Document Information
Preface
Part I Security Overview
1. Security Services (Overview)
Part II System, File, and Device Security
2. Managing Machine Security (Overview)
3. Controlling Access to Systems (Tasks)
4. Virus Scanning Service (Tasks)
5. Controlling Access to Devices (Tasks)
6. Using the Basic Audit Reporting Tool (Tasks)
7. Controlling Access to Files (Tasks)
Part III Roles, Rights Profiles, and Privileges
8. Using Roles and Privileges (Overview)
9. Using Role-Based Access Control (Tasks)
10. Role-Based Access Control (Reference)
11. Privileges (Tasks)
12. Privileges (Reference)
Part IV Solaris Cryptographic Services
13. Solaris Cryptographic Framework (Overview)
14. Solaris Cryptographic Framework (Tasks)
15. Solaris Key Management Framework
Part V Authentication Services and Secure Communication
16. Using Authentication Services (Tasks)
17. Using PAM
18. Using SASL
19. Using Solaris Secure Shell (Tasks)
20. Solaris Secure Shell (Reference)
Part VI Kerberos Service
21. Introduction to the Kerberos Service
22. Planning for the Kerberos Service
23. Configuring the Kerberos Service (Tasks)
24. Kerberos Error Messages and Troubleshooting
25. Administering Kerberos Principals and Policies (Tasks)
26. Using Kerberos Applications (Tasks)
27. The Kerberos Service (Reference)
Kerberos Files
Kerberos Daemons
Kerberos Terminology
How the Kerberos Authentication System Works
Gaining Access to a Service Using Kerberos
Using Kerberos Encryption Types
Using the gsscred Table
Notable Differences Between Solaris Kerberos and MIT Kerberos
Part VII Solaris Auditing
28. Solaris Auditing (Overview)
29. Planning for Solaris Auditing
30. Managing Solaris Auditing (Tasks)
31. Solaris Auditing (Reference)
Glossary
Index
|
Kerberos Commands
This section lists some commands that are included in the Kerberos product. Table 27-2 Kerberos CommandsCommand |
Description |
/usr/bin/ftp
|
File Transfer Protocol program |
/usr/bin/kdestroy |
Destroys Kerberos tickets |
/usr/bin/kinit |
Obtains and caches Kerberos ticket-granting tickets |
/usr/bin/klist
|
Displays current Kerberos tickets |
/usr/bin/kpasswd |
Changes a Kerberos password |
/usr/bin/ktutil |
Manages Kerberos keytab files |
/usr/bin/rcp
|
Remote file copy program |
/usr/bin/rdist |
Remote file distribution program |
/usr/bin/rlogin |
Remote login program |
/usr/bin/rsh |
Remote shell program |
/usr/bin/telnet
|
Kerberized telnet program |
/usr/lib/krb5/kprop |
Kerberos database propagation program |
/usr/sbin/gkadmin |
Kerberos database administration GUI program, which is
used to manage principals and policies |
/usr/sbin/gsscred |
Manage gsscred table entries |
/usr/sbin/kadmin |
Remote Kerberos database administration program
(run with Kerberos authentication), which is used to manage principals, policies, and keytab
files |
/usr/sbin/kadmin.local |
Local Kerberos database administration program (run without Kerberos authentication and must be run
on master KDC), which is used to manage principals, policies, and keytab files |
/usr/sbin/kclient
|
Kerberos client installation script which is used with or without a installation profile |
/usr/sbin/kdb5_ldap_util
|
Creates LDAP containers for Kerberos databases |
/usr/sbin/kdb5_util |
Creates Kerberos databases and stash files |
/usr/sbin/kgcmgr |
Configures Kerberos master
and slave KDCs |
/usr/sbin/kproplog |
Lists a summary of update entries in the update log |
|