blob: 3eee78bef36e0b92ce291a66a49be17cedfa2ab0 [file] [log] [blame]
rsc83c45062005-02-11 19:43:43 +00001.TH SECSTORED 1
rscd93fca62005-02-11 19:21:47 +00002.SH NAME
3secstored, secuser \- secstore commands
4.SH SYNOPSIS
5.br
6.B secstored
7[-R]
8[-S servername]
9[-s tcp!*!5356]
10[-x mountpoint]
11.br
12.B secuser
13[-v]
14username
15.br
16.PP
17.SH DESCRIPTION
18.PP
19.I Secstored
20serves requests from
21.IR secstore (1).
22The
23.B -R
24option supplements the password check with a
25call to a RADIUS server, for checking hardware
26tokens or other validation.
27The
28.BR -x mountpoint
29option specifies an alternative to the default network
30.BR /net .
31.PP
32.I Secuser
33is an administrative command that runs on the
34secstore machine, normally the authserver,
35to create new accounts and
36to change status on existing accounts.
37It prompts for account information such as
38password and expiration date, writing to
39.BR \*9/secstore/who/$uid .
40The
41.B \*9/secstore
42directory should be created mode 770 for the userid
43or groupid of the secstored process.
44.PP
45By default,
46.I secstored
47warns the client if no account exists.
48If you prefer to obscure this information, use
49.I secuser
50to create an account
51.BR FICTITIOUS .
52.SH FILES
53.B \*9/secstore/who/$uid
54secstore account name, expiration date, verifier
55.br
56.B \*9/secstore/store/$uid/
57users' files
58.br
59.B \*9/ndb/auth
60for mapping local userid to RADIUS userid
61.SH SOURCE
rsc30f6ae12005-02-13 23:44:12 +000062.B \*9/src/cmd/auth/secstore
rscd93fca62005-02-11 19:21:47 +000063.SH SEE ALSO
64.IR secstore (1)