这里列出
Kerberos
中常用的命令。
使用指南(日常)
登录 kinit admin/[email protected]
[root@dounine ~]# kinit admin/[email protected] for admin/[email protected]: 123456
查询登录状态 klist
[root@dounine ~]# klistTicket cache: FILE:/tmp/krb5cc_0Default principal: admin/[email protected] Valid starting Expires Service principal2018-07-12T00:54:55 2018-07-13T00:54:55 krbtgt/[email protected]
退出 kdestroy
[root@dounine ~]# kdestroy[root@dounine ~]# klistklist: No credentials cache found (filename: /tmp/krb5cc_0)
指使指南(维护)
登录管理KDC
服务器
登录后台 kadmin.local
[root@dounine ~]# kadmin.localAuthenticating as principal root/[email protected] with password. kadmin.local:
查看用户列表 listprincs
[root@dounine ~]# kadmin.localAuthenticating as principal root/[email protected] with password. kadmin.local: listprincs K/[email protected] activity_analyzer/[email protected] activity_explorer/[email protected] admin/[email protected] ...
修改帐号密码(可修改忘记密码)
[root@dounine ~]# kadmin.localAuthenticating as principal root/[email protected] with password. kadmin.local: change_password admin/[email protected] Enter password for principal "admin/[email protected]": 123456Re-enter password for principal "admin/[email protected]": 123456Password for "admin/[email protected]" changed.
创建用户
[root@dounine ~]# kadmin.localAuthenticating as principal root/[email protected] with password. kadmin.local: add_principal test1WARNING: no policy specified for [email protected]; defaulting to no policy Enter password for principal "[email protected]": 123456Re-enter password for principal "[email protected]": 123456Principal "[email protected]" created.
删除用户
[root@dounine ~]# kadmin.localAuthenticating as principal root/[email protected] with password. kadmin.local: delete_principal test1 Are you sure you want to delete the principal "[email protected]"? (yes/no): yes Principal "[email protected]" deleted. Make sure that you have removed this principal from all ACLs before reusing.
只导出用户keytab
文件(并且不要修改密码)
[root@dounine ~]# kadmin.localAuthenticating as principal root/[email protected] with password. kadmin.local: xst -k admin.keytab -norandkey admin/[email protected] Entry for principal admin/[email protected] with kvno 6, encryption type aes256-cts-hmac-sha1-96 added to keytab WRFILE:admin.keytab. Entry for principal admin/[email protected] with kvno 6, encryption type aes128-cts-hmac-sha1-96 added to keytab WRFILE:admin.keytab. Entry for principal admin/[email protected] with kvno 6, encryption type des3-cbc-sha1 added to keytab WRFILE:admin.keytab. Entry for principal admin/[email protected] with kvno 6, encryption type arcfour-hmac added to keytab WRFILE:admin.keytab. Entry for principal admin/[email protected] with kvno 6, encryption type camellia256-cts-cmac added to keytab WRFILE:admin.keytab. Entry for principal admin/[email protected] with kvno 6, encryption type camellia128-cts-cmac added to keytab WRFILE:admin.keytab. Entry for principal admin/[email protected] with kvno 6, encryption type des-hmac-sha1 added to keytab WRFILE:admin.keytab. Entry for principal admin/[email protected] with kvno 6, encryption type des-cbc-md5 added to keytab WRFILE:admin.keytab. kadmin.local: exit
PS:有些教程说是ktadd
,其实它们是一样的效果,在命令使用帮助中我们可以查询到哪些命令是一样的。
[root@dounine ~]# kadmin.localAuthenticating as principal root/[email protected] with password. kadmin.local: ? #是查看帮助命令Available kadmin.local requests: add_principal, addprinc, ank Add principal delete_principal, delprinc Delete principal modify_principal, modprinc Modify principal rename_principal, renprinc Rename principal change_password, cpw Change password get_principal, getprinc Get principal list_principals, listprincs, get_principals, getprincs List principals add_policy, addpol Add policy modify_policy, modpol Modify policy delete_policy, delpol Delete policy get_policy, getpol Get policy list_policies, listpols, get_policies, getpols List policies get_privs, getprivs Get privileges ktadd, xst Add entry(s) to a keytab ktremove, ktrem Remove entry(s) from a keytab lock Lock database exclusively (use with extreme caution!)unlock Release exclusive database lockpurgekeys Purge previously retained old keys from a principalget_strings, getstrs Show string attributes on a principalset_string, setstr Set a string attribute on a principaldel_string, delstr Delete a string attribute on a principallist_requests, lr, ? List available requests.quit, exit, q Exit program.
用逗号分隔的命令就是相等的,例如
add_principal, addprinc, ank delete_principal, delprinc ktadd, xst ...等等
使用Keytab
验证是否可以登录(无错误输出即可)
kinit -kt /etc/security/keytabs/admin.keytab admin/[email protected]
查看keytab
文件中的帐号列表
[root@dounine ~]# klist -ket hbase.headless.keytabKeytab name: FILE:hbase.headless.keytabKVNO Timestamp Principal---- ------------------- ------------------------------------------------------ 7 2018-07-30T10:19:16 [email protected] (des-cbc-md5) 7 2018-07-30T10:19:16 [email protected] (aes128-cts-hmac-sha1-96) 7 2018-07-30T10:19:16 [email protected] (aes256-cts-hmac-sha1-96) 7 2018-07-30T10:19:16 [email protected] (des3-cbc-sha1) 7 2018-07-30T10:19:16 [email protected] (arcfour-hmac)
作者:dounine
链接:https://www.jianshu.com/p/69e6a2e7c648
點擊查看更多內容
1人點贊
評論
評論
共同學習,寫下你的評論
評論加載中...
作者其他優質文章
正在加載中
感謝您的支持,我會繼續努力的~
掃碼打賞,你說多少就多少
贊賞金額會直接到老師賬戶
支付方式
打開微信掃一掃,即可進行掃碼打賞哦