU</span><span class="p">:</span>
@@ -415,11 +406,12 @@ principal container configured in the realm.</li>
<span class="n">kadmin</span><span class="p">:</span>
</pre></div>
</div>
-</div>
-<div class="section" id="modify-principal">
+</section>
+<section id="modify-principal">
<span id="id2"></span><h3>modify_principal<a class="headerlink" href="#modify-principal" title="Permalink to this headline">¶</a></h3>
<blockquote>
-<div><strong>modify_principal</strong> [<em>options</em>] <em>principal</em></div></blockquote>
+<div><p><strong>modify_principal</strong> [<em>options</em>] <em>principal</em></p>
+</div></blockquote>
<p>Modifies the specified principal, changing the fields as specified.
The options to <strong>add_principal</strong> also apply to this command, except
for the <strong>-randkey</strong>, <strong>-pw</strong>, and <strong>-e</strong> options. In addition, the
@@ -427,36 +419,39 @@ option <strong>-clearpolicy</strong> will clear the current policy of a principa
<p>This command requires the <em>modify</em> privilege.</p>
<p>Alias: <strong>modprinc</strong></p>
<p>Options (in addition to the <strong>addprinc</strong> options):</p>
-<dl class="docutils">
-<dt><strong>-unlock</strong></dt>
-<dd>Unlocks a locked principal (one which has received too many failed
+<dl class="simple">
+<dt><strong>-unlock</strong></dt><dd><p>Unlocks a locked principal (one which has received too many failed
authentication attempts without enough time between them according
-to its password policy) so that it can successfully authenticate.</dd>
+to its password policy) so that it can successfully authenticate.</p>
+</dd>
</dl>
-</div>
-<div class="section" id="rename-principal">
+</section>
+<section id="rename-principal">
<span id="id3"></span><h3>rename_principal<a class="headerlink" href="#rename-principal" title="Permalink to this headline">¶</a></h3>
<blockquote>
-<div><strong>rename_principal</strong> [<strong>-force</strong>] <em>old_principal</em> <em>new_principal</em></div></blockquote>
+<div><p><strong>rename_principal</strong> [<strong>-force</strong>] <em>old_principal</em> <em>new_principal</em></p>
+</div></blockquote>
<p>Renames the specified <em>old_principal</em> to <em>new_principal</em>. This
command prompts for confirmation, unless the <strong>-force</strong> option is
given.</p>
<p>This command requires the <strong>add</strong> and <strong>delete</strong> privileges.</p>
<p>Alias: <strong>renprinc</strong></p>
-</div>
-<div class="section" id="delete-principal">
+</section>
+<section id="delete-principal">
<span id="id4"></span><h3>delete_principal<a class="headerlink" href="#delete-principal" title="Permalink to this headline">¶</a></h3>
<blockquote>
-<div><strong>delete_principal</strong> [<strong>-force</strong>] <em>principal</em></div></blockquote>
+<div><p><strong>delete_principal</strong> [<strong>-force</strong>] <em>principal</em></p>
+</div></blockquote>
<p>Deletes the specified <em>principal</em> from the database. This command
prompts for deletion, unless the <strong>-force</strong> option is given.</p>
<p>This command requires the <strong>delete</strong> privilege.</p>
<p>Alias: <strong>delprinc</strong></p>
-</div>
-<div class="section" id="change-password">
+</section>
+<section id="change-password">
<span id="id5"></span><h3>change_password<a class="headerlink" href="#change-password" title="Permalink to this headline">¶</a></h3>
<blockquote>
-<div><strong>change_password</strong> [<em>options</em>] <em>principal</em></div></blockquote>
+<div><p><strong>change_password</strong> [<em>options</em>] <em>principal</em></p>
+</div></blockquote>
<p>Changes the password of <em>principal</em>. Prompts for a new password if
neither <strong>-randkey</strong> or <strong>-pw</strong> is specified.</p>
<p>This command requires the <strong>changepw</strong> privilege, or that the
@@ -464,52 +459,54 @@ principal running the program is the same as the principal being
changed.</p>
<p>Alias: <strong>cpw</strong></p>
<p>The following options are available:</p>
-<dl class="docutils">
-<dt><strong>-randkey</strong></dt>
-<dd>Sets the key of the principal to a random value.</dd>
-<dt><strong>-pw</strong> <em>password</em></dt>
-<dd>Set the password to the specified string. Using this option in a
+<dl class="simple">
+<dt><strong>-randkey</strong></dt><dd><p>Sets the key of the principal to a random value.</p>
+</dd>
+<dt><strong>-pw</strong> <em>password</em></dt><dd><p>Set the password to the specified string. Using this option in a
script may expose the password to other users on the system via
-the process list.</dd>
-<dt><strong>-e</strong> <em>enc</em>:<em>salt</em>,…</dt>
-<dd>Uses the specified keysalt list for setting the keys of the
+the process list.</p>
+</dd>
+<dt><strong>-e</strong> <em>enc</em>:<em>salt</em>,…</dt><dd><p>Uses the specified keysalt list for setting the keys of the
principal. See <a class="reference internal" href="../conf_files/kdc_conf.html#keysalt-lists"><span class="std std-ref">Keysalt lists</span></a> in <a class="reference internal" href="../conf_files/kdc_conf.html#kdc-conf-5"><span class="std std-ref">kdc.conf</span></a> for a
-list of possible values.</dd>
-<dt><strong>-keepold</strong></dt>
-<dd>Keeps the existing keys in the database. This flag is usually not
-necessary except perhaps for <code class="docutils literal"><span class="pre">krbtgt</span></code> principals.</dd>
+list of possible values.</p>
+</dd>
+<dt><strong>-keepold</strong></dt><dd><p>Keeps the existing keys in the database. This flag is usually not
+necessary except perhaps for <code class="docutils literal notranslate"><span class="pre">krbtgt</span></code> principals.</p>
+</dd>
</dl>
<p>Example:</p>
