1.\" Copyright (c) 2005 Kungliga Tekniska Högskolan 2.\" (Royal Institute of Technology, Stockholm, Sweden). 3.\" All rights reserved. 4.\" 5.\" Redistribution and use in source and binary forms, with or without 6.\" modification, are permitted provided that the following conditions 7.\" are met: 8.\" 9.\" 1. Redistributions of source code must retain the above copyright 10.\" notice, this list of conditions and the following disclaimer. 11.\" 12.\" 2. Redistributions in binary form must reproduce the above copyright 13.\" notice, this list of conditions and the following disclaimer in the 14.\" documentation and/or other materials provided with the distribution. 15.\" 16.\" 3. Neither the name of the Institute nor the names of its contributors 17.\" may be used to endorse or promote products derived from this software 18.\" without specific prior written permission. 19.\" 20.\" THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND 21.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 22.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 23.\" ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE 24.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 25.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 26.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 27.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 28.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 29.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 30.\" SUCH DAMAGE. 31.\" 32.\" $Id$ 33.\" 34.Dd February 12, 2005 35.Dt PAGSH 1 36.Os Heimdal 37.Sh NAME 38.Nm pagsh 39.Nd creates a new credential cache sandbox 40.Sh SYNOPSIS 41.Nm 42.Op Fl c Ar command-string 43.Op Fl h | Fl Fl help 44.Op Fl Fl version 45.Op Fl Fl cache-type= Ns Ar string 46.Ar command [args...] 47.Sh DESCRIPTION 48Supported options: 49.Bl -tag -width Ds 50.It Xo 51.Fl c Ar command-string 52Executes command(s) contained in 53.Ar command-string . 54.Xc 55.It Xo 56.Fl Fl cache-type= Ns Ar string 57.Xc 58.It Xo 59.Fl h , 60.Fl Fl help 61.Xc 62.It Xo 63.Fl Fl version 64.Xc 65.El 66.Pp 67.Nm 68creates a new credential cache sandbox for the user to live in. 69If AFS is installed on the computer, the user is put in a newly 70created Process Authentication Group (PAG). 71.Pp 72For Kerberos 5, the credential cache type that is used is the same as 73the credential cache type that was used at the time of 74.Nm 75invocation. 76The credential cache type can be controlled by the option 77.Fl Fl cache-type . 78.Sh EXAMPLES 79Create a new sandbox where new credentials can be used, while the old 80credentials can be used by other processes. 81.Bd -literal -offset indent 82$ klist 83Credentials cache: FILE:/tmp/krb5cc_913 84 Principal: lha@E.KTH.SE 85 86 Issued Expires Principal 87Feb 12 10:08:31 Feb 12 20:06:36 krbtgt/E.KTH.SE@E.KTH.SE 88$ pagsh 89$ klist 90klist: No ticket file: /tmp/krb5cc_03014a 91.Ed 92.Sh SEE ALSO 93.Xr afslog 1 , 94.Xr kinit 1 95