diff options
Diffstat (limited to 'usr/src/man/man1m')
| -rw-r--r-- | usr/src/man/man1m/etrn.1m | 35 | ||||
| -rw-r--r-- | usr/src/man/man1m/idmap.1m | 44 | ||||
| -rw-r--r-- | usr/src/man/man1m/ipseckey.1m | 40 | ||||
| -rw-r--r-- | usr/src/man/man1m/kadmin.1m | 97 | ||||
| -rw-r--r-- | usr/src/man/man1m/kclient.1m | 47 | ||||
| -rw-r--r-- | usr/src/man/man1m/kdb5_util.1m | 13 | ||||
| -rw-r--r-- | usr/src/man/man1m/ksslcfg.1m | 24 | ||||
| -rw-r--r-- | usr/src/man/man1m/ldapclient.1m | 45 | ||||
| -rw-r--r-- | usr/src/man/man1m/lpset.1m | 15 | ||||
| -rw-r--r-- | usr/src/man/man1m/mount_smbfs.1m | 31 | ||||
| -rw-r--r-- | usr/src/man/man1m/pppd.1m | 45 | ||||
| -rw-r--r-- | usr/src/man/man1m/share_nfs.1m | 8 | ||||
| -rw-r--r-- | usr/src/man/man1m/sharectl.1m | 20 | ||||
| -rw-r--r-- | usr/src/man/man1m/sharemgr.1m | 15 |
14 files changed, 140 insertions, 339 deletions
diff --git a/usr/src/man/man1m/etrn.1m b/usr/src/man/man1m/etrn.1m index ddb147e465..76665411eb 100644 --- a/usr/src/man/man1m/etrn.1m +++ b/usr/src/man/man1m/etrn.1m @@ -3,18 +3,15 @@ .\" The contents of this file are subject to the terms of the Common Development and Distribution License (the "License"). You may not use this file except in compliance with the License. .\" You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE or http://www.opensolaris.org/os/licensing. See the License for the specific language governing permissions and limitations under the License. .\" When distributing Covered Code, include this CDDL HEADER in each file and include the License file at usr/src/OPENSOLARIS.LICENSE. If applicable, add the following below this CDDL HEADER, with the fields enclosed by brackets "[]" replaced with your own identifying information: Portions Copyright [yyyy] [name of copyright owner] -.TH ETRN 1M "Aug 10, 2004" +.TH ETRN 1M "November 22, 2021" .SH NAME etrn \- start mail queue run .SH SYNOPSIS -.LP .nf \fBetrn\fR [\fB-b\fR] [\fB-v\fR] \fIserver-host\fR [\fIclient-hosts\fR] .fi .SH DESCRIPTION -.sp -.LP SMTP's \fBETRN\fR command allows an SMTP client and server to interact, giving the server an opportunity to start the processing of its queues for messages to go to a given host. This is meant to be used in start-up conditions, as well as @@ -29,8 +26,6 @@ command with that name as the argument. If any \fIclient-hosts\fR are specified, \fBetrn\fR uses each of these as arguments for successive \fBETRN\fR commands. .SH OPTIONS -.sp -.LP The following options are supported: .sp .ne 2 @@ -59,8 +54,6 @@ conversations with the remote SMTP server. .RE .SH ENVIRONMENT VARIABLES -.sp -.LP No environment variables are used. However, at system start-up, \fBsvc:/network/smtp:sendmail\fR reads \fB/etc/default/sendmail\fR. In this file, if the variable \fBETRN_HOSTS\fR is set, \fBsvc:/network/smtp:sendmail\fR @@ -92,7 +85,6 @@ for each \fIclient\fR name. This is comparable to running: .LP on the host \fIserver\fR. .SH EXAMPLES -.LP \fBExample 1 \fRUsing \fBetrn\fR .sp .LP @@ -101,7 +93,7 @@ Inserting the line: .sp .in +2 .nf -ETRN_HOSTS="s1.domain.com:clnt.domain.com s2.domain.com:clnt.domain.com" +ETRN_HOSTS="s1.example.com:clnt.example.com s2.example.com:clnt.example.com" .fi .in -2 .sp @@ -110,8 +102,8 @@ ETRN_HOSTS="s1.domain.com:clnt.domain.com s2.domain.com:clnt.domain.com" .LP in \fB/etc/default/sendmail\fR results in \fBsvc:/network/smtp:sendmail\fR invoking \fBetrn\fR such that \fBETRN\fR commands are sent to both -\fBs1.domain.com\fR and \fBs2.domain.com\fR, with both having -\fBclnt.domain.com\fR as the \fBETRN\fR argument. +\fBs1.example.com\fR and \fBs2.example.com\fR, with both having +\fBclnt.example.com\fR as the \fBETRN\fR argument. .sp .LP @@ -120,16 +112,16 @@ The line: .sp .in +2 .nf -ETRN_HOSTS="server.domain.com:client1.domain.com,client2.domain.com" +ETRN_HOSTS="server.example.com:client1.example.com,client2.example.com" .fi .in -2 .sp .sp .LP -results in two \fBETRN\fR commands being sent to \fBserver.domain.com\fR, one -with the argument \fBclient1.domain.com\fR, the other with the argument -\fBclient2.domain.com\fR. +results in two \fBETRN\fR commands being sent to \fBserver.example.com\fR, one +with the argument \fBclient1.example.com\fR, the other with the argument +\fBclient2.example.com\fR. .sp .LP @@ -138,7 +130,7 @@ The line: .sp .in +2 .nf -ETRN_HOSTS="server1.domain.com server2.domain.com" +ETRN_HOSTS="server1.example.com server2.example.com" .fi .in -2 .sp @@ -146,12 +138,11 @@ ETRN_HOSTS="server1.domain.com server2.domain.com" .sp .LP results in set of a \fBETRN\fR commands being sent to both -\fBserver1.domain.com\fR and \fBserver2.domain.com\fR; each set contains one +\fBserver1.example.com\fR and \fBserver2.example.com\fR; each set contains one \fBETRN\fR command for each host name for which \fBsendmail\fR(1M) accepts email, with that host name as the argument. .SH FILES -.sp .ne 2 .na \fB\fB/etc/mail/sendmail.cf\fR\fR @@ -170,8 +161,6 @@ Variables used by \fBsvc:/network/smtp:sendmail\fR .RE .SH ATTRIBUTES -.sp -.LP See \fBattributes\fR(5) for descriptions of the following attributes: .sp @@ -186,13 +175,9 @@ Interface Stability Stable .TE .SH SEE ALSO -.sp -.LP \fBsendmail\fR(1M), \fBattributes\fR(5) .sp .LP RFC 1985 .SH NOTES -.sp -.LP Not all SMTP servers support \fBETRN\fR. diff --git a/usr/src/man/man1m/idmap.1m b/usr/src/man/man1m/idmap.1m index 7854c02708..585760e0fd 100644 --- a/usr/src/man/man1m/idmap.1m +++ b/usr/src/man/man1m/idmap.1m @@ -3,11 +3,10 @@ .