1KGETCRED(1)               BSD General Commands Manual              KGETCRED(1)
2

NAME

4     kgetcred — get a ticket for a particular service
5

SYNOPSIS

7     kgetcred [--canonicalize] [--canonical] [-c -cache | --cache=cache] [-e
8              enctype | --enctype=enctype] [--debug] [-H | --hostbased]
9              [--name-type=name-type] [--no-transit-check] [--no-store]
10              [--cached-only] [-n | --anonymous] [--version] [--help]
11              principal
12     kgetcred [options] --hostbased principal
13     kgetcred [options] --hostbased service hostname [extra-components]
14

DESCRIPTION

16     kgetcred obtains a ticket for the given service principal.  Usually tick‐
17     ets for services are obtained automatically when needed but sometimes for
18     some odd reason you want to obtain a particular ticket or of a special
19     type.
20
21     If --hostbased is given then the given service principal name will be
22     canonicalized (see below).
23
24     The third form constructs a host-based principal from the given service
25     name and hostname.  The service name "host" is used if the given service
26     name in the third usage is the empty string.
27
28     For host-based names, the local host's hostname is used if the given
29     hostname is the empty string or if the principal has a single component.
30
31     Any additional components will be included, even for host-based service
32     principal names, but there are no defaults nor local canonicalization
33     rules for additional components.
34
35     Local name canonicalization rules are applied unless the --canonical
36     option is given.  Currently local name canonicalization rules are sup‐
37     ported only for host-based principal names' hostname component.
38
39     The principal's realm name may be canonicalized by following Kerberos
40     referrals from the client principal's home realm if the --canonicalize
41     option is given or if the local name canonicalization rules are config‐
42     ured to use referrals.
43
44     Supported options:
45
46     --canonicalize
47             requests that the KDC canonicalize the principal.  Currently this
48             only canonicalizes the realm by chasing referrals from the user's
49             start realm, but in the future this may also enable the KDC to
50             canonicalize the complete principal name.
51
52     --canonical
53             turns off local canonicalization of the principal name.
54
55     --name-type=name-type
56             the name-type to use when parsing the principal name.
57
58     --hostbased
59             is short for --name-type=srv_hst.
60
61     -c cache, --cache=cache
62             the credential cache to use.
63
64     --delegation-credential-cache=cache
65             the credential cache to use for delegation.
66
67     -e enctype, --enctype=enctype
68             encryption type to use.
69
70     --no-transit-check
71             requests that the KDC doesn't do transit checking.
72
73     --no-store
74             do not store tickets in the ccache.
75
76     --cached-only
77             do not talk the TGS, search only the ccache.
78
79     --anonymous
80             obtain an anonymous service ticket.
81
82     --forwardable
83
84     --debug
85             enables debug output to stderr.
86
87     --version
88
89     --help
90
91     If the --canonical option is used, then no further canonicalization
92     should be done locally by the client (for example, DNS), but if
93     --canonicalize is used, then the client will ask that the KDC canonical‐
94     ize the name.
95
96     If the --canonicalize option is used with --hostbased a host-based name-
97     type, and --canonical is not used, then the hostname will be canonical‐
98     ized according to the name canonicalization rules in krb5.conf.
99
100     GSS-API initiator applications with host-based services will get the same
101     behavior as using the --canonicalize --hostbased options here.
102

SEE ALSO

104     kinit(1), klist(1), krb5.conf(5), krb5_openlog(3)
105
106HEIMDAL                         March 12, 2004                         HEIMDAL
Impressum