|
NAMEwa_keyring - WebAuth keyring manipulation toolSYNOPSISwa_keyring [-hv] -f file command [arg ...]wa_keyring -f keyring add valid-after wa_keyring -f keyring gc oldest-valid-after-to-keep wa_keyring -f keyring list wa_keyring -f keyring remove id DESCRIPTIONwa_keyring is a command line tool to manage WebAuth key ring files, which contain the private AES keys used by mod_webauth and mod_webkdc. It supports the following individual commands:
The following fields are present in the long listing:
For any of the commands that change the keyring, wa_keyring must have write access to the directory containing the keyring, since keyrings are updated by writing out the new file to a separate name and then atomically replacing the file. Ownership (user and group) of the existing keyring file will be preserved if possible without overwriting the existing file. Permissions will also be preserved, with the exception that permissions will not be copied to the new file if the old file was group-readable or group-writable and setting the group ownership failed. EXAMPLESAdd a key to the keyring valid as of the current time:wa_keyring -f keyring add 0d Add a key to the keyring that will be valid three days from now: wa_keyring -f keyring add 3d Remove keys from the key ring that became invalid more than 90 days ago: wa_keyring -f keyring gc -90d Remove the first key in the keyring. wa_keyring -f keyring remove 0 Display a verbose listing of all of the keys in the key ring: wa_keyring -f keyring -v list Note that a WebAuth server will normally manage its keyring file by itself, and wa_keyring is normally only used for debugging purposes. However, if you are setting up a load-balanced pool of servers that need to all share the same keys, turn off automatic keyring handling by putting the line: WebAuthKeyringAutoUpdate off to your Apache configuration, running a script periodically from cron on one server that does something like: wa_keyring -f keyring gc -90d wa_keyring -f keyring add 2d and then copying (in a secure manner!) the new keyring file to all of the other servers. AUTHORRoland Schemers <schemers@stanford.edu>COPYRIGHT AND LICENSECopyright 2002, 2004, 2005, 2014 The Board of Trustees of the Leland Stanford Junior UniversityCopying and distribution of this file, with or without modification, are permitted in any medium without royalty provided the copyright notice and this notice are preserved. This file is offered as-is, without any warranty.
Visit the GSP FreeBSD Man Page Interface. |