\" The contents of this file are subject to the terms of the Common Development and Distribution License (the "License"). You may not use this file except in compliance with the License. You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE or http://www.opensolaris.org/os/licensing. .\" See the License for the specific language governing permissions and limitations under the License. When distributing Covered Code, include this CDDL HEADER in each file and include the License file at usr/src/OPENSOLARIS.LICENSE. If applicable, add the following below this CDDL HEADER, with the .\" fields enclosed by brackets "[]" replaced with your own identifying information: Portions Copyright [yyyy] [name of copyright owner] -.TH IDMAP 1M "Aug 3, 2009" +.TH IDMAP 1M "November 22, 2021" .SH NAME idmap \- configure and manage the Native Identity Mapping service .SH SYNOPSIS -.LP .nf \fBidmap\fR .fi @@ -85,8 +84,6 @@ idmap \- configure and manage the Native Identity Mapping service .fi .SH DESCRIPTION -.sp -.LP The \fBidmap\fR utility is used to configure and manage the Native Identity Mapping service. .sp @@ -125,8 +122,6 @@ If the \fBidmap\fR utility is invoked without a subcommand or option, it reads the subcommands from standard input. When standard input is a TTY, the \fBidmap\fR command prints the usage message and exits. .SS "Mapping Mechanisms" -.sp -.LP The \fBidmapd\fR(1M) daemon maps Windows user and group SIDs to UNIX UIDs and GIDs as follows: .RS +4 @@ -160,8 +155,6 @@ Windows groups and Solaris users and between Solaris groups and Windows users. They are needed when Windows uses a group identity as a file owner or vice versa. .SS "Name-based Mappings" -.sp -.LP Name-based mappings establish name equivalence between Windows users and groups and their counterparts in the UNIX name service. These mappings persist across reboots. For example, the following command maps Windows users to UNIX users @@ -169,7 +162,7 @@ with the same name: .sp .in +2 .nf -# \fBidmap add "winuser:*@mywindomain.com" "unixuser:*"\fR +# \fBidmap add "winuser:*@example.com" "unixuser:*"\fR .fi .in -2 .sp @@ -250,8 +243,6 @@ add winname:fred@example.com unixuser:fredf .sp .SS "Ephemeral Mappings" -.sp -.LP The \fBidmapd\fR daemon attempts to preserve ephemeral ID mappings across daemon restarts. However, when IDs cannot be preserved, the daemon maps each previously mapped SID to a new ephemeral UID or GID value. The daemon will @@ -264,8 +255,6 @@ The dynamic ID mappings are not retained across reboots. So, any SIDs that are dynamically mapped to UNIX UIDs or GIDs are most likely mapped to different IDs after rebooting the system. .SS "Local SID Mappings" -.sp -.LP If no name-based mapping is found, a non-ephemeral UID or GID is mapped to an algorithmically generated local SID. The mapping is generated as follows: .sp @@ -282,8 +271,6 @@ local SID for GID = \fI<machine SID>\fR - \fI<2^31 + GID>\fR \fI<machine SID>\fR is a unique SID generated by the \fBidmap\fR service for the host on which it runs. .SS "Rule Lookup Order" -.sp -.LP When mapping a Windows name to a UNIX name, lookup for name-based mapping rules is performed in the following order: .RS +4 @@ -366,8 +353,6 @@ is performed in the following order: \fB*\fR to \fIwindows-name\fR\fB@\fR\fIdomain\fR .RE .SS "Service Properties" -.sp -.LP The service properties determine the behavior of the \fBidmapd\fR(1M) daemon. These properties are stored in the SMF repository (see \fBsmf\fR(5)) under property group \fBconfig\fR. They can be accessed and modified using @@ -432,8 +417,6 @@ Changes to service properties do not affect a running \fBidmap\fR service. The service must be refreshed (with \fBsvcadm\fR(1M)) for the changes to take effect. .SH OPERANDS -.sp -.LP The \fBidmap\fR command uses the following operands: .sp .ne 2 @@ -697,12 +680,9 @@ attribute within the object specified by the \fIname\fR operand. .RE .SH OPTIONS -.sp -.LP The \fBidmap\fR command supports one option and a set of subcommands. The subcommands also have options. .SS "Command-Line Option" -.sp .ne 2 .na \fB\fB-f\fR \fIcommand-file\fR\fR @@ -715,8 +695,6 @@ not used by any subcommands. .RE .SS "Subcommands" -.sp -.LP The following subcommands are supported: .sp .ne 2 @@ -947,11 +925,10 @@ See the \fBset-namemap\fR subcommand for options. .RE .SH EXAMPLES -.LP \fBExample 1 \fRUsing a Wildcard on Both Sides of a Name-Based Mapping Rule .sp .LP -The following command maps all Windows user names in the \fBxyz.com\fR domain +The following command maps all Windows user names in the \fBexample.com\fR domain to the UNIX users with the same names provided that one exists and is not otherwise mapped. If such a rule is matched but the UNIX user name does not exist, an ephemeral ID mapping is used. @@ -959,7 +936,7 @@ exist, an ephemeral ID mapping is used. .sp .in +2 .nf -# \fBidmap add "winuser:*@xyz.com" "unixuser:*"\fR +# \fBidmap add "winuser:*@example.com" "unixuser:*"\fR .fi .in -2 .sp @@ -968,14 +945,14 @@ exist, an ephemeral ID mapping is used. \fBExample 2 \fRUsing a Wildcard on One Side of a Name-Based Mapping Rule .sp .LP -The following command maps all unmapped Windows users in the \fBxyz.com\fR +The following command maps all unmapped Windows users in the \fBexample.com\fR domain to the \fBguest\fR UNIX user. The \fB-d\fR option specifies a -unidirectional mapping from \fB*@xyz.com\fR users to the \fBguest\fR user. +unidirectional mapping from \fB*@example.com\fR users to the \fBguest\fR user. .sp .in +2 .nf -# \fBidmap add -d "winuser:*@xyz.com" unixuser:guest\fR +# \fBidmap add -d "winuser:*@example.com" unixuser:guest\fR .fi .in -2 .sp @@ -1249,7 +1226,6 @@ object representing \fBjoe@example.com\fR. .sp .SH EXIT STATUS -.sp .ne 2 .na \fB\fB0\fR\fR @@ -1268,8 +1244,6 @@ An error occurred. A diagnostic message is written to standard error. .RE .SH ATTRIBUTES -.sp -.LP See \fBattributes\fR(5) for descriptions of the following attributes: .sp @@ -1284,13 +1258,9 @@ Interface Stability Uncommitted .TE .SH SEE ALSO -.sp -.LP \fBsvcs\fR(1), \fBidmapd\fR(1M), \fBldapaddent\fR(1M), \fBsvcadm\fR(1M), \fBsvccfg\fR(1M), \fBattributes\fR(5), \fBsmf\fR(5) .SH NOTES -.sp -.LP The \fBidmapd\fR service is managed by the service management facility, \fBsmf\fR(5). The service identifier for the \fBidmapd\fR service is \fBsvc:/system/idmap\fR. diff --git a/usr/src/man/man1m/ipseckey.1m b/usr/src/man/man1m/ipseckey.1m index a76e99d9ab..180635151b 100644 --- a/usr/src/man/man1m/ipseckey.1m +++ b/usr/src/man/man1m/ipseckey.1m @@ -3,11 +3,10 @@ .\" The contents of this file are subject to the terms of the Common Development and Distribution License (the "License"). You may not use this file except in compliance with the License. .\" You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE or http://www.opensolaris.org/os/licensing. See the License for the specific language governing permissions and limitations under the License. .\" When distributing Covered Code, include this CDDL HEADER in each file and include the License file at usr/src/OPENSOLARIS.LICENSE. If applicable, add the following below this CDDL HEADER, with the fields enclosed by brackets "[]" replaced with your own identifying information: Portions Copyright [yyyy] [name of copyright owner] -.TH IPSECKEY 1M "Sep 25, 2008" +.TH IPSECKEY 1M "November 22, 2021" .SH NAME ipseckey \- manually manipulate an IPsec Security Association Database (SADB) .SH SYNOPSIS -.LP .nf \fBipseckey\fR [\fB-nvp\fR] .fi @@ -53,8 +52,6 @@ ipseckey \- manually manipulate an IPsec Security Association Database (SADB) .fi .SH DESCRIPTION -.sp -.LP The \fBipseckey\fR command is used to manually manipulate the security association databases of the network security services, \fBipsecah\fR(7P) and \fBipsecesp\fR(7P). You can use the \fBipseckey\fR command to set up security @@ -81,7 +78,6 @@ types. \fBipseckey\fR handles sensitive cryptographic keying information. Please read the \fBSecurity\fR section for details on how to use this command securely. .SH OPTIONS -.sp .ne 2 .na \fB\fB-c\fR [\fIfilename\fR]\fR @@ -158,7 +154,6 @@ raw seconds values for lifetimes. .RE .SH COMMANDS -.sp .ne 2 .na \fB\fBadd\fR\fR @@ -313,7 +308,6 @@ Prints a brief summary of commands. .RE .SS "\fBSA_TYPE\fR" -.sp .ne 2 .na \fB\fBall\fR\fR @@ -346,8 +340,6 @@ Specifies the IPsec Encapsulating Security Payload ("\fBESP\fR") \fBSA\fR. .RE .SH EXTENSION VALUE TYPES -.sp -.LP Commands like \fBadd\fR, \fBdelete\fR, \fBget\fR, and \fBupdate\fR require that certain extensions and associated values be specified. The extensions will be listed here, followed by the commands that use them, and the commands that @@ -1015,14 +1007,10 @@ is used by the \fBadd\fR and \fBupdate\fR commands .RE .SS "Tunnel Mode versus Transport Mode SAs" -.sp -.LP An IPsec SA is a Tunnel Mode SA if the "proto" value is either 4 (\fBipip\fR) or 41 (\fBipv6\fR) \fBand\fR