-<div class="highlight-default"><div class="highlight"><pre><span></span><span class="n">kadmin</span><span class="p">:</span> <span class="n">cpw</span> <span class="n">systest</span>
+<div class="highlight-default notranslate"><div class="highlight"><pre><span></span><span class="n">kadmin</span><span class="p">:</span> <span class="n">cpw</span> <span class="n">systest</span>
<span class="n">Enter</span> <span class="n">password</span> <span class="k">for</span> <span class="n">principal</span> <span class="n">systest</span><span class="nd">@BLEEP</span><span class="o">.</span><span class="n">COM</span><span class="p">:</span>
<span class="n">Re</span><span class="o">-</span><span class="n">enter</span> <span class="n">password</span> <span class="k">for</span> <span class="n">principal</span> <span class="n">systest</span><span class="nd">@BLEEP</span><span class="o">.</span><span class="n">COM</span><span class="p">:</span>
<span class="n">Password</span> <span class="k">for</span> <span class="n">systest</span><span class="nd">@BLEEP</span><span class="o">.</span><span class="n">COM</span> <span class="n">changed</span><span class="o">.</span>
<span class="n">kadmin</span><span class="p">:</span>
</pre></div>
</div>
-</div>
-<div class="section" id="purgekeys">
+</section>
+<section id="purgekeys">
<span id="id6"></span><h3>purgekeys<a class="headerlink" href="#purgekeys" title="Permalink to this headline">¶</a></h3>
<blockquote>
-<div><strong>purgekeys</strong> [<strong>-all</strong>|<strong>-keepkvno</strong> <em>oldest_kvno_to_keep</em>] <em>principal</em></div></blockquote>
+<div><p><strong>purgekeys</strong> [<strong>-all</strong>|<strong>-keepkvno</strong> <em>oldest_kvno_to_keep</em>] <em>principal</em></p>
+</div></blockquote>
<p>Purges previously retained old keys (e.g., from <strong>change_password
-keepold</strong>) from <em>principal</em>. If <strong>-keepkvno</strong> is specified, then
only purges keys with kvnos lower than <em>oldest_kvno_to_keep</em>. If
<strong>-all</strong> is specified, then all keys are purged. The <strong>-all</strong> option
is new in release 1.12.</p>
<p>This command requires the <strong>modify</strong> privilege.</p>
-</div>
-<div class="section" id="get-principal">
+</section>
+<section id="get-principal">
<span id="id7"></span><h3>get_principal<a class="headerlink" href="#get-principal" title="Permalink to this headline">¶</a></h3>
<blockquote>
-<div><strong>get_principal</strong> [<strong>-terse</strong>] <em>principal</em></div></blockquote>
+<div><p><strong>get_principal</strong> [<strong>-terse</strong>] <em>principal</em></p>
+</div></blockquote>
<p>Gets the attributes of principal. With the <strong>-terse</strong> option, outputs
fields as quoted tab-separated strings.</p>
<p>This command requires the <strong>inquire</strong> privilege, or that the principal
running the the program to be the same as the one being listed.</p>
<p>Alias: <strong>getprinc</strong></p>
<p>Examples:</p>
-<div class="highlight-default"><div class="highlight"><pre><span></span><span class="n">kadmin</span><span class="p">:</span> <span class="n">getprinc</span> <span class="n">tlyu</span><span class="o">/</span><span class="n">admin</span>
+<div class="highlight-default notranslate"><div class="highlight"><pre><span></span><span class="n">kadmin</span><span class="p">:</span> <span class="n">getprinc</span> <span class="n">tlyu</span><span class="o">/</span><span class="n">admin</span>
<span class="n">Principal</span><span class="p">:</span> <span class="n">tlyu</span><span class="o">/</span><span class="n">admin</span><span class="nd">@BLEEP</span><span class="o">.</span><span class="n">COM</span>
<span class="n">Expiration</span> <span class="n">date</span><span class="p">:</span> <span class="p">[</span><span class="n">never</span><span class="p">]</span>
<span class="n">Last</span> <span class="n">password</span> <span class="n">change</span><span class="p">:</span> <span class="n">Mon</span> <span class="n">Aug</span> <span class="mi">12</span> <span class="mi">14</span><span class="p">:</span><span class="mi">16</span><span class="p">:</span><span class="mi">47</span> <span class="n">EDT</span> <span class="mi">1996</span>
@@ -533,22 +530,23 @@ running the the program to be the same as the one being listed.</p>
<span class="n">kadmin</span><span class="p">:</span>
</pre></div>
</div>
-</div>
-<div class="section" id="list-principals">
+</section>
+<section id="list-principals">
<span id="id8"></span><h3>list_principals<a class="headerlink" href="#list-principals" title="Permalink to this headline">¶</a></h3>
<blockquote>
-<div><strong>list_principals</strong> [<em>expression</em>]</div></blockquote>
+<div><p><strong>list_principals</strong> [<em>expression</em>]</p>
+</div></blockquote>
<p>Retrieves all or some principal names. <em>expression</em> is a shell-style
-glob expression that can contain the wild-card characters <code class="docutils literal"><span class="pre">?</span></code>,
-<code class="docutils literal"><span class="pre">*</span></code>, and <code class="docutils literal"><span class="pre">[]</span></code>. All principal names matching the expression are
+glob expression that can contain the wild-card characters <code class="docutils literal notranslate"><span class="pre">?</span></code>,
+<code class="docutils literal notranslate"><span class="pre">*</span></code>, and <code class="docutils literal notranslate"><span class="pre">[]</span></code>. All principal names matching the expression are
printed. If no expression is provided, all principal names are
-printed. If the expression does not contain an <code class="docutils literal"><span class="pre">&#64;</span></code> character, an
-<code class="docutils literal"><span class="pre">&#64;</span></code> character followed by the local realm is appended to the
