Copyright 1987, 1989 by the Student Information Processing Board of the Massachusetts Institute of Technology. For copying and distribution information, please see the file kerberosv5/mit-sipb-copyright.h.
Portions Copyright (c) 2007, Sun Microsystems, Inc. All Rights Reserved
The contents of this file are subject to the terms of the Common Development and Distribution License (the "License"). You may not use this file except in compliance with the License.
You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE or http://www.opensolaris.org/os/licensing. See the License for the specific language governing permissions and limitations under the License.
When distributing Covered Code, include this CDDL HEADER in each file and include the License file at usr/src/OPENSOLARIS.LICENSE. If applicable, add the following below this CDDL HEADER, with the fields enclosed by brackets "[]" replaced with your own identifying information: Portions Copyright [yyyy] [name of copyright owner]
/usr/lib/krb5/krb5kdc [-d dbpath] [-r realm] [-m] [-k masterenctype] [-M masterkeyname] [-p port] [-n] [-x db_args]...
krb5kdc is the daemon that runs on the master and slave KDCs to process the Kerberos tickets. For Kerberos to function properly, krb5kdc must be running on at least one KDC that the Kerberos clients can access. Prior to running krb5kdc, you must initialize the Kerberos database using kdb5_util(1M). See the for information regarding how to set up KDCs and initialize the Kerberos database.
The following options are supported: -d dbpath
-k masterenctypeSpecify the encryption type for encrypting the database. The default value is des-cbc-crc. des3-cbc-sha1, arcfour-hmac-md5, arcfour-hmac-md5-exp, aes128-cts-hmac-sha1-96, and aes256-cts-hmac-sha1-96 are also valid.
Specify that the master key for the database is to be entered manually.
Specify the principal to retrieve the master Key for the database.
Specify that krb5kdc should not detach from the terminal.
Specify the port that will be used by the KDC to listen for incoming requests.
Specify the realm name; default is the local realm name.
Pass database-specific arguments to kadmin. Supported arguments are for the LDAP plug-in. These arguments are: binddn=binddn
Specifies the DN of the object used by the KDC server to bind to the LDAP server. This object should have the rights to read the realm container, principal container and the subtree that is referenced by the realm. Overrides the ldap_kdc_dn parameter setting in krb5.conf(4).
Specifies the password for the above-mentioned binddn. It is recommended not to use this option. Instead, the password can be stashed using the stashsrvpw command of kdb5_ldap_util(1M).
Specifies the number of connections to be maintained per LDAP server.
Specifies, by an LDAP URI, the LDAP server to which to connect.
Kerberos principal database.
Kerberos administrative database. This file contains policy information.
Kerberos administrative database lock file. This file works backwards from most other lock files (that is, kadmin will exit with an error if this file does not exist).
KDC configuration file. This file is read at startup.
File that defines the access control list for propagating the Kerberos database using kprop.
kill(1), kpasswd(1), kadmind(1M), kadmin.local(1M), kdb5_util(1M), kdb5_ldap_util(1M), logadm(1M), krb5.conf(4), attributes(5), krb5envvar(5), kerberos(5),
The following signal has the specified effect when sent to the server process using the kill(1)command: SIGHUP
krb5kdc closes and re-opens log files that it directly opens. This can be useful for external log-rotation utilities such as logadm(1M). If this method is used for log file rotation, set the krb5.conf(4) kdc_rotate period relation to never.