there is an inner-address or inner-port value specified. Otherwise, the SA is a Transport Mode SA. .SH SECURITY -.sp -.LP Keying material is very sensitive and should be generated as randomly as possible. Some algorithms have known weak keys. IPsec algorithms have built-in weak key checks, so that if a weak key is in a newly added \fBSA\fR, the @@ -1103,8 +1091,6 @@ For further thoughts on this subject, see the afterward by Matt Blaze in Bruce Schneier's \fIApplied Cryptography: Protocols, Algorithms, and Source Code in C\fR. .SS "Service Management Facility" -.sp -.LP IPsec manual keys are managed by the service management facility, \fBsmf\fR(5). The services listed below manage the components of IPsec. These services are delivered as follows: @@ -1244,7 +1230,6 @@ discouraged. If the \fBipseckey\fR command is to be run from the command line, the \fBmanual-key\fR \fBsmf\fR(5) service should be disabled first. See \fBsvcadm\fR(1M). .SH EXAMPLES -.LP \fBExample 1 \fREmptying Out All \fBSA\fRs .sp .LP @@ -1352,9 +1337,9 @@ Adding or updating \fBSA\fRs requires entering interactive mode: .in +2 .nf example# \fBipseckey\fR -ipseckey> \fBadd ah spi 0x90125 src me.domain.com dst you.domain.com \e +ipseckey> \fBadd ah spi 0x90125 src me.example.com dst you.example.com \e authalg md5 authkey 1234567890abcdef1234567890abcdef\fR -ipseckey> \fBupdate ah spi 0x90125 dst you.domain.com hard_bytes \e +ipseckey> \fBupdate ah spi 0x90125 dst you.example.com hard_bytes \e 16000000\fR ipseckey> \fBexit\fR .fi @@ -1369,10 +1354,10 @@ Adding two SAs that are linked together as a pair: .in +2 .nf example# \fBipseckey\fR -ipseckey> \fBadd esp spi 0x2345 src me.domain.com dst you.domain.com \e +ipseckey> \fBadd esp spi 0x2345 src me.example.com dst you.example.com \e authalg md5 authkey bde359723576fdea08e56cbe876e24ad \e encralg des encrkey be02938e7def2839\fR -ipseckey> \fBadd esp spi 0x5432 src me.domain.com dst you.domain.com \e +ipseckey> \fBadd esp spi 0x5432 src me.example.com dst you.example.com \e authalg md5 authkey bde359723576fdea08e56cbe876e24ad \e encralg des encrkey be02938e7def2839 pair-spi 0x2345\fR ipseckey> \fBexit\fR @@ -1392,7 +1377,7 @@ also needs to add both \fBSA\fRs. .in +2 .nf example# \fBipseckey\fR -ipseckey> \fBadd ah spi 0x2112 src you.domain.com dst me.domain.com \e +ipseckey> \fBadd ah spi 0x2112 src you.example.com dst me.example.com \e authalg md5 authkey bde359723576fdea08e56cbe876e24ad \e hard_bytes 16000000\fR ipseckey> \fBexit\fR @@ -1434,10 +1419,10 @@ flush esp ### SECURITY section in this manual page for why this can be ### dangerous . -add esp spi 0x2112 src me.domain.com dst you.domain.com \e +add esp spi 0x2112 src me.example.com dst you.example.com \e authalg md5 authkey bde359723576fdea08e56cbe876e24ad \e encralg des encrkey be02938e7def2839 hard_usetime 28800 -add esp spi 0x5150 src you.domain.com dst me.domain.com \e +add esp spi 0x5150 src you.example.com dst me.example.com \e authalg md5 authkey 930987dbe09743ade09d92b4097d9e93 \e encralg des encrkey 8bd4a52e10127deb hard_usetime 28800 @@ -1480,7 +1465,6 @@ pair-spi 0x654321\fR .sp .SH FILES -.sp .ne 2 .na \fB\fB/etc/inet/secret/ipseckeys\fR\fR @@ -1492,8 +1476,6 @@ and \fBSECURITY\fR for more information. .RE .SH ATTRIBUTES -.sp -.LP See \fBattributes\fR(5) for descriptions of the following attributes: .sp @@ -1507,8 +1489,6 @@ Interface Stability Committed .TE .SH SEE ALSO -.sp -.LP \fBps\fR(1), \fBsvcprop\fR(1), \fBsvcs\fR(1), \fBipsecconf\fR(1M), \fBipsecalgs\fR(1M), \fBroute\fR(1M), \fBsvcadm\fR(1M), \fBsvccfg\fR(1M), \fBike.config\fR(4), \fBattributes\fR(5), \fBsmf\fR(5), \fBipsec\fR(7P), @@ -1518,8 +1498,6 @@ Interface Stability Committed Schneier, B., \fIApplied Cryptography: Protocols, Algorithms, and Source Code in C\fR. Second ed. New York, New York: John Wiley & Sons, 1996. .SH DIAGNOSTICS -.sp -.LP The \fBipseckey\fR command parses the configuration file and reports any errors. In the case of multiple errors, \fBipseckey\fR reports as many of these as possible. @@ -1629,8 +1607,6 @@ provides more detail about what precise value was incorrect and why. .RE .SH NOTES -.sp -.LP In spite of its IPsec-specific name, \fBipseckey\fR is analogous to \fBroute\fR(1M), in that it is a command-line interface to a socket-based administration engine, in this case, \fBPF_KEY\fR. \fBPF_KEY\fR was originally diff --git a/usr/src/man/man1m/kadmin.1m b/usr/src/man/man1m/kadmin.1m index d906fc4f0a..0a9106ee2d 100644 --- a/usr/src/man/man1m/kadmin.1m +++ b/usr/src/man/man1m/kadmin.1m @@ -3,11 +3,10 @@ .\" The contents of this file are subject to the terms of the Common Development and Distribution License (the "License"). You may not use this file except in compliance with the License. .