Lines Matching +full:no +full:- +full:read +full:- +full:rollover

11 program has its own command-line interface, to which you type the
31 ticket for either service principal and the **-c** ccache option is
33 the **-p** and **-k** options are used to specify the client Kerberos
45 ----------
52 with the ``+requires_preauth -allow_svr`` options to help mitigate
55 kadmin: addprinc +requires_preauth -allow_svr alice
57 Re-enter password for principal "alice@KRBTEST.COM":
60 instead by created with the ``-nokey`` option:
62 kadmin: addprinc -nokey alice
64 Service principals can be created with the ``-nokey`` option;
65 long-term keys will be added when a keytab is generated::
67 kadmin: addprinc -nokey host/foo.mit.edu
68 kadmin: ktadd -k foo.keytab host/foo.mit.edu
69 …Entry for principal host/foo.mit.edu with kvno 1, encryption type aes256-cts-hmac-sha1-96 added to…
70 …Entry for principal host/foo.mit.edu with kvno 1, encryption type aes128-cts-hmac-sha1-96 added to…
75 kadmin: modprinc -expire tomorrow alice
81 Are you sure you want to delete the principal "alice@KRBTEST.COM"? (yes/no): yes
100 --------
109 kadmin: addpol -maxlife "1 year" -history 3 stduser
116 **modify_principal** command with the **-policy** option:
118 kadmin: modprinc -policy stduser alice
137 Currently there is no support for proper rollover of the history key,
142 kadmin: change_password -randkey kadmin/history
144 This command will fail if you specify the **-keepold** flag. Only one
150 rollover support for stored old keys.
156 ----------
175 -----------------------------------
183 was not created with one using the ``create -s`` flag, or after
188 kdb5_util: Cannot find/read stored master key while reading master key
212 $ kbd5_util dump -verbose dumpfile
222 $ kdb5_util dump -verbose someprincs K/M@ATHENA.MIT.EDU kadmin/admin@ATHENA.MIT.EDU
232 only some principals, use the ``-update`` flag::
234 $ kdb5_util load -update someprincs
238 If the database file exists, and the *-update* flag was not
248 to be changed using a rollover process, with minimal loss of
257 KVNO: 1, Enctype: aes256-cts-hmac-sha384-192, Active on: Thu Jan 01 00:00:00 UTC 1970 *
264 #. On the primary KDC, run ``kdb5_util add_mkey -s`` to create a new
286 This command will iterate over the database and re-encrypt all keys
291 instead run ``kdb5_util -x unlockiter update_princ_encryption`` to
306 -------------------------------
322 $ kdb5_ldap_util modify -maxtktlife "10 hours"
352 $ kdb5_ldap_util create_policy -maxrenewlife "2 days" users
356 with the **-x tktpolicy=**\ *policy* option::
358 $ kadmin.local modprinc -x tktpolicy=users alice
363 $ kadmin.local modprinc -x tktpolicy= alice
374 $ kdb5_ldap_util modify_policy -allow_svr +requires_preauth users
395 Cross-realm authentication
396 --------------------------
401 For example, if you need to do cross-realm authentication between the realms
407 the key version number with the **-kvno** option.
409 In the ATHENA.MIT.EDU and EXAMPLE.COM cross-realm case, the administrators
412 shell%: kadmin.local -e "aes256-cts:normal"
413 kadmin: addprinc -requires_preauth krbtgt/ATHENA.MIT.EDU@EXAMPLE.COM
415 Re-enter password for principal krbtgt/ATHENA.MIT.EDU@EXAMPLE.COM:
416 kadmin: addprinc -requires_preauth krbtgt/EXAMPLE.COM@ATHENA.MIT.EDU
425 desirable on cross-realm authentication keys because doing
427 service-by-service basis. Disabling it as in the example
440 -----------------------
452 **-keepold** flag to change_password to retain the previous key in the
455 kadmin: change_password -randkey -keepold krbtgt/ATHENA.MIT.EDU@ATHENA.MIT.EDU
467 ticket-granting tickets. However, the set of encryption types present
470 :ref:`session_key_selection`). Because non-MIT Kerberos clients
475 specifying any **-e** option when changing the krbtgt key, or by
488 --------------------------------
506 Incremental propagation uses the following entries in the per-realm
515 …sed, or the file name is specified in the *dbmodules* section, then the hard-coded default for *da…
520 fully-qualified, canonical name for the host) registered in the
540 and invoke a one-time kprop propagation, with special options to also
547 updates to every replica. To do this, run ``kadmind -proponly`` on
548 each intermediate replica, and ``kpropd -A upstreamhostname`` on
554 - The incremental update protocol does not transport changes to policy
557 - The replica's KDB module must support locking; it cannot be using the
559 - The primary and replica must be able to initiate TCP connections in
583 The Sun implementation hard-codes pathnames in ``/var/krb5`` for the
584 update log and the per-replica kprop dump files. In the MIT
586 config file, and the per-replica dump files are stored in