+printed. If the expression does not contain an <code class="docutils literal notranslate"><span class="pre">&#64;</span></code> character, an
+<code class="docutils literal notranslate"><span class="pre">&#64;</span></code> character followed by the local realm is appended to the
expression.</p>
<p>This command requires the <strong>list</strong> privilege.</p>
<p>Alias: <strong>listprincs</strong>, <strong>get_principals</strong>, <strong>getprincs</strong></p>
<p>Example:</p>
-<div class="highlight-default"><div class="highlight"><pre><span></span><span class="n">kadmin</span><span class="p">:</span> <span class="n">listprincs</span> <span class="n">test</span><span class="o">*</span>
+<div class="highlight-default notranslate"><div class="highlight"><pre><span></span><span class="n">kadmin</span><span class="p">:</span> <span class="n">listprincs</span> <span class="n">test</span><span class="o">*</span>
<span class="n">test3</span><span class="nd">@SECURE</span><span class="o">-</span><span class="n">TEST</span><span class="o">.</span><span class="n">OV</span><span class="o">.</span><span class="n">COM</span>
<span class="n">test2</span><span class="nd">@SECURE</span><span class="o">-</span><span class="n">TEST</span><span class="o">.</span><span class="n">OV</span><span class="o">.</span><span class="n">COM</span>
<span class="n">test1</span><span class="nd">@SECURE</span><span class="o">-</span><span class="n">TEST</span><span class="o">.</span><span class="n">OV</span><span class="o">.</span><span class="n">COM</span>
@@ -556,169 +554,176 @@ expression.</p>
<span class="n">kadmin</span><span class="p">:</span>
</pre></div>
</div>
-</div>
-<div class="section" id="get-strings">
+</section>
+<section id="get-strings">
<span id="id9"></span><h3>get_strings<a class="headerlink" href="#get-strings" title="Permalink to this headline">¶</a></h3>
<blockquote>
-<div><strong>get_strings</strong> <em>principal</em></div></blockquote>
+<div><p><strong>get_strings</strong> <em>principal</em></p>
+</div></blockquote>
<p>Displays string attributes on <em>principal</em>.</p>
<p>This command requires the <strong>inquire</strong> privilege.</p>
<p>Alias: <strong>getstrs</strong></p>
-</div>
-<div class="section" id="set-string">
+</section>
+<section id="set-string">
<span id="id10"></span><h3>set_string<a class="headerlink" href="#set-string" title="Permalink to this headline">¶</a></h3>
<blockquote>
-<div><strong>set_string</strong> <em>principal</em> <em>name</em> <em>value</em></div></blockquote>
+<div><p><strong>set_string</strong> <em>principal</em> <em>name</em> <em>value</em></p>
+</div></blockquote>
<p>Sets a string attribute on <em>principal</em>. String attributes are used to
supply per-principal configuration to the KDC and some KDC plugin
modules. The following string attribute names are recognized by the
KDC:</p>
-<dl class="docutils">
-<dt><strong>require_auth</strong></dt>
-<dd>Specifies an authentication indicator which is required to
+<dl class="simple">
+<dt><strong>require_auth</strong></dt><dd><p>Specifies an authentication indicator which is required to
authenticate to the principal as a service. Multiple indicators
can be specified, separated by spaces; in this case any of the
-specified indicators will be accepted. (New in release 1.14.)</dd>
-<dt><strong>session_enctypes</strong></dt>
-<dd>Specifies the encryption types supported for session keys when the
+specified indicators will be accepted. (New in release 1.14.)</p>
+</dd>
+<dt><strong>session_enctypes</strong></dt><dd><p>Specifies the encryption types supported for session keys when the
principal is authenticated to as a server. See
<a class="reference internal" href="../conf_files/kdc_conf.html#encryption-types"><span class="std std-ref">Encryption types</span></a> in <a class="reference internal" href="../conf_files/kdc_conf.html#kdc-conf-5"><span class="std std-ref">kdc.conf</span></a> for a list of the
-accepted values.</dd>
-<dt><strong>otp</strong></dt>
-<dd>Enables One Time Passwords (OTP) preauthentication for a client
+accepted values.</p>
+</dd>
+<dt><strong>otp</strong></dt><dd><p>Enables One Time Passwords (OTP) preauthentication for a client
<em>principal</em>. The <em>value</em> is a JSON string representing an array
-of objects, each having optional <code class="docutils literal"><span class="pre">type</span></code> and <code class="docutils literal"><span class="pre">username</span></code> fields.</dd>
-<dt><strong>pkinit_cert_match</strong></dt>
-<dd>Specifies a matching expression that defines the certificate
+of objects, each having optional <code class="docutils literal notranslate"><span class="pre">type</span></code> and <code class="docutils literal notranslate"><span class="pre">username</span></code> fields.</p>
+</dd>
+<dt><strong>pkinit_cert_match</strong></dt><dd><p>Specifies a matching expression that defines the certificate
attributes required for the client certificate used by the
principal during PKINIT authentication. The matching expression
is in the same format as those used by the <strong>pkinit_cert_match</strong>
-option in <a class="reference internal" href="../conf_files/krb5_conf.html#krb5-conf-5"><span class="std std-ref">krb5.conf</span></a>. (New in release 1.16.)</dd>
-<dt><strong>pac_privsvr_enctype</strong></dt>
-<dd>Forces the encryption type of the PAC KDC checksum buffers to the
+option in <a class="reference internal" href="../conf_files/krb5_conf.html#krb5-conf-5"><span class="std std-ref">krb5.conf</span></a>. (New in release 1.16.)</p>
+</dd>
+<dt><strong>pac_privsvr_enctype</strong></dt><dd><p>Forces the encryption type of the PAC KDC checksum buffers to the
specified encryption type for tickets issued to this server, by
deriving a key from the local krbtgt key if it is of a different
