k5login.5 2.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596
  1. .\" Man page generated from reStructuredText.
  2. .
  3. .TH "K5LOGIN" "5" " " "1.20.1" "MIT Kerberos"
  4. .SH NAME
  5. k5login \- Kerberos V5 acl file for host access
  6. .
  7. .nr rst2man-indent-level 0
  8. .
  9. .de1 rstReportMargin
  10. \\$1 \\n[an-margin]
  11. level \\n[rst2man-indent-level]
  12. level margin: \\n[rst2man-indent\\n[rst2man-indent-level]]
  13. -
  14. \\n[rst2man-indent0]
  15. \\n[rst2man-indent1]
  16. \\n[rst2man-indent2]
  17. ..
  18. .de1 INDENT
  19. .\" .rstReportMargin pre:
  20. . RS \\$1
  21. . nr rst2man-indent\\n[rst2man-indent-level] \\n[an-margin]
  22. . nr rst2man-indent-level +1
  23. .\" .rstReportMargin post:
  24. ..
  25. .de UNINDENT
  26. . RE
  27. .\" indent \\n[an-margin]
  28. .\" old: \\n[rst2man-indent\\n[rst2man-indent-level]]
  29. .nr rst2man-indent-level -1
  30. .\" new: \\n[rst2man-indent\\n[rst2man-indent-level]]
  31. .in \\n[rst2man-indent\\n[rst2man-indent-level]]u
  32. ..
  33. .SH DESCRIPTION
  34. .sp
  35. The .k5login file, which resides in a user\(aqs home directory, contains
  36. a list of the Kerberos principals. Anyone with valid tickets for a
  37. principal in the file is allowed host access with the UID of the user
  38. in whose home directory the file resides. One common use is to place
  39. a .k5login file in root\(aqs home directory, thereby granting system
  40. administrators remote root access to the host via Kerberos.
  41. .SH EXAMPLES
  42. .sp
  43. Suppose the user \fBalice\fP had a .k5login file in her home directory
  44. containing just the following line:
  45. .INDENT 0.0
  46. .INDENT 3.5
  47. .sp
  48. .nf
  49. .ft C
  50. bob@FOOBAR.ORG
  51. .ft P
  52. .fi
  53. .UNINDENT
  54. .UNINDENT
  55. .sp
  56. This would allow \fBbob\fP to use Kerberos network applications, such as
  57. ssh(1), to access \fBalice\fP\(aqs account, using \fBbob\fP\(aqs Kerberos
  58. tickets. In a default configuration (with \fBk5login_authoritative\fP set
  59. to true in krb5.conf(5)), this .k5login file would not let
  60. \fBalice\fP use those network applications to access her account, since
  61. she is not listed! With no .k5login file, or with \fBk5login_authoritative\fP
  62. set to false, a default rule would permit the principal \fBalice\fP in the
  63. machine\(aqs default realm to access the \fBalice\fP account.
  64. .sp
  65. Let us further suppose that \fBalice\fP is a system administrator.
  66. Alice and the other system administrators would have their principals
  67. in root\(aqs .k5login file on each host:
  68. .INDENT 0.0
  69. .INDENT 3.5
  70. .sp
  71. .nf
  72. .ft C
  73. alice@BLEEP.COM
  74. joeadmin/root@BLEEP.COM
  75. .ft P
  76. .fi
  77. .UNINDENT
  78. .UNINDENT
  79. .sp
  80. This would allow either system administrator to log in to these hosts
  81. using their Kerberos tickets instead of having to type the root
  82. password. Note that because \fBbob\fP retains the Kerberos tickets for
  83. his own principal, \fBbob@FOOBAR.ORG\fP, he would not have any of the
  84. privileges that require \fBalice\fP\(aqs tickets, such as root access to
  85. any of the site\(aqs hosts, or the ability to change \fBalice\fP\(aqs
  86. password.
  87. .SH SEE ALSO
  88. .sp
  89. kerberos(1)
  90. .SH AUTHOR
  91. MIT
  92. .SH COPYRIGHT
  93. 1985-2022, MIT
  94. .\" Generated by docutils manpage writer.
  95. .