\" You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE or http://www.opensolaris.org/os/licensing. See the License for the specific language governing permissions and limitations under the License. .\" When distributing Covered Code, include this CDDL HEADER in each file and include the License file at usr/src/OPENSOLARIS.LICENSE. If applicable, add the following below this CDDL HEADER, with the fields enclosed by brackets "[]" replaced with your own identifying information: Portions Copyright [yyyy] [name of copyright owner] -.TH KADMIN 1M "Oct 29, 2015" +.TH KADMIN 1M "November 22, 2021" .SH NAME kadmin, kadmin.local \- Kerberos database administration program .SH SYNOPSIS -.LP .nf \fB/usr/sbin/kadmin\fR [\fB-r\fR \fIrealm\fR] [\fB-p\fR \fIprincipal\fR] [\fB-q\fR \fIquery\fR] [\fB-s\fR \fIadmin_server\fR [\fI:port\fR]] [ [\fB-c\fR \fIcredential_cache\fR] @@ -21,8 +20,6 @@ kadmin, kadmin.local \- Kerberos database administration program .fi .SH DESCRIPTION -.sp -.LP \fBkadmin\fR and \fBkadmin.local\fR are interactive command-line interfaces to the Kerberos V5 administration system. They provide for the maintenance of Kerberos principals, policies, and service key tables (keytabs). \fBkadmin\fR @@ -62,8 +59,6 @@ file (see \fBkdb5_util\fR(1M)) to decrypt information from the database rather than prompting for a password. The \fB-m\fR option will bypass the \fB\&.k5.\fR\fIrealm\fR stash file and prompt for the master password. .SH OPTIONS -.sp -.LP The following options are supported: .sp .ne 2 @@ -254,7 +249,6 @@ Directory server connection port. .RE .SH COMMANDS -.sp .ne 2 .na \fB\fBlist_requests\fR\fR @@ -573,11 +567,11 @@ des-cbc-crc:normal. .in +2 .nf kadmin: \fBaddprinc tlyu/admin\fR -WARNING: no policy specified for "tlyu/admin@ACME.COM"; +WARNING: no policy specified for "tlyu/admin@EXAMPLE.COM"; defaulting to no policy. -Enter password for principal tlyu/admin@ACME.COM: -Re-enter password for principal tlyu/admin@ACME.COM: -Principal "tlyu/admin@ACME.COM" created. +Enter password for principal tlyu/admin@EXAMPLE.COM: +Re-enter password for principal tlyu/admin@EXAMPLE.COM: +Principal "tlyu/admin@EXAMPLE.COM" created. kadmin: .fi .in -2 @@ -627,8 +621,8 @@ deletion, unless the \fB-force\fR option is given. This command requires the .nf kadmin: \fBdelprinc mwm_user\fR Are you sure you want to delete the principal -"mwm_user@ACME.COM"? (yes/no): \fByes\fR -Principal "mwm_user@ACME.COM" deleted. +"mwm_user@EXAMPLE.COM"? (yes/no): \fByes\fR +Principal "mwm_user@EXAMPLE.COM" deleted. Make sure that you have removed this principal from all kadmind ACLs before reusing. kadmin: @@ -749,9 +743,9 @@ will allow existing valid TGTs to continue to work. .in +2 .nf kadmin: \fBcpw systest\fR -Enter password for principal systest@ACME.COM: -Re-enter password for principal systest@ACME.COM: -Password for systest@ACME.COM changed. +Enter password for principal systest@EXAMPLE.COM: +Re-enter password for principal systest@EXAMPLE.COM: +Password for systest@EXAMPLE.COM changed. kadmin: .fi .in -2 @@ -801,13 +795,13 @@ tab-separated strings. Aliased by \fBgetprinc\fR. .in +2 .nf kadmin: \fBgetprinc tlyu/admin\fR -Principal: tlyu/admin@ACME.COM +Principal: tlyu/admin@EXAMPLE.COM Expiration date: [never] Last password change: Thu Jan 03 12:17:46 CET 2008 Password expiration date: [none] Maximum ticket life: 24855 days 03:14:07 Maximum renewable life: 24855 days 03:14:07 -Last modified: Thu Jan 03 12:17:46 CET 2008 (root/admin@ACME.COM) +Last modified: Thu Jan 03 12:17:46 CET 2008 (root/admin@EXAMPLE.COM) Last successful authentication: [never] Last failed authentication: [never] Failed password attempts: 0 @@ -820,8 +814,8 @@ Key: vno 2, DES cbc mode with RSA-MD5, no salt Attributes: REQUIRES_PRE_AUTH Policy: [none] kadmin: \fBgetprinc -terse tlyu/admin\fR -"tlyu/admin@ACME.COM" 0 1199359066 0 2147483647 -"root/admin@ACME.COM" 1199359066 128 2 0 "[none]" 21474836 +"tlyu/admin@EXAMPLE.COM" 0 1199359066 0 2147483647 +"root/admin@EXAMPLE.COM" 1199359066 128 2 0 "[none]" 21474836 47 0 0 0 5 1 2 18 0 1 2 17 0 1 2 16 0 1 2 23 0 12 3 0 @@ -871,10 +865,10 @@ the expression. Requires the \fBlist\fR privilege. Aliased by \fBlistprincs\fR, .in +2 .nf kadmin: \fBlistprincs test*\fR -test3@ACME.COM -test2@ACME.COM -test1@ACME.COM -testuser@ACME.COM +test3@EXAMPLE.COM +test2@EXAMPLE.COM +test1@EXAMPLE.COM +testuser@EXAMPLE.COM kadmin: .fi .in -2 @@ -1266,8 +1260,6 @@ Quits \fBkadmin\fR. Aliased by \fBexit\fR and \fBq\fR. .RE .SS "Time Formats" -.sp -.LP Various commands in \fBkadmin\fR can take a variety of time formats, specifying time durations or absolute times. The \fBkadmin\fR option variables \fImaxrenewlife\fR, \fImaxlife\fR, and \fIminlife\fR are time durations, @@ -1350,7 +1342,7 @@ l l . .TS l l l l . -\fBVariable Description\fR +\fBVariable\fR \fBDescription\fR \fBdd\fR day \fImm\fR month \fIyy\fR T{ @@ -1370,29 +1362,29 @@ l l . \fBTime Units\fR \fBExamples\fR [+|- \fI#\fR] year "-2 year" [+|- \fI#\fR] month "2 months" -[+|- \fI#\fR] fortnight -[+|- \fI#\fR] week -[+|- \fI#\fR] day -[+|- \fI#\fR] hour -[+|- \fI#\fR] minute -[+|- \fI#\fR] min -[+|- \fI#\fR] second -[+|- \fI#\fR] sec -tomorrow -yesterday -today -now +[+|- \fI#\fR] fortnight +[+|- \fI#\fR] week +[+|- \fI#\fR] day +[+|- \fI#\fR] hour +[+|- \fI#\fR] minute +[+|- \fI#\fR] min +[+|- \fI#\fR] second +[+|- \fI#\fR] sec +tomorrow +yesterday +today +now this "this year" last "last saturday" next "next month" -sunday -monday -tuesday -wednesday -thursday -friday -saturday -never +sunday +monday +tuesday +wednesday +thursday +friday +saturday +never .TE .sp @@ -1402,8 +1394,6 @@ You can also use the following time modifiers: \fBfirst\fR, \fBsecond\fR, \fBeighth\fR, \fBninth\fR, \fBtenth\fR, \fBeleventh\fR, \fBtwelfth\fR, and \fBago\fR. .SH ENVIRONMENT VARIABLES -.sp -.LP See \fBenviron\fR(5) for descriptions of the following environment variables that affect the execution of \fBkadmin\fR: .sp @@ -1418,7 +1408,6 @@ specify options. The default is \fBmore\fR(1). .RE .SH FILES -.sp .ne 2 .na \fB\fB/var/krb5/principal\fR\fR @@ -1492,8 +1481,6 @@ Keytab for \fBkadmind\fR principals: \fBkadmin\fR/\fIfqdn\fR, .RE .SH ATTRIBUTES -.sp -.LP See \fBattributes\fR(5) for descriptions of the following attributes: .sp @@ -1508,20 +1495,14 @@ Interface Stability Committed .TE .SH SEE ALSO -.sp -.LP \fBkpasswd\fR(1), \fBmore\fR(1), \fBkadmind\fR(1M), \fBkdb5_util\fR(1M), \fBkdb5_ldap_util\fR(1M), \fBkproplog\fR(1M), \fBkadm5.acl\fR(4), \fBkdc.conf\fR(4), \fBkrb5.conf\fR(4), \fBattributes\fR(5), \fBenviron\fR(5), \fBkerberos\fR(5), \fBkrb5envvar\fR(5) .SH HISTORY -.sp -.LP The \fBkadmin\fR program was originally written by Tom Yu at MIT, as an interface to the OpenVision Kerberos administration program. .SH DIAGNOSTICS -.sp -.LP The \fBkadmin\fR command is currently incompatible with the MIT \fBkadmind\fR daemon interface, so you cannot use this command to administer an MIT-based Kerberos database. However, clients running the Solaris implementation of diff --git a/usr/src/man/man1m/kclient.1m b/usr/src/man/man1m/kclient.1m index 276c0055cf..caca84423a 100644 --- a/usr/src/man/man1m/kclient.1m +++ b/usr/src/man/man1m/kclient.1m @@ -3,11 +3,10 @@ .\" The contents of this file are subject to the terms of the Common Development and Distribution License (the "License"). You may not use this file except in compliance with the License. .\" You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE or http://www.opensolaris.org/os/licensing. See the License for the specific language governing permissions and limitations under the License. .\" When distributing Covered Code, include this CDDL HEADER in each file and include the License file at usr/src/OPENSOLARIS.LICENSE. If applicable, add the following below this CDDL HEADER, with the fields enclosed by brackets "[]" replaced with your own identifying information: Portions Copyright [yyyy] [name of copyright owner] -.TH KCLIENT 1M "May 27, 2009" +.TH KCLIENT 1M "November 22, 2021" .SH NAME kclient \- set up a machine as a Kerberos client .SH SYNOPSIS -.LP .nf \fB/usr/sbin/kclient\fR [\fB-n\fR] [\fB-R\fR \fIrealm\fR] [\fB-k\fR \fIkdc\fR] [\fB-a\fR \fIadminuser\fR] [\fB-c\fR \fIfilepath\fR] [\fB-d\fR \fIdnsarg\fR] [\fB-f\fR \fIfqdn_list\fR] [\fB-h\fR \fIlogical_host_name\fR] @@ -16,8 +15,6 @@ kclient \- set up a machine as a Kerberos client .fi .SH DESCRIPTION -.sp -.LP By specifying the various command options, you can use the \fBkclient\fR utility to: .RS +4 @@ -137,8 +134,6 @@ the KDC. It is advised that both systems run some form of time synchronization protocol, such as the Network Time Protocol (NTP). See the \fBntpd\fR man page, delivered in the \fBSUNWntpu\fR package (not a SunOS man page). .SH OPTIONS -.sp -.LP The non-interactive mode supports the following options: .sp .ne 2 @@ -417,18 +412,17 @@ example of a possible \fIpam_service\fR value is: \fBdtlogin,sshd-kbdint\fR. .RE .SH EXAMPLES -.LP \fBExample 1 \fRSetting Up a Kerberos Client Using Command-Line Options .sp .LP To setup a Kerberos client using the \fBclntconfig/admin\fR administrative -principal for realm \fB\&'ABC.COM', kdc `example1.com'\fR and that also does -kerberized NFS, enter: +principal for realm \fB\&'EXAMPLE.COM', kdc `example1.example.com'\fR and +that also does kerberized NFS, enter: .sp .in +2 .nf -# /usr/sbin/kclient -n -R ABC.COM -k example1.com -a clntconfig +# /usr/sbin/kclient -n -R EXAMPLE.COM -k example1.example.com -a clntconfig .fi .in -2 .sp @@ -436,15 +430,15 @@ kerberized NFS, enter: .sp .LP Alternatively, to set up a Kerberos client using the \fBclntconfig/admin\fR -administrative principal for the realm \fB`EAST.ABC.COM', kdc -`example2.east.abc.com'\fR and that also needs service principal(s) created +administrative principal for the realm \fB`EAST.EXAMPLE.COM', kdc +`example2.east.example.com'\fR and that also needs service principal(s) created and/or added to the local \fBkeytab\fR for multiple DNS domains, enter: .sp .in +2 .nf -# /usr/sbin/kclient -n -R EAST.ABC.COM -k example2.east.abc.com \e --f west.abc.com,central.abc.com -a clntconfig +# /usr/sbin/kclient -n -R EAST.EXAMPLE.COM -k example2.east.example.com \e +-f west.example.com,central.example.com -a clntconfig .fi .in -2 @@ -458,7 +452,7 @@ privileges (for the principals in the KDC database) in order for the .sp .in +2 .nf -clntconfig/admin@ABC.COM acmi +clntconfig/admin@EXAMPLE.COM acmi .fi .in -2 .sp @@ -468,13 +462,13 @@ clntconfig/admin@ABC.COM acmi .sp .LP To setup a Kerberos client using the \fBclntconfig/admin\fR administrative -principal for realm \fB`ABC.COM', kdc `example1.com'\fR and that also copies -over the master \fBkrb5.conf\fR from a specified location, enter: +principal for realm \fB`EXAMPLE.COM', kdc `example1.example.com'\fR and that +also copies over the master \fBkrb5.conf\fR from a specified location, enter: .sp .in +2 .nf -# /usr/sbin/kclient -p /net/example1.com/export/profile.krb5 +# /usr/sbin/kclient -p /net/example1.example.com/export/profile.krb5 .fi .in -2 .sp @@ -486,10 +480,10 @@ The contents of \fBprofile.krb5\fR: .sp .in +2 .nf -REALM ABC.COM -KDC example1 +REALM EXAMPLE.COM +KDC example1.example.com ADMIN clntconfig -FILEPATH /net/example1.com/export/krb5.conf +FILEPATH /net/example1.example.com/export/krb5.conf NFS 0 DNSLOOKUP none .fi @@ -507,8 +501,8 @@ therefore does not require a \fBkeytab\fR (\fB/etc/krb5/krb5.keytab\fR) file. .sp .LP For this type of client the administrator would issue the following command to -configure this machine to be a Kerberos client of the \fBABC.COM\fR realm with -the KDC server \fBkdc1.example.com\fR: +configure this machine to be a Kerberos client of the \fBEXAMPLE.COM\fR realm +with the KDC server \fBkdc1.example.com\fR: .sp .in +2 @@ -519,7 +513,6 @@ the KDC server \fBkdc1.example.com\fR: .sp .SH FILES -.sp .ne 2 .na \fB\fB/etc/krb5/kadm5.acl\fR\fR @@ -570,8 +563,6 @@ DNS resolver configuration file. .RE .SH ATTRIBUTES -.sp -.LP See \fBattributes\fR(5) for descriptions of the following attributes: .sp @@ -586,15 +577,11 @@ Interface Stability Committed .TE .SH SEE ALSO -.sp -.LP \fBencrypt\fR(1), \fBksh93\fR(1), \fBldapdelete\fR(1), \fBldapmodify\fR(1), \fBldapsearch\fR(1), \fBdd\fR(1M), \fBsmbadm\fR(1M), \fBkadm5.acl\fR(4), \fBkrb5.conf\fR(4), \fBnfssec.conf\fR(4), \fBpam.conf\fR(4), \fBresolv.conf\fR(4), \fBattributes\fR(5), \fBpam_krb5\fR(5) .SH NOTES -.sp -.LP \fBfqdn\fR stands for the Fully Qualified Domain Name of the local host. The \fBkclient\fR utility saves copies of both the \fBkrb5.conf\fR(4) and \fBnfssec.conf\fR(4) files to files with corresponding names and \fB\&.sav\fR diff --git a/usr/src/man/man1m/kdb5_util.1m b/usr/src/man/man1m/kdb5_util.1m index 6e7a54ffb5..0ec8d80a48 100644 --- a/usr/src/man/man1m/kdb5_util.1m +++ b/usr/src/man/man1m/kdb5_util.1m @@ -3,11 +3,10 @@ .\" The contents of this file are subject to the terms of the Common Development and Distribution License (the "License"). You may not use this file except in compliance with the License. .\" You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE or http://www.opensolaris.org/os/licensing. See the License for the specific language governing permissions and limitations under the License. .\" When distributing Covered Code, include this CDDL HEADER in each file and include the License file at usr/src/OPENSOLARIS.LICENSE. If applicable, add the following below this CDDL HEADER, with the fields enclosed by brackets "[]" replaced with your own identifying information: Portions Copyright [yyyy] [name of copyright owner] -.TH KDB5_UTIL 1M "April 9, 2016" +.TH KDB5_UTIL 1M "November 22, 2021" .SH NAME kdb5_util \- Kerberos Database maintenance utility .SH SYNOPSIS -.LP .nf \fB/usr/sbin/kdb5_util\fR [\fB-d\fR \fIdbname\fR] [\fB-f\fR \fIstashfile_name\fR] [\fB-k\fR \fImkeytype\fR] [\fB-m\fR ] [\fB-M\fR \fImkeyname\fR] [\fB-P\fR \fIpassword\fR] [\fB-r\fR \fIrealm\fR] @@ -15,12 +14,10 @@ kdb5_util \- Kerberos Database maintenance utility .fi .SH DESCRIPTION -.LP The \fBkdb5_util\fR utility enables you to create, dump, load, and destroy the Kerberos V5 database. You can also use \fBkdb5_util\fR to create a stash file containing the Kerberos database master key. .SH OPTIONS -.LP The following options are supported: .sp .ne 2 @@ -160,7 +157,6 @@ Directory server connection port. .RE .SH OPERANDS -.LP The following operands are supported: .sp .ne 2 @@ -446,18 +442,17 @@ Optional argument that is derived from \fIdbname\fR if not specified. .RE .SH EXAMPLES -.LP \fBExample 1 \fRCreating File that Contains Information about Two Principals .sp .LP The following example creates a file named \fBslavedata\fR that contains the -information about two principals, \fBjdb@ACME.COM\fR and \fBpak@ACME.COM\fR. +information about two principals, \fBjdb@EXAMPLE.COM\fR and \fBpak@EXAMPLE.COM\fR. .sp .in +2 .nf # /usr/krb5/bin/kdb5_util dump -verbose slavedata -jdb@ACME.COM pak@ACME.COM +jdb@EXAMPLE.COM pak@EXAMPLE.COM .fi .in -2 .sp @@ -505,7 +500,6 @@ The update log file for incremental propagation. .RE .SH ATTRIBUTES -.LP See \fBattributes\fR(5) for descriptions of the following attributes: .sp @@ -520,7 +514,6 @@ Interface Stability Evolving .TE .SH SEE ALSO -.LP \fBkpasswd\fR(1), \fBkadmin\fR(1M), \fBkadmind\fR(1M), \fBkadmin.local\fR(1M), \fBkdb5_ldap_util\fR(1M), \fBkproplog\fR(1M), \fBkadm5.acl\fR(4), \fBkdc.conf\fR(4), \fBattributes\fR(5), \fBkerberos\fR(5) diff --git a/usr/src/man/man1m/ksslcfg.1m b/usr/src/man/man1m/ksslcfg.1m index d70ff33c94..efe6124d87 100644 --- a/usr/src/man/man1m/ksslcfg.1m +++ b/usr/src/man/man1m/ksslcfg.1m @@ -3,11 +3,10 @@ .\" The contents of this file are subject to the terms of the Common Development and Distribution License (the "License"). You may not use this file except in compliance with the License. .\" You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE or http://www.opensolaris.org/os/licensing. See the License for the specific language governing permissions and limitations under the License. .\" When distributing Covered Code, include this CDDL HEADER in each file and include the License file at usr/src/OPENSOLARIS.LICENSE. If applicable, add the following below this CDDL HEADER, with the fields enclosed by brackets "[]" replaced with your own identifying information: Portions Copyright [yyyy] [name of copyright owner] -.TH KSSLCFG 1M "May 27, 2008" +.TH KSSLCFG 1M "November 22, 2021" .SH NAME ksslcfg \- enable and configure SMF instance of Kernel SSL .SH SYNOPSIS -.LP .nf \fBksslcfg\fR create \fB-f\fR pkcs11 \fB-T\fR \fItoken_label\fR \fB-C\fR \fIcertificate_label\fR [\fB-d\fR \fIsofttoken_directory\fR] @@ -49,8 +48,6 @@ ksslcfg \- enable and configure SMF instance of Kernel SSL .fi .SH DESCRIPTION -.sp -.LP \fBksslcfg\fR manages \fBsmf\fR(5) instances for the Kernel SSL proxy module. An SSL-enabled web server can use the services of its Kernel SSL proxy to improve the performance of the HTTPS packets processing. It does so by creating @@ -85,8 +82,6 @@ service unique to the combination of host and SSL port. Instance FMRIs for particular proxy entries can be found with \fBsvcs\fR(1) and used for dependencies of other services. .SH OPTIONS -.sp -.LP The following options are supported: .sp .ne 2 @@ -281,7 +276,6 @@ Displays the usage of the command. .RE .SH OPERANDS -.sp .ne 2 .na \fB\fB[\fIhost\fR] [\fIssl_port\fR]\fR\fR @@ -295,7 +289,6 @@ is required. Typically, this has a value of 443. .RE .SH EXAMPLES -.LP \fBExample 1 \fRCreate and Enable a Kernel SSL Instance .sp .LP @@ -307,11 +300,11 @@ certificate and a key in PKCS#11 format. .nf # \fBksslcfg create -f pkcs11 -T "Sun Software PKCS#11 softtoken" \e -C "Server-Cert" -p /some/directory/password -u webservd \e --x 8080 www.mysite.com 443\fR +-x 8080 www.example.com 443\fR % \fBsvcs svc:/network/ssl/proxy\fR STATE STIME FMRI -online Sep_27 svc:/network/ssl/proxy:kssl-www-mysite-com-443 +online Sep_27 svc:/network/ssl/proxy:kssl-www-example-com-443 .fi .in -2 .sp @@ -321,7 +314,7 @@ online Sep_27 svc:/network/ssl/proxy:kssl-www-mysite-com-443 .sp .LP The following command creates and enables a default instance for all addresses -from a certicate and key in a \fBpkcs#12\fR file. +from a certificate and key in a \fBpkcs#12\fR file. .sp .in +2 @@ -359,13 +352,12 @@ The following command disables and deletes an instance. .sp .in +2 .nf -# \fBksslcfg delete www.mysite.com 443\fR +# \fBksslcfg delete www.example.com 443\fR .fi .in -2 .sp .SH EXIT STATUS -.sp .ne 2 .na \fB\fB0\fR\fR @@ -384,8 +376,6 @@ An error occurred. .RE .SH ATTRIBUTES -.sp -.LP See \fBattributes\fR(5) for descriptions of the following attributes: .sp @@ -405,14 +395,10 @@ Command line options are Evolving; command output is Unstable. The FMRI service name (\fBsvc://network/ssl/proxy\fR) is Unstable, as is the FMRI instance's name format. The utility name is Stable. .SH SEE ALSO -.sp -.LP \fBnca\fR(1), \fBsvcprop\fR(1), \fBsvcs\fR(1), \fBcryptoadm\fR(1M), \fBsvcadm\fR(1M), \fBsvccfg\fR(1M), \fBuser_attr\fR(4), \fBattributes\fR(5), \fBpkcs11_softtoken\fR(5), \fBrbac\fR(5), \fBsmf\fR(5) .SH NOTES -.sp -.LP \fBksslcfg\fR \fBcreate\fR without an host argument creates an \fBINADDR_ANY\fR \fBsmf\fR instance. \fