1 | .\" $Id: fsid.1,v 1.10 2000-01-31 15:57:59 danw Exp $ |
---|
2 | .\" |
---|
3 | .\" Copyright 1997 by the Massachusetts Institute of Technology. |
---|
4 | .\" |
---|
5 | .\" Permission to use, copy, modify, and distribute this |
---|
6 | .\" software and its documentation for any purpose and without |
---|
7 | .\" fee is hereby granted, provided that the above copyright |
---|
8 | .\" notice appear in all copies and that both that copyright |
---|
9 | .\" notice and this permission notice appear in supporting |
---|
10 | .\" documentation, and that the name of M.I.T. not be used in |
---|
11 | .\" advertising or publicity pertaining to distribution of the |
---|
12 | .\" software without specific, written prior permission. |
---|
13 | .\" M.I.T. makes no representations about the suitability of |
---|
14 | .\" this software for any purpose. It is provided "as is" |
---|
15 | .\" without express or implied warranty. |
---|
16 | .\" |
---|
17 | .TH FSID 1 |
---|
18 | .SH NAME |
---|
19 | fsid \- Perform authorization functions to remote file servers |
---|
20 | .SH SYNOPSIS |
---|
21 | .nf |
---|
22 | fsid [-q | -v] [-m | -p | -r | -u] [ filesystem | host ] ... |
---|
23 | fsid [-q | -v] [-m | -p | -r | -u] -f filesystem ... |
---|
24 | fsid [-q | -v] [-m | -p | -r | -u] -h host ... |
---|
25 | fsid [-q | -v] [-m | -u] -c cell ... |
---|
26 | fsid [-q | -v] [-m | -p | -r | -u] -a |
---|
27 | .fi |
---|
28 | |
---|
29 | .SH DESCRIPTION |
---|
30 | \fIfsid\fP is used to authenticate to remote filesystems that have |
---|
31 | been brought local with |
---|
32 | .BR attach (1)\fP. |
---|
33 | .PP |
---|
34 | If no option specifying otherwise is given, you may pass either |
---|
35 | filesystems or hostnames on the command line. |
---|
36 | .PP |
---|
37 | The following arguments to \fIfsid\fP modify its default behavior. |
---|
38 | All arguments are processed \fIin order\fP. Thus, if a -u option is |
---|
39 | followed by a -m option, the -m option will take precedence. |
---|
40 | |
---|
41 | .TP 8 |
---|
42 | .I --verbose (-v) |
---|
43 | Display verbose information about the mapping operation. This is the |
---|
44 | default. |
---|
45 | .TP 8 |
---|
46 | .I --quiet (-q) |
---|
47 | Don't display verbose information. |
---|
48 | .TP 8 |
---|
49 | .I --map (-m) |
---|
50 | Set the mapping function to "map user". This is the default, and |
---|
51 | is used to authenticate a user to a filesystem or server using |
---|
52 | Kerberos. |
---|
53 | .TP 8 |
---|
54 | .I --unmap (-u) |
---|
55 | Set the mapping function to "unmap user". This is used to remove an |
---|
56 | authentication mapping. |
---|
57 | .TP 8 |
---|
58 | .I --purge (-p) |
---|
59 | Set the mapping function to "purge host". This is used to remove all |
---|
60 | mappings associated with the user's host from the remote server. This |
---|
61 | option may only be used by trusted users. (This only has any effect |
---|
62 | for NFS servers.) |
---|
63 | .TP 8 |
---|
64 | .I --purgeuser (-r) |
---|
65 | Set the mapping function to "purge user". This is used to remove all |
---|
66 | mappings associated with the user on the host. It requires that the |
---|
67 | user have Kerberos tickets. (This only has any effect for NFS |
---|
68 | servers.) |
---|
69 | .TP 8 |
---|
70 | .I --filsys (-f) |
---|
71 | Perform the current mapping operation for the servers associated with |
---|
72 | the indicated filesystems. |
---|
73 | .TP 8 |
---|
74 | .I --cell \fIcell\fP (-c \fIcell\fP) |
---|
75 | Authenticate the user to the specified AFS cell. |
---|
76 | .TP 8 |
---|
77 | .I --host \fIhost\fP (-h \fIhost\fP) |
---|
78 | Authenticate the user to the specified NFS server host. |
---|
79 | .TP 8 |
---|
80 | .I --all (-a) |
---|
81 | Perform the current mapping operation for all filesystems attached by |
---|
82 | the user. (For "purge" and "purge user", the operation is performed |
---|
83 | for all filesystems in the attachtab.) If the environment variable |
---|
84 | \fIFSID_EXTRA_CELLS\fR is defined, \fIfsid\fR will treat it as a |
---|
85 | space-separated list of additional AFS cells to authenticate or |
---|
86 | unauthenticate to. |
---|
87 | |
---|
88 | .SH DIAGNOSTICS |
---|
89 | If \fIfsid\fP is unable to initalize the locker library, it will exist |
---|
90 | with status 1. If \fIfsid\fP encounters a problem performing a mapping |
---|
91 | operation, it will continue trying to work with each remaining |
---|
92 | argument on the command line, but eventually exit with status 2. (This |
---|
93 | does not apply to \fIfsid -a\fP, which will exit with status 0 if it |
---|
94 | successfully maps any locker or host.) |
---|
95 | |
---|
96 | .SH FILES |
---|
97 | /etc/athena/attach.conf |
---|
98 | .br |
---|
99 | /var/athena/attachtab |
---|
100 | |
---|
101 | .SH "SEE ALSO" |
---|
102 | attach(1) |
---|
103 | |
---|
104 | .SH AUTHOR |
---|
105 | Dan Winship, MIT Information Systems |
---|
106 | .PP |
---|
107 | based on the original fsid by |
---|
108 | .br |
---|
109 | Robert French, Project Athena |
---|
110 | .PP |
---|
111 | Copyright 1988, 1998, Massachusetts Institute of Technology |
---|