3 \&.k5login \- Kerberos V5 acl file for host access.
7 file, which resides in a user's home directory, contains a list of the
8 Kerberos principals. Anyone with valid tickets for a principal in the
9 file is allowed host access with the UID of the user in whose home
10 directory the file resides. One common use is to place a
12 file in root's home directory, thereby granting system administrators
13 remote root access to the host via Kerberos.
15 Suppose the user "alice" had a
17 file in her home directory containing the following line:
25 This would allow "bob" to use any of the Kerberos network
32 to access alice's account, using bob's Kerberos tickets.
34 Let us further suppose that "alice" is a system administrator. Alice
35 and the other system administrators would have their principals in
43 joeadmin/root@BLEEP.COM
47 This would allow either system administrator to log in to these hosts
48 using their Kerberos tickets instead of having to type the root
49 password. Note that because "bob" retains the Kerberos tickets for
50 his own principal, "bob@FUBAR.ORG", he would not have any of the
51 privileges that require alice's tickets, such as root access to any of
52 the site's hosts, or the ability to change alice's password.
54 telnet(1), rlogin(1), rsh(1), rcp(1), ksu(1), telnetd(8), klogind(8)