ktab
allows the user to manage the principal
names and service keys stored in a local key table. Principal and
key pairs listed in the keytab allow services running on a host
to authenticate themselves to the Key Distribution Center (KDC).
Before a server can be setup to use Kerberos, the user must setup
a keytab on the host running the server. Note that any updates
made to the keytab using ktab
do not affect the
Kerberos database. If you change the keys in the keytab, you must
also make the corresponding changes to the Kerberos database.
ktab [ commands
]
ktab
manages principal name and key pairs in the
key table. ktab allows the user to list, add, update or delete
principal names and key pairs in the key table. None of these
operations affect the Kerberos database.
Usage: The command line options are not case-sensitive.
ktab -help
ktab -l [-e -t] [-k
<keytab_name>]
ktab [-a
<principal_name>
<password>] [-k
<keytab_name>]
ktab [-d
<principal_name>
[<etype>]] [-k
<keytab_name>]
Command Option | Description |
---|---|
-l [-e -t] |
List the keytab name and entries. When -e is specified, the encryption type for each entry is displayed. When -t is specified, timestamp for each entry is displayed. |
-a <principal_name>
<password> |
Add an entry to the keytab. No changes are made to the Kerberos database. (DO NOT SPECIFY YOUR PASSWORD ON COMMAND LINE OR IN A SCRIPT.) |
-d <principal_name>
[<etype>] |
Delete one or more entries from the keytab. No changes are made to the Kerberos database. When etype is provided, only the entry matching this encryption type is deleted. Otherwise, all entries are deleted. |
-k
<keytab_name> |
Specify keytab name and path with the prefix
FILE: |
-help |
Displays instructions. |
ktab -l
ktab -a duke@java.sun.com
ktab -d duke@java.sun.com
Do not specify your password on the command line. Doing so is
a security hole. For example, an attacker could discover your
password while running the Unix ps
command.