Provided by: krb5-doc_1.10+dfsg~beta1-2_all bug

NAME

       .k5login - Kerberos V5 acl file for host access.

DESCRIPTION

       The  .k5login  file,  which  resides  in  a  user's home directory, contains a list of the
       Kerberos principals.  Anyone with valid tickets for a principal in  the  file  is  allowed
       host access with the UID of the user in whose home directory the file resides.  One common
       use is to place a  .k5login  file  in  root's  home  directory,  thereby  granting  system
       administrators remote root access to the host via Kerberos.

EXAMPLES

       Suppose  the  user  "alice"  had  a  .k5login  file  in  her home directory containing the
       following line:

                 bob@FUBAR.ORG

       This would allow "bob" to use any of the Kerberos network applications, such as telnet(1),
       rlogin(1), rsh(1), and rcp(1), to access alice's account, using bob's Kerberos tickets.

       Let us further suppose that "alice" is a system administrator.  Alice and the other system
       administrators would have their principals in root's .k5login file on each host:

                 alice@BLEEP.COM
                 joeadmin/root@BLEEP.COM

       This would allow either system administrator to log in to these hosts using their Kerberos
       tickets  instead of having to type the root password.  Note that because "bob" retains the
       Kerberos tickets for his own principal, "bob@FUBAR.ORG", he would  not  have  any  of  the
       privileges  that  require alice's tickets, such as root access to any of the site's hosts,
       or the ability to change alice's password.

SEE ALSO

       telnet(1), rlogin(1), rsh(1), rcp(1), ksu(1), telnetd(8), klogind(8)

                                                                                      .K5LOGIN(5)