intro(3krb)intro(3krb)Nameintro - introduction to the Kerberos subroutines
Syntax
#include <krb.h>
#include <des.h>
cc [ options ] files -lkrb -lknet
-ldes -lacl [ libraries ]
Description
The Kerberos subroutines can provide for the authentication of and pro‐
tection against the unauthorized modification of every message sent
across a TCP/IP network from one application to another. In addition,
they provide a means to provide for the creation of access control
lists (ACL) which an application can use with Kerberos authentication,
to determine if another application is authorized to perform a particu‐
lar action.
The routines are designed to initialize the Kerberos libraries so that
the other Kerberos routines can function properly. The routines are
used to contact a Kerberos server to obtain a ticket-granting ticket
that can be used by the and routines. They also initialize pieces of
Kerberos library data. To use these routines, the libraries and must
be linked with your application in the order listed.
The routines and are designed to provide for the initial authentication
of an application to another. They are designed to be used with appli‐
cations that support "on-the-wire" protocols in which authentication
information can be placed. The routines and are designed to provide
for the authentication of and protection against the modification of
every message sent between two applications after the initial authenti‐
cation message. To use these routines, the libraries and must be
linked with your application in the order listed.
The routines are designed to provide for the mutual authentication of
two applications after the initial authentication of one application, X
to another, Y. To provide mutual authentication, Y's identity is
proven by the routines to X. To use these routines, the libraries and
must be linked with your application in the order listed.
The routines are designed to provide both the initial authentication
that and provide, as well as the mutual authentication of the routines.
The routines are designed to be used with applications that do not have
room in the protocols they support for authentication information. To
use these routines, the libraries and must be linked with your applica‐
tion in the order listed.
The routines are designed to provide information to the user about the
Kerberos environment. To use these routines, the library must be
linked with your application.
The routines are designed to provide support for the above routines
with respect to Data Encryption Standard (DES) keys. The routine can
be used to provide support for the authentication of and protection
against the modification of every message sent between two applications
after the initial authentication message. It is designed to be used
only with applications that have room in their "on-the-wire" protocol
for authentication information. To use these routines, the library
must be linked with your application.
The routines are designed allow the user of the Kerberos libraries to
modify some of the default settings of the Kerberos libraries. To use
these routines, the library must be linked with your application.
The routines are designed to provide for the creation and use of access
control lists (ACL). After an application, X, correctly authenticates
the identity of another, Y, the application X has the ability to assign
access rights to Y, based on Y's identity. The routines above provide
for the authentication of applications while the routines provide the
ability to store the access rights associated with each application.
To use these routines, the library must be linked with your applica‐
tion.
Files
See Also
All the other Kerberos reference pages:
acl_check(3krb)des_crypt(3krb)kerberos(3krb)krb_get_lrealm(3krb)krb_sendauth(3krb)krb_sendmutual(3krb)krb_set_tkt_string(3krb)krb_svc_init(3krb)krb.conf(5krb)krb_slaves(5krb)krb_dbase(5krb)ext_srvtab(8krb)kdb_destroy(8krb)kdb_edit(8krb)kdb_init(8krb)kdb_util(8krb)kdestroy(8krb)kerberos(8krb)kinit(8krb)klist(8krb)kprop(8krb)kpropd(8krb)kstash(8krb)intro(3krb)