encryption type. It may be necessary to set this value to
“aes256-sha1” on the cross-realm krbtgt entry for an Active
Directory realm when using aes-sha2 keys on the local krbtgt
-entry.</dd>
+entry.</p>
+</dd>
</dl>
<p>This command requires the <strong>modify</strong> privilege.</p>
<p>Alias: <strong>setstr</strong></p>
<p>Example:</p>
-<div class="highlight-default"><div class="highlight"><pre><span></span><span class="n">set_string</span> <span class="n">host</span><span class="o">/</span><span class="n">foo</span><span class="o">.</span><span class="n">mit</span><span class="o">.</span><span class="n">edu</span> <span class="n">session_enctypes</span> <span class="n">aes128</span><span class="o">-</span><span class="n">cts</span>
+<div class="highlight-default notranslate"><div class="highlight"><pre><span></span><span class="n">set_string</span> <span class="n">host</span><span class="o">/</span><span class="n">foo</span><span class="o">.</span><span class="n">mit</span><span class="o">.</span><span class="n">edu</span> <span class="n">session_enctypes</span> <span class="n">aes128</span><span class="o">-</span><span class="n">cts</span>
<span class="n">set_string</span> <span class="n">user</span><span class="nd">@FOO</span><span class="o">.</span><span class="n">COM</span> <span class="n">otp</span> <span class="s2">&quot;[{&quot;&quot;type&quot;&quot;:&quot;&quot;hotp&quot;&quot;,&quot;&quot;username&quot;&quot;:&quot;&quot;al&quot;&quot;}]&quot;</span>
</pre></div>
</div>
-</div>
-<div class="section" id="del-string">
+</section>
+<section id="del-string">
<span id="id11"></span><h3>del_string<a class="headerlink" href="#del-string" title="Permalink to this headline">¶</a></h3>
<blockquote>
-<div><strong>del_string</strong> <em>principal</em> <em>key</em></div></blockquote>
+<div><p><strong>del_string</strong> <em>principal</em> <em>key</em></p>
+</div></blockquote>
<p>Deletes a string attribute from <em>principal</em>.</p>
<p>This command requires the <strong>delete</strong> privilege.</p>
<p>Alias: <strong>delstr</strong></p>
-</div>
-<div class="section" id="add-policy">
+</section>
+<section id="add-policy">
<span id="id12"></span><h3>add_policy<a class="headerlink" href="#add-policy" title="Permalink to this headline">¶</a></h3>
<blockquote>
-<div><strong>add_policy</strong> [<em>options</em>] <em>policy</em></div></blockquote>
+<div><p><strong>add_policy</strong> [<em>options</em>] <em>policy</em></p>
+</div></blockquote>
<p>Adds a password policy named <em>policy</em> to the database.</p>
<p>This command requires the <strong>add</strong> privilege.</p>
<p>Alias: <strong>addpol</strong></p>
<p>The following options are available:</p>
-<dl class="docutils">
-<dt><strong>-maxlife</strong> <em>time</em></dt>
-<dd>(<a class="reference internal" href="../../basic/date_format.html#duration"><span class="std std-ref">Time duration</span></a> or <a class="reference internal" href="../../basic/date_format.html#getdate"><span class="std std-ref">getdate time</span></a> string) Sets the maximum
-lifetime of a password.</dd>
-<dt><strong>-minlife</strong> <em>time</em></dt>
-<dd>(<a class="reference internal" href="../../basic/date_format.html#duration"><span class="std std-ref">Time duration</span></a> or <a class="reference internal" href="../../basic/date_format.html#getdate"><span class="std std-ref">getdate time</span></a> string) Sets the minimum
-lifetime of a password.</dd>
-<dt><strong>-minlength</strong> <em>length</em></dt>
-<dd>Sets the minimum length of a password.</dd>
-<dt><strong>-minclasses</strong> <em>number</em></dt>
-<dd>Sets the minimum number of character classes required in a
+<dl class="simple">
+<dt><strong>-maxlife</strong> <em>time</em></dt><dd><p>(<a class="reference internal" href="../../basic/date_format.html#duration"><span class="std std-ref">Time duration</span></a> or <a class="reference internal" href="../../basic/date_format.html#getdate"><span class="std std-ref">getdate time</span></a> string) Sets the maximum
+lifetime of a password.</p>
+</dd>
+<dt><strong>-minlife</strong> <em>time</em></dt><dd><p>(<a class="reference internal" href="../../basic/date_format.html#duration"><span class="std std-ref">Time duration</span></a> or <a class="reference internal" href="../../basic/date_format.html#getdate"><span class="std std-ref">getdate time</span></a> string) Sets the minimum
+lifetime of a password.</p>
+</dd>
+<dt><strong>-minlength</strong> <em>length</em></dt><dd><p>Sets the minimum length of a password.</p>
+</dd>
+<dt><strong>-minclasses</strong> <em>number</em></dt><dd><p>Sets the minimum number of character classes required in a
password. The five character classes are lower case, upper case,
-numbers, punctuation, and whitespace/unprintable characters.</dd>
-<dt><strong>-history</strong> <em>number</em></dt>
-<dd>Sets the number of past keys kept for a principal. This option is
-not supported with the LDAP KDC database module.</dd>
+numbers, punctuation, and whitespace/unprintable characters.</p>
+</dd>
+<dt><strong>-history</strong> <em>number</em></dt><dd><p>Sets the number of past keys kept for a principal. This option is
+not supported with the LDAP KDC database module.</p>
+</dd>
</dl>
-<dl class="docutils" id="policy-maxfailure">
-<dt><strong>-maxfailure</strong> <em>maxnumber</em></dt>
-<dd>Sets the number of authentication failures before the principal is
+<dl class="simple" id="policy-maxfailure">
+<dt><strong>-maxfailure</strong> <em>maxnumber</em></dt><dd><p>Sets the number of authentication failures before the principal is
locked. Authentication failures are only tracked for principals
which require preauthentication. The counter of failed attempts
resets to 0 after a successful attempt to authenticate. A
-<em>maxnumber</em> value of 0 (the default) disables lockout.</dd>
