4.3BSD-Reno/share/man/cat3/kuserok.0

Compare this file to the similar file:
Show the results in this format:




KUSEROK(3)		       4.0		       KUSEROK(3)



NNAAMMEE
     kuserok - Kerberos version of ruserok

SSYYNNOOPPSSIISS
     ##iinncclluuddee <<kkeerrbbeerroossIIVV//kkrrbb..hh>>

     kkuusseerrookk((kkddaattaa,, llooccaalluusseerr))
     AAUUTTHH__DDAATT **aauutthh__ddaattaa;;
     cchhaarr   **llooccaalluusseerr;;

DDEESSCCRRIIPPTTIIOONN
     _k_u_s_e_r_o_k determines whether a Kerberos principal described by
     the structure _a_u_t_h__d_a_t_a is authorized to login as user
     _l_o_c_a_l_u_s_e_r according to the authorization file
     ("~_l_o_c_a_l_u_s_e_r/.klogin" by default).  It returns 0 (zero) if
     authorized, 1 (one) if not authorized.

     If there is no account for _l_o_c_a_l_u_s_e_r on the local machine,
     authorization is not granted.  If there is no authorization
     file, and the Kerberos principal described by _a_u_t_h__d_a_t_a
     translates to _l_o_c_a_l_u_s_e_r (using _k_r_b__k_n_t_o_l_n(3)), authorization
     is granted.  If the authorization file can't be accessed, or
     the file is not owned by _l_o_c_a_l_u_s_e_r, authorization is denied.
     Otherwise, the file is searched for a matching principal
     name, instance, and realm.  If a match is found, authoriza-
     tion is granted, else authorization is denied.

     The file entries are in the format:
	       name.instance@realm
     with one entry per line.

SSEEEE AALLSSOO
     kerberos(3), ruserok(3), krb_kntoln(3)

FFIILLEESS
     ~_l_o_c_a_l_u_s_e_r/.klogin  authorization list



















Printed 7/27/90             Kerberos				1