**+no_auth_data_required** prevents PAC or AD-SIGNEDPATH data from
being added to service tickets for the principal.
+{-\|+}\ **lockdown_keys**
+ **+lockdown_keys** prevents keys for this principal from leaving
+ the KDC via kadmind. The chpass and extract operations are denied
+ for a principal with this attribute. The chrand operation is
+ allowed, but will not return the new keys. The delete and rename
+ operations are also denied if this attribute is set, in order to
+ prevent a malicious administrator from replacing principals like
+ krbtgt/* or kadmin/* with new principals without the attribute.
+ This attribute can be set via the network protocol, but can only
+ be removed using kadmin.local.
+
**-randkey**
Sets the key of the principal to a random value.
**-norandkey**
Do not randomize the keys. The keys and their version numbers stay
- unchanged. This option is only available in kadmin.local, and
- cannot be specified in combination with the **-e** option.
+ unchanged. This option cannot be specified in combination with the
+ **-e** option.
An entry for each of the principal's unique encryption types is added,
ignoring multiple keys with the same encryption type but different
\* Same as x.
== ======================================================
+.. note::
+
+ The ``extract`` privilege is not included in the wildcard
+ privilege; it must be explicitly assigned. This privilege
+ allows the user to extract keys from the database, and must be
+ handled with great care to avoid disclosure of important keys
+ like those of the kadmin/* or krbtgt/* principals. The
+ **lockdown_keys** principal attribute can be used to prevent
+ key extraction from specific principals regardless of the
+ granted privilege.
*target_principal*
(Optional. Partially or fully qualified Kerberos principal name.)
T}
_
T{
+e
+T} T{
+[Dis]allows the extraction of principal keys
+T}
+_
+T{
i
T} T{
[Dis]allows inquiries about principals or policies
T{
x
T} T{
-Short for admcilsp. All privileges
+Short for admcilsp. All privileges (except \fBe\fP)
T}
_
T{
T}
_
.TE
+.UNINDENT
+.sp
+\fBNOTE:\fP
+.INDENT 0.0
+.INDENT 3.5
+The \fBextract\fP privilege is not included in the wildcard
+privilege; it must be explicitly assigned. This privilege
+allows the user to extract keys from the database, and must be
+handled with great care to avoid disclosure of important keys
+like those of the kadmin/* or krbtgt/* principals. The
+\fBlockdown_keys\fP principal attribute can be used to prevent
+key extraction from specific principals regardless of the
+granted privilege.
+.UNINDENT
+.UNINDENT
+.INDENT 0.0
.TP
.B \fItarget_principal\fP
(Optional. Partially or fully qualified Kerberos principal name.)
.SH AUTHOR
MIT
.SH COPYRIGHT
-1985-2015, MIT
+1985-2016, MIT
.\" Generated by docutils manpage writer.
.
\fB+no_auth_data_required\fP prevents PAC or AD\-SIGNEDPATH data from
being added to service tickets for the principal.
.TP
+.B {\-|+}\fBlockdown_keys\fP
+\fB+lockdown_keys\fP prevents keys for this principal from leaving
+the KDC via kadmind. The chpass and extract operations are denied
+for a principal with this attribute. The chrand operation is
+allowed, but will not return the new keys. The delete and rename
+operations are also denied if this attribute is set, in order to
+prevent a malicious administrator from replacing principals like
+krbtgt/* or kadmin/* with new principals without the attribute.
+This attribute can be set via the network protocol, but can only
+be removed using kadmin.local.
+.TP
.B \fB\-randkey\fP
Sets the key of the principal to a random value.
.TP
.TP
.B \fB\-norandkey\fP
Do not randomize the keys. The keys and their version numbers stay
-unchanged. This option is only available in kadmin.local, and
-cannot be specified in combination with the \fB\-e\fP option.
+unchanged. This option cannot be specified in combination with the
+\fB\-e\fP option.
.UNINDENT
.sp
An entry for each of the principal\(aqs unique encryption types is added,
.SH AUTHOR
MIT
.SH COPYRIGHT
-1985-2015, MIT
+1985-2016, MIT
.\" Generated by docutils manpage writer.
.