+<em>maxnumber</em> value of 0 (the default) disables lockout.</p>
+</dd>
</dl>
-<dl class="docutils" id="policy-failurecountinterval">
-<dt><strong>-failurecountinterval</strong> <em>failuretime</em></dt>
-<dd>(<a class="reference internal" href="../../basic/date_format.html#duration"><span class="std std-ref">Time duration</span></a> or <a class="reference internal" href="../../basic/date_format.html#getdate"><span class="std std-ref">getdate time</span></a> string) Sets the allowable time
+<dl class="simple" id="policy-failurecountinterval">
+<dt><strong>-failurecountinterval</strong> <em>failuretime</em></dt><dd><p>(<a class="reference internal" href="../../basic/date_format.html#duration"><span class="std std-ref">Time duration</span></a> or <a class="reference internal" href="../../basic/date_format.html#getdate"><span class="std std-ref">getdate time</span></a> string) Sets the allowable time
between authentication failures. If an authentication failure
happens after <em>failuretime</em> has elapsed since the previous
failure, the number of authentication failures is reset to 1. A
-<em>failuretime</em> value of 0 (the default) means forever.</dd>
+<em>failuretime</em> value of 0 (the default) means forever.</p>
+</dd>
</dl>
-<dl class="docutils" id="policy-lockoutduration">
-<dt><strong>-lockoutduration</strong> <em>lockouttime</em></dt>
-<dd>(<a class="reference internal" href="../../basic/date_format.html#duration"><span class="std std-ref">Time duration</span></a> or <a class="reference internal" href="../../basic/date_format.html#getdate"><span class="std std-ref">getdate time</span></a> string) Sets the duration for
+<dl class="simple" id="policy-lockoutduration">
+<dt><strong>-lockoutduration</strong> <em>lockouttime</em></dt><dd><p>(<a class="reference internal" href="../../basic/date_format.html#duration"><span class="std std-ref">Time duration</span></a> or <a class="reference internal" href="../../basic/date_format.html#getdate"><span class="std std-ref">getdate time</span></a> string) Sets the duration for
which the principal is locked from authenticating if too many
authentication failures occur without the specified failure count
interval elapsing. A duration of 0 (the default) means the
principal remains locked out until it is administratively unlocked
-with <code class="docutils literal"><span class="pre">modprinc</span> <span class="pre">-unlock</span></code>.</dd>
-<dt><strong>-allowedkeysalts</strong></dt>
-<dd>Specifies the key/salt tuples supported for long-term keys when
+with <code class="docutils literal notranslate"><span class="pre">modprinc</span> <span class="pre">-unlock</span></code>.</p>
+</dd>
+<dt><strong>-allowedkeysalts</strong></dt><dd><p>Specifies the key/salt tuples supported for long-term keys when
setting or changing a principal’s password/keys. See
<a class="reference internal" href="../conf_files/kdc_conf.html#keysalt-lists"><span class="std std-ref">Keysalt lists</span></a> in <a class="reference internal" href="../conf_files/kdc_conf.html#kdc-conf-5"><span class="std std-ref">kdc.conf</span></a> for a list of the
accepted values, but note that key/salt tuples must be separated
with commas (‘,’) only. To clear the allowed key/salt policy use
-a value of ‘-‘.</dd>
+a value of ‘-‘.</p>
+</dd>
</dl>
<p>Example:</p>
-<div class="highlight-default"><div class="highlight"><pre><span></span><span class="n">kadmin</span><span class="p">:</span> <span class="n">add_policy</span> <span class="o">-</span><span class="n">maxlife</span> <span class="s2">&quot;2 days&quot;</span> <span class="o">-</span><span class="n">minlength</span> <span class="mi">5</span> <span class="n">guests</span>
+<div class="highlight-default notranslate"><div class="highlight"><pre><span></span><span class="n">kadmin</span><span class="p">:</span> <span class="n">add_policy</span> <span class="o">-</span><span class="n">maxlife</span> <span class="s2">&quot;2 days&quot;</span> <span class="o">-</span><span class="n">minlength</span> <span class="mi">5</span> <span class="n">guests</span>
<span class="n">kadmin</span><span class="p">:</span>
</pre></div>
</div>
-</div>
-<div class="section" id="modify-policy">
+</section>
+<section id="modify-policy">
<span id="id13"></span><h3>modify_policy<a class="headerlink" href="#modify-policy" title="Permalink to this headline">¶</a></h3>
<blockquote>
-<div><strong>modify_policy</strong> [<em>options</em>] <em>policy</em></div></blockquote>
+<div><p><strong>modify_policy</strong> [<em>options</em>] <em>policy</em></p>
+</div></blockquote>
<p>Modifies the password policy named <em>policy</em>. Options are as described
for <strong>add_policy</strong>.</p>
<p>This command requires the <strong>modify</strong> privilege.</p>
<p>Alias: <strong>modpol</strong></p>
-</div>
-<div class="section" id="delete-policy">
+</section>
+<section id="delete-policy">
<span id="id14"></span><h3>delete_policy<a class="headerlink" href="#delete-policy" title="Permalink to this headline">¶</a></h3>
<blockquote>
-<div><strong>delete_policy</strong> [<strong>-force</strong>] <em>policy</em></div></blockquote>
+<div><p><strong>delete_policy</strong> [<strong>-force</strong>] <em>policy</em></p>
+</div></blockquote>
<p>Deletes the password policy named <em>policy</em>. Prompts for confirmation
before deletion. The command will fail if the policy is in use by any
principals.</p>
<p>This command requires the <strong>delete</strong> privilege.</p>
<p>Alias: <strong>delpol</strong></p>
<p>Example:</p>
-<div class="highlight-default"><div class="highlight"><pre><span></span>kadmin: del_policy guests
+<div class="highlight-default notranslate"><div class="highlight"><pre><span></span>kadmin: del_policy guests
Are you sure you want to delete the policy &quot;guests&quot;?
