Welcome to Linux Knowledge Base and Tutorial
"The place where you learn linux"

 Create an AccountHome | Submit News | Your Account  

Tutorial Menu
Linux Tutorial Home
Table of Contents

· Introduction to Operating Systems
· Linux Basics
· Working with the System
· Shells and Utilities
· Editing Files
· Basic Administration
· The Operating System
· The X Windowing System
· The Computer Itself
· Networking
· System Monitoring
· Solving Problems
· Security
· Installing and Upgrading
· Linux and Windows

Man Pages
Linux Topics
Test Your Knowledge

Site Menu
Site Map
Copyright Info
Terms of Use
Privacy Info
Masthead / Impressum
Your Account

Private Messages

News Archive
Submit News
User Articles
Web Links


The Web

Who's Online
There are currently, 66 guest(s) and 0 member(s) that are online.

You are an Anonymous user. You can register for free by clicking here



       ktab  allows  the  user  to manage the principal names and
       service keys stored in a local key  table.  Principal  and
       key pairs listed in the keytab allow services running on a
       host to authenticate themselves to  the  Key  Distribution
       Center  (KDC).  Before  a  server can be setup to use Ker­
       beros, the user must setup a keytab on  the  host  running
       the server. Note that any updates made to the keytab using
       ktab do not affect the Kerberos database.  If  you  change
       the keys in the keytab, you must also make the correspond­
       ing changes to the Kerberos database.


       ktab [ commands ]


       ktab manages principal name  and  key  pairs  in  the  key
       table.   ktab  allows  the  user  to  list, add, update or
       delete principal names and key pairs  in  the  key  table.
       None of these operations affect the Kerberos database.


       A  keytab  is  a  host's copy of its own keylist, which is
       analogous to a user's password. An application server that
       needs  to authenticate itself to the Key Distribution Cen­
       ter (KDC) must have a keytab which contains its own  prin­
       cipal  and key.  Just as it is important for users to pro­
       tect their passwords, it is equally important for hosts to
       protect  their  keytabs.  You  should  always store keytab
       files on the local disk and make  them  readable  only  by
       root.   You should never send a keytab file over a network
       in the clear.


       Usage: The command line options are not case sensitive.

       ktab -help

       ktab -l [-k <keytab_name>]

       ktab [-a <principal_name> <password>] [-k <keytab_name>]

       ktab [-d <principal_name>] [-k <keytab_name>]

       -l     List the keytab name and entries.

       -a     <principal_name> <password> Add  an  entry  to  the
              keytab.   No  changes  are  made  to  the  Kerberos
              LINE OR IN A SCRIPT.)

       will be prompted for your password):

       ktab -a duke@java.sun.com

       To delete a principal from the key table:

       ktab -d duke@java.sun.com


       Do not specify your password on the command  line.   Doing
       so is a security hole. For example, an attacker could dis­
       cover your password while running the Unix ps command.

                           21 Oct 2002                    ktab(1)

The Linux Tutorial is always looking for new contributors.



Security Code
Security Code
Type Security Code

Don't have an account yet? You can create one. As a registered user you have some advantages like theme manager, comments configuration and post comments with your name.

Help if you can!

Amazon Wish List

Did You Know?
The Linux Tutorial welcomes your suggestions and ideas.


Tell a Friend About Us

Bookmark and Share

Web site powered by PHP-Nuke

Is this information useful? At the very least you can help by spreading the word to your favorite newsgroups, mailing lists and forums.
All logos and trademarks in this site are property of their respective owner. The comments are property of their posters. Articles are the property of their respective owners. Unless otherwise stated in the body of the article, article content (C) 1994-2013 by James Mohr. All rights reserved. The stylized page/paper, as well as the terms "The Linux Tutorial", "The Linux Server Tutorial", "The Linux Knowledge Base and Tutorial" and "The place where you learn Linux" are service marks of James Mohr. All rights reserved.
The Linux Knowledge Base and Tutorial may contain links to sites on the Internet, which are owned and operated by third parties. The Linux Tutorial is not responsible for the content of any such third-party site. By viewing/utilizing this web site, you have agreed to our disclaimer, terms of use and privacy policy. Use of automated download software ("harvesters") such as wget, httrack, etc. causes the site to quickly exceed its bandwidth limitation and are therefore expressly prohibited. For more details on this, take a look here

PHP-Nuke Copyright © 2004 by Francisco Burzi. This is free software, and you may redistribute it under the GPL. PHP-Nuke comes with absolutely no warranty, for details, see the license.
Page Generation: 0.09 Seconds