Home
last modified time | relevance | path

Searched full:principals (Results 1 – 25 of 203) sorted by relevance

123456789

/freebsd/crypto/openssh/regress/
H A Dsshsig.sh178 trace "$tid: key type $t find-principals with valid lifespan"
179 ${SSHKEYGEN} -vvv -Y find-principals -s $sigfile \
182 fail "failed find-principals for $t key with valid expiry interval"
184 trace "$tid: key type $t find principals with not-yet-valid lifespan"
185 ${SSHKEYGEN} -vvv -Y find-principals -s $sigfile \
188 fail "failed find-principals for $t not-yet-valid key"
190 trace "$tid: key type $t find-principals with expired lifespan"
191 ${SSHKEYGEN} -vvv -Y find-principals -s $sigfile \
194 fail "failed find-principals for $t with expired key"
196 trace "$tid: key type $t find-principals with expired lifespan (now)"
[all …]
H A Dcert-userkey.sh63 # Test explicitly-specified principals
152 # Setup for principals= key option
163 # Wrong principals list
164 verbose "$tid: ${_prefix} wrong principals key option"
166 printf 'cert-authority,principals="gregorsamsa" '
175 # Correct principals list
176 verbose "$tid: ${_prefix} correct principals key option"
178 printf 'cert-authority,principals="mekmitasdigoat" '
344 test_one "wrong principals" failure "-n foo"
351 # Behaviour is different here: TrustedUserCAKeys doesn't allow empty principals
[all …]
H A Dprincipals-command.sh1 # $OpenBSD: principals-command.sh,v 1.14 2021/09/30 05:26:26 dtucker Exp $
4 tid="authorized principals command"
52 test $? -eq 0 || fatal "couldn't prepare principals command"
67 # Test explicitly-specified principals
139 # Setup for principals= key option
146 # Wrong principals list
147 verbose "$tid: wrong principals key option"
149 printf 'cert-authority,principals="gregorsamsa" '
158 # Correct principals list
159 verbose "$tid: correct principals key option"
[all …]
/freebsd/crypto/krb5/src/windows/leash/htmlhelp/html/
H A DManage_Multiple_Principals.htm6 <Title>Multiple Principals</Title>
9 <H1> Manage Multiple Principals </H1>
11 If you have multiple principals, several features in MIT Kerberos will help you manage them. </p>
13 <li>You can save principals when you enter them in the Get Ticket window. Kerberos will then auto-c…
19 All of your principals with tickets are listed in the main window. The default principal is in bold…
30 <li><a href=#manage-multiple> Manage multiple principals</a></li>
37 <li><a href="HTML/View_Tickets.htm"> View tickets for all principals</a></li>
46 <H2><a name="manage-multiple">Manage Multiple Principals</a></H2>
49 <th id="th2">Enter and save principals</th>
56 …he Home tab (e.g., Change Password). Note that you can select multiple principals before you click…
[all …]
H A DForget_Principals.htm10 Kerberos saves your principals for you if you select "Remember this
11 principal" in the Get Ticket window. Saved principals then
20 … MIT Kerberos clears <em>all</em> of your saved principals. It is not possible to remove some prin…
36 <li><a href="HTML/Principals.htm">About principals</a></li>
37 <li><a href="HTML/Manage_Multiple_Principals.htm">Manage multiple principals</a></li>
H A DPrincipals.htm6 <Title>Principals</Title>
9 <H1> <a name="top">About Principals </a></H1>
19 <li><a href=#manage-multiple> Multiple principals</a></li>
36 <H2><a name="manage-multiple">Multiple principals</a></H2>
38principals. For example, administrators often have one principal with standard access and an admin…
40 …<a href="HTML/Manage_Multiple_Principals.htm">How to: Manage Multiple Principals</a> <br> <a href…
47 …ncipal, that principal is always the default. But if you have multiple principals you will need to…
51 When applications make a generic request, Kerberos does not know which of your principals is being …
H A DMake_Default.htm11 … plan to use an application, service, or network that only one of your principals has access to, f…
25 <li><a href="HTML/Principals.htm">About principals</a></li>
26 <li><a href="HTML/Manage_Multiple_Principals.htm">Manage multiple principals</a></li>
H A DKerberos_Terminology.htm10 It is helpful to understand three terms when using Kerberos; <a href="#principal"> principals</a>, …
14 <th><a name="principal">Principals</a></th>
20 Principals are a combination of your user name and the name of the <a href="#realm"> realm</a> (or …
28 network resources that use Kerberos also have unique principals.