(yes/no): yes
kadmin:
</pre></div>
</div>
-</div>
-<div class="section" id="get-policy">
+</section>
+<section id="get-policy">
<span id="id15"></span><h3>get_policy<a class="headerlink" href="#get-policy" title="Permalink to this headline">¶</a></h3>
<blockquote>
-<div><strong>get_policy</strong> [ <strong>-terse</strong> ] <em>policy</em></div></blockquote>
+<div><p><strong>get_policy</strong> [ <strong>-terse</strong> ] <em>policy</em></p>
+</div></blockquote>
<p>Displays the values of the password policy named <em>policy</em>. With the
<strong>-terse</strong> flag, outputs the fields as quoted strings separated by
tabs.</p>
<p>This command requires the <strong>inquire</strong> privilege.</p>
<p>Alias: <strong>getpol</strong></p>
<p>Examples:</p>
-<div class="highlight-default"><div class="highlight"><pre><span></span><span class="n">kadmin</span><span class="p">:</span> <span class="n">get_policy</span> <span class="n">admin</span>
+<div class="highlight-default notranslate"><div class="highlight"><pre><span></span><span class="n">kadmin</span><span class="p">:</span> <span class="n">get_policy</span> <span class="n">admin</span>
<span class="n">Policy</span><span class="p">:</span> <span class="n">admin</span>
<span class="n">Maximum</span> <span class="n">password</span> <span class="n">life</span><span class="p">:</span> <span class="mi">180</span> <span class="n">days</span> <span class="mi">00</span><span class="p">:</span><span class="mi">00</span><span class="p">:</span><span class="mi">00</span>
<span class="n">Minimum</span> <span class="n">password</span> <span class="n">life</span><span class="p">:</span> <span class="mi">00</span><span class="p">:</span><span class="mi">00</span><span class="p">:</span><span class="mi">00</span>
@@ -735,20 +740,21 @@ tabs.</p>
<p>The “Reference count” is the number of principals using that policy.
With the LDAP KDC database module, the reference count field is not
meaningful.</p>
-</div>
-<div class="section" id="list-policies">
+</section>
+<section id="list-policies">
<span id="id16"></span><h3>list_policies<a class="headerlink" href="#list-policies" title="Permalink to this headline">¶</a></h3>
<blockquote>
-<div><strong>list_policies</strong> [<em>expression</em>]</div></blockquote>
+<div><p><strong>list_policies</strong> [<em>expression</em>]</p>
+</div></blockquote>
<p>Retrieves all or some policy names. <em>expression</em> is a shell-style
-glob expression that can contain the wild-card characters <code class="docutils literal"><span class="pre">?</span></code>,
-<code class="docutils literal"><span class="pre">*</span></code>, and <code class="docutils literal"><span class="pre">[]</span></code>. All policy names matching the expression are
+glob expression that can contain the wild-card characters <code class="docutils literal notranslate"><span class="pre">?</span></code>,
+<code class="docutils literal notranslate"><span class="pre">*</span></code>, and <code class="docutils literal notranslate"><span class="pre">[]</span></code>. All policy names matching the expression are
printed. If no expression is provided, all existing policy names are
printed.</p>
<p>This command requires the <strong>list</strong> privilege.</p>
<p>Aliases: <strong>listpols</strong>, <strong>get_policies</strong>, <strong>getpols</strong>.</p>
<p>Examples:</p>
-<div class="highlight-default"><div class="highlight"><pre><span></span><span class="n">kadmin</span><span class="p">:</span> <span class="n">listpols</span>
+<div class="highlight-default notranslate"><div class="highlight"><pre><span></span><span class="n">kadmin</span><span class="p">:</span> <span class="n">listpols</span>
<span class="n">test</span><span class="o">-</span><span class="n">pol</span>
<span class="nb">dict</span><span class="o">-</span><span class="n">only</span>
<span class="n">once</span><span class="o">-</span><span class="n">a</span><span class="o">-</span><span class="nb">min</span>
@@ -760,8 +766,8 @@ printed.</p>
<span class="n">kadmin</span><span class="p">:</span>
</pre></div>
</div>
-</div>
-<div class="section" id="ktadd">
+</section>
+<section id="ktadd">
<span id="id17"></span><h3>ktadd<a class="headerlink" href="#ktadd" title="Permalink to this headline">¶</a></h3>
<blockquote>
<div><div class="line-block">
@@ -776,38 +782,39 @@ command.</p>
<p>This command requires the <strong>inquire</strong> and <strong>changepw</strong> privileges.
