I believe there is an error in the commands you have given out.  If you use the 
-expire switch it sets an expiry date on the principal itself and not the 
principal PW.  I believe the switch you need is -pwexpire.  Correct me if I am 
wrong, but I tested with my KDC’s and confirmed.

William Clark

> 
> You need to make sure this policy object is associated with all existing and 
> future user principals.  Example commands:
> 
>    kadmin: modprinc -policy userpolicy oldprinc
>    kadmin: addprinc -policy userpolicy newprinc
> 
> If you name a policy object "default", the kadmin addprinc command will use 
> it by default, but applies to all principals (e.g. server principals), not 
> just user principals.
> 
> 2. Set a password expiration time on existing principals.  For example:
> 
>    kadmin: modprinc -expire "180 days" oldprinc
> 
> Unfortunately, we do not have any batch modification facilities in kadmin, so 
> it's up to you to script these commands to run over existing principals.  
> Some features which might help are:
> 
> * You can run "kinit -S kadmin/admin -c /path/to/ccache user/admin" to create 
> a ccache, and then use "kadmin -c /path/to/ccache" to avoid having to 
> authenticate for each command. Alternatively, you can just use kadmin.local 
> on the master KDC.
> 
> * In 1.14, you can specify a command on the kadmin or kadmin.local command 
> line after the options, like:
> 
>    kadmin.local modprinc -expire "180 days" oldprinc
> 
> In prior releases, you must use the slightly more awkward:
> 
>    kadmin.local -q 'modprinc -expire "180 days" oldprinc'

________________________________________________
Kerberos mailing list           Kerberos@mit.edu
https://mailman.mit.edu/mailman/listinfo/kerberos

Reply via email to