49 (or principals) in only one realm that provides you with all the access
50 you need, or you might have different principals for accessing
H A DGlossary.htm13 …ipal is always the default. <br><a href="HTML/Principals.htm#default-principal">About: Default Pr…
41 …beros. Principals are a combination of your user name and the name of the realm you belong to. <br…
/freebsd/crypto/krb5/src/man/
H A Dkadm5.acl.man38 For operations that affect principals, the ACL file also controls
39 which principals can operate on which other principals.
87 [Dis]allows the addition of principals or policies
93 [Dis]allows the changing of passwords for principals
99 [Dis]allows the deletion of principals or policies
111 [Dis]allows inquiries about principals or policies
117 [Dis]allows the listing of all principals or policies
123 [Dis]allows the modification of principals or policies
160 like those of the kadmin/* or krbtgt/* principals. The
162 key extraction from specific principals regardless of the
[all …]
H A Dkdb5_ldap_util.man89 Specifies the list of subtrees containing the principals of a
94 Specifies the scope for searching the principals under the
99 Specifies the DN of the container object in which the principals
101 configured for a realm, the principals will be created in the
134 principals in this realm.
138 tickets for principals in this realm.
179 Specifies the list of subtrees containing the principals of a
184 Specifies the scope for searching the principals under the
189 container object in which the principals of a realm will be
194 principals in this realm.
[all …]
H A Dkvno.man32 kvno \- print key version numbers of Kerberos principals
49 kvno acquires a service ticket for the specified Kerberos principals
84 interpreted as hostnames, and the service principals are to be
87 rules for constructing service principals.
H A Dkadmin.man62 Kerberos principals, password policies, and service key tables
69 principals, and the \fB\-c\fP credentials_cache option is specified, that
103 Requests anonymous processing. Two types of anonymous principals
270 assign this policy to previously existing principals. This policy
390 prevent a malicious administrator from replacing principals like
391 krbtgt/* or kadmin/* with new principals without the attribute.
443 adding the principal, the principals are created under the
571 necessary except perhaps for \fBkrbtgt\fP principals.
804 locked. Authentication failures are only tracked for principals
869 principals.
[all …]
H A Dkdb5_util.man142 [\fIprincipals\fP\&...]]
182 dumps in reverse order. This may recover principals that do not
187 This may recover principals that do not dump normally, in cases
189 corruption, this option will probably retrieve more principals
239 principals.
316 protect any principals. This command can be used to remove old master
341 version, and give a count at the end of the number of principals
/freebsd/crypto/heimdal/doc/
H A Dkerberos4.texi19 First, Kerberos 4 and Kerberos 5 principals are different. A version 4
25 principal. One notable example is the ``host'' type principals, where
27 version 5 name is @samp{host}. For the class of principals that has a
43 simplest cases you can cover most principals with the first rule. If you
54 @code{krb5_425_conv_principal_ext} to convert principals when handling
69 be because these principals are not used anymore, or it might be just
73 principals. For instance, if you are using DNS lookups and you have two
74 principals @samp{rcmd.foo} and @samp{rcmd.bar}, where `foo' is a CNAME
75 for `bar', the resulting principals will be the same. Since the
89 you have a database that consists of the following principals:
[all …]
H A Dwhatis.texi24 the network (users and services, usually called @dfn{principals}). All
25 principals share a secret password (or key) with the kerberos server and
26 this enables principals to verify that the messages from the kerberos
64 In Kerberos, principals use @dfn{tickets} to prove that they are who
72 checks that both @var{A} and @var{B} are valid principals.
74 Having verified the validity of the principals, it creates a packet
/freebsd/crypto/openssh/regress/unittests/sshkey/
H A Dtest_sshkey.c61 struct sshbuf *ca_buf, *pk, *principals, *critopts, *exts; in build_cert() local
78 principals = sshbuf_new(); in build_cert()
79 ASSERT_PTR_NE(principals, NULL); in build_cert()
80 ASSERT_INT_EQ(sshbuf_put_cstring(principals, "gsamsa"), 0); in build_cert()
81 ASSERT_INT_EQ(sshbuf_put_cstring(principals, "gregor"), 0); in build_cert()
98 ASSERT_INT_EQ(sshbuf_put_stringb(b, principals), 0); /* principals */ in build_cert()
113 sshbuf_free(principals); in build_cert()
428 k1->cert->principals = calloc(4, sizeof(*k1->cert->principals)); in sshkey_tests()
429 ASSERT_PTR_NE(k1->cert->principals, NULL); in sshkey_tests()
430 k1->cert->principals[0] = strdup("estragon"); in sshkey_tests()
[all …]
/freebsd/crypto/openssh/
H A Dsshsig.c740 char *opts = NULL, *tmp, *cp, *principals = NULL; in parse_principals_key_and_options() local
764 if ((principals = strdup(tmp)) == NULL) { in parse_principals_key_and_options()
775 principals, 0) != 1) { in parse_principals_key_and_options()
818 *principalsp = principals; in parse_principals_key_and_options()
819 principals = NULL; /* transferred */ in parse_principals_key_and_options()
831 free(principals); in parse_principals_key_and_options()
841 char *cp, *oprincipals, *principals; in cert_filter_principals() local
847 oprincipals = principals = *principalsp; in cert_filter_principals()
855 while ((cp = strsep(&principals, ",")) != NULL && *cp != '\0') { in cert_filter_principals()
865 if (match_pattern(cert->cert->principals[i], cp)) { in cert_filter_principals()
[all …]
H A Dauth2-pubkeyfile.c63 * Check keys/principals file expiry time. in auth_authorise_keyopts()
75 debug("%s: principals on non-CA key", loc); in auth_authorise_keyopts()
76 auth_debug_add("%s: principals on non-CA key", loc); in auth_authorise_keyopts()
155 if ((result = match_list(cert->principals[i], in match_principals_option()
201 debug("%s: bad principals options: %s", loc, reason); in auth_check_principals_line()
202 auth_debug_add("%s: bad principals options: %s", loc, reason); in auth_check_principals_line()
205 /* Check principals in cert against those on line */ in auth_check_principals_line()
207 if (strcmp(cp, cert->principals[i]) != 0) in auth_check_principals_line()
210 loc, cert->principals[i]); in auth_check_principals_line()
358 * If the user has specified a list of principals as in auth_check_authkey_line()
[all …]
H A DPROTOCOL.certkeys85 string valid principals
105 string valid principals
125 string valid principals
142 string valid principals
176 "valid principals" is a string containing zero or more principals as
177 strings packed inside it. These principals list the names for which this
180 zero-length "valid principals" field means the certificate is valid for
H A Dssh-keygen.1124 .Op Fl n Ar principals
149 .Fl Y Cm find-principals
154 .Fl Y Cm match-principals
468 .It Fl n Ar principals
469 Specify one or more principals (user or host names) to be included in
471 Multiple principals may be specified, separated by commas.
695 .It Fl Y Cm find-principals
705 If one or more matching principals are found, they are returned on
707 .It Fl Y Cm match-principals
713 If one or more matching principals are found, they are returned on
[all …]
/freebsd/crypto/heimdal/kadmin/
H A Dkadmin.889 one or more principals as argument
97 matching principals.
149 Creates a keytab with the keys of the specified principals.
159 Lists the matching principals, short prints the result as a table,
171 just printing the names of matched principals.
281 Check database for strange configurations on important principals. If
314 the principals that had at least one strong encryption type
315 key should work and any keytabs for those principals should still work.
H A Dkadmin-commands.in110 …help = "Initializes the default principals for a realm. Creates the database\nif necessary. Local …
221 help = "Changes the password of one or more principals matching the expressions."
230 help = "Deletes all principals matching the expressions."
260 …help = "Extracts the keys of all principals matching the expressions, and stores them in a keytab.…
294 help = "Shows information about principals matching the expressions."
348 help = "allowed target principals"
404 help = "Lists principals in a terse format. Equivalent to \"get -t\"."
/freebsd/crypto/krb5/src/windows/leash/htmlhelp/
H A DTOC.hhc74 <param name="Name" value="Principals">
75 <param name="Local" value="HTML\Principals.htm">
79 <param name="Name" value="About Principals">
80 <param name="Local" value="HTML\Principals.htm">
83 <param name="Name" value="Manage Multiple Principals">
/freebsd/crypto/heimdal/lib/krb5/
H A Dkrb5_425_conv_principal.341 .Nd converts to and from version 4 principals
53 Converting between version 4 and version 5 principals can at best be
63 the conversion between principals will have to be site customized.
72 principals, and if

123456789