With the <strong>-glob</strong> form, it also requires the <strong>list</strong> privilege.</p>
<p>The options are:</p>
-<dl class="docutils">
-<dt><strong>-k[eytab]</strong> <em>keytab</em></dt>
-<dd>Use <em>keytab</em> as the keytab file. Otherwise, the default keytab is
-used.</dd>
-<dt><strong>-e</strong> <em>enc</em>:<em>salt</em>,…</dt>
-<dd>Uses the specified keysalt list for setting the new keys of the
+<dl class="simple">
+<dt><strong>-k[eytab]</strong> <em>keytab</em></dt><dd><p>Use <em>keytab</em> as the keytab file. Otherwise, the default keytab is
+used.</p>
+</dd>
+<dt><strong>-e</strong> <em>enc</em>:<em>salt</em>,…</dt><dd><p>Uses the specified keysalt list for setting the new keys of the
principal. See <a class="reference internal" href="../conf_files/kdc_conf.html#keysalt-lists"><span class="std std-ref">Keysalt lists</span></a> in <a class="reference internal" href="../conf_files/kdc_conf.html#kdc-conf-5"><span class="std std-ref">kdc.conf</span></a> for a
-list of possible values.</dd>
-<dt><strong>-q</strong></dt>
-<dd>Display less verbose information.</dd>
-<dt><strong>-norandkey</strong></dt>
-<dd>Do not randomize the keys. The keys and their version numbers stay
+list of possible values.</p>
+</dd>
+<dt><strong>-q</strong></dt><dd><p>Display less verbose information.</p>
+</dd>
+<dt><strong>-norandkey</strong></dt><dd><p>Do not randomize the keys. The keys and their version numbers stay
unchanged. This option cannot be specified in combination with the
-<strong>-e</strong> option.</dd>
+<strong>-e</strong> option.</p>
+</dd>
</dl>
<p>An entry for each of the principal’s unique encryption types is added,
ignoring multiple keys with the same encryption type but different
salt types.</p>
<p>Alias: <strong>xst</strong></p>
<p>Example:</p>
-<div class="highlight-default"><div class="highlight"><pre><span></span><span class="n">kadmin</span><span class="p">:</span> <span class="n">ktadd</span> <span class="o">-</span><span class="n">k</span> <span class="o">/</span><span class="n">tmp</span><span class="o">/</span><span class="n">foo</span><span class="o">-</span><span class="n">new</span><span class="o">-</span><span class="n">keytab</span> <span class="n">host</span><span class="o">/</span><span class="n">foo</span><span class="o">.</span><span class="n">mit</span><span class="o">.</span><span class="n">edu</span>
+<div class="highlight-default notranslate"><div class="highlight"><pre><span></span><span class="n">kadmin</span><span class="p">:</span> <span class="n">ktadd</span> <span class="o">-</span><span class="n">k</span> <span class="o">/</span><span class="n">tmp</span><span class="o">/</span><span class="n">foo</span><span class="o">-</span><span class="n">new</span><span class="o">-</span><span class="n">keytab</span> <span class="n">host</span><span class="o">/</span><span class="n">foo</span><span class="o">.</span><span class="n">mit</span><span class="o">.</span><span class="n">edu</span>
<span class="n">Entry</span> <span class="k">for</span> <span class="n">principal</span> <span class="n">host</span><span class="o">/</span><span class="n">foo</span><span class="o">.</span><span class="n">mit</span><span class="o">.</span><span class="n">edu</span><span class="nd">@ATHENA</span><span class="o">.</span><span class="n">MIT</span><span class="o">.</span><span class="n">EDU</span> <span class="k">with</span> <span class="n">kvno</span> <span class="mi">3</span><span class="p">,</span>
<span class="n">encryption</span> <span class="nb">type</span> <span class="n">aes256</span><span class="o">-</span><span class="n">cts</span><span class="o">-</span><span class="n">hmac</span><span class="o">-</span><span class="n">sha1</span><span class="o">-</span><span class="mi">96</span> <span class="n">added</span> <span class="n">to</span> <span class="n">keytab</span>
<span class="n">FILE</span><span class="p">:</span><span class="o">/</span><span class="n">tmp</span><span class="o">/</span><span class="n">foo</span><span class="o">-</span><span class="n">new</span><span class="o">-</span><span class="n">keytab</span>
<span class="n">kadmin</span><span class="p">:</span>
</pre></div>
</div>
-</div>
-<div class="section" id="ktremove">
+</section>
+<section id="ktremove">
<span id="id18"></span><h3>ktremove<a class="headerlink" href="#ktremove" title="Permalink to this headline">¶</a></h3>
<blockquote>
-<div><strong>ktremove</strong> [options] <em>principal</em> [<em>kvno</em> | <em>all</em> | <em>old</em>]</div></blockquote>
+<div><p><strong>ktremove</strong> [options] <em>principal</em> [<em>kvno</em> | <em>all</em> | <em>old</em>]</p>
+</div></blockquote>
<p>Removes entries for the specified <em>principal</em> from a keytab. Requires
no permissions, since this does not require database access.</p>
<p>If the string “all” is specified, all entries for that principal are
@@ -816,64 +823,66 @@ principal except those with the highest kvno are removed. Otherwise,
the value specified is parsed as an integer, and all entries whose
kvno match that integer are removed.</p>
<p>The options are:</p>
-<dl class="docutils">
-<dt><strong>-k[eytab]</strong> <em>keytab</em></dt>
-<dd>Use <em>keytab</em> as the keytab file. Otherwise, the default keytab is
-used.</dd>
-<dt><strong>-q</strong></dt>
-<dd>Display less verbose information.</dd>
+<dl class="simple">
+<dt><strong>-k[eytab]</strong> <em>keytab</em></dt><dd><p>Use <em>keytab</em> as the keytab file. Otherwise, the default keytab is
+used.</p>
+</dd>
+<dt><strong>-q</strong></dt><dd><p>Display less verbose information.</p>
+</dd>
</dl>
<p>Alias: <strong>ktrem</strong></p>
<p>Example:</p>
-<div class="highlight-default"><div class="highlight"><pre><span></span><span class="n">kadmin</span><span class="p">:</span> <span class="n">ktremove</span> <span class="n">kadmin</span><span class="o">/</span><span class="n">admin</span> <span class="nb">all</span>
+<div class="highlight-default notranslate"><div class="highlight"><pre><span></span><span class="n">kadmin</span><span class="p">:</span> <span class="n">ktremove</span> <span class="n">kadmin</span><span class="o">/</span><span class="n">admin</span> <span class="nb">all</span>
<span class="n">Entry</span> <span class="k">for</span> <span class="n">principal</span> <span class="n">kadmin</span><span class="o">/</span><span class="n">admin</span> <span class="k">with</span> <span class="n">kvno</span> <span class="mi">3</span> <span class="n">removed</span> <span class="kn">from</span> <span class="nn">keytab</span>
<span class="n">FILE</span><span class="p">:</span><span class="o">/</span><span class="n">etc</span><span class="o">/</span><span class="n">krb5</span><span class="o">.</span><span class="n">keytab</span>
<span class="n">kadmin</span><span class="p">:</span>
</pre></div>
</div>
-</div>
-<div class="section" id="lock">
+</section>
+<section id="lock">
<h3>lock<a class="headerlink" href="#lock" title="Permalink to this headline">¶</a></h3>
<p>Lock database exclusively. Use with extreme caution! This command
only works with the DB2 KDC database module.</p>
-</div>
-<div class="section" id="unlock">
+</section>
+<section id="unlock">
<h3>unlock<a class="headerlink" href="#unlock" title="Permalink to this headline">¶</a></h3>
<p>Release the exclusive database lock.</p>
-</div>
-<div class="section" id="list-requests">
+</section>
+<section id="list-requests">
<h3>list_requests<a class="headerlink" href="#list-requests" title="Permalink to this headline">¶</a></h3>
<p>Lists available for kadmin requests.</p>
<p>Aliases: <strong>lr</strong>, <strong>?</strong></p>
-</div>
-<div class="section" id="quit">
+</section>
+<section id="quit">
<h3>quit<a class="headerlink" href="#quit" title="Permalink to this headline">¶</a></h3>
<p>Exit program. If the database was locked, the lock is released.</p>
<p>Aliases: <strong>exit</strong>, <strong>q</strong></p>
-</div>
-</div>
-<div class="section" id="history">
+</section>
+</section>
+<section id="history">
<h2>HISTORY<a class="headerlink" href="#history" title="Permalink to this headline">¶</a></h2>
<p>The kadmin program was originally written by Tom Yu at MIT, as an
interface to the OpenVision Kerberos administration program.</p>
-</div>
-<div class="section" id="environment">
+</section>
+<section id="environment">
<h2>ENVIRONMENT<a class="headerlink" href="#environment" title="Permalink to this headline">¶</a></h2>
<p>See <a class="reference internal" href="../../user/user_config/kerberos.html#kerberos-7"><span class="std std-ref">kerberos</span></a> for a description of Kerberos environment
variables.</p>
-</div>
-<div class="section" id="see-also">
+</section>
+<section id="see-also">
<h2>SEE ALSO<a class="headerlink" href="#see-also" title="Permalink to this headline">¶</a></h2>
<p><a class="reference internal" href="../../user/user_commands/kpasswd.html#kpasswd-1"><span class="std std-ref">kpasswd</span></a>, <a class="reference internal" href="kadmind.html#kadmind-8"><span class="std std-ref">kadmind</span></a>, <a class="reference internal" href="../../user/user_config/kerberos.html#kerberos-7"><span class="std std-ref">kerberos</span></a></p>
-</div>
-</div>
+</section>
+</section>
+ <div class="clearer"></div>
</div>
</div>
</div>
</div>
<div class="sidebar">
+
<h2>On this page</h2>
<ul>
<li><a class="reference internal" href="#">kadmin</a><ul>
@@ -977,6 +986,7 @@ variables.</p>
<input type="hidden" name="check_keywords" value="yes" />
<input type="hidden" name="area" value="default" />
</form>
+
</div>
<div class="clearer"></div>
</div>
@@ -984,8 +994,8 @@ variables.</p>
<div class="footer-wrapper">
<div class="footer" >
- <div class="right" ><i>Release: 1.21.2</i><br />
- &copy; <a href="../../copyright.html">Copyright</a> 1985-2023, MIT.
+ <div class="right" ><i>Release: 1.21.3</i><br />
+ &copy; <a href="../../copyright.html">Copyright</a> 1985-2024, MIT.
</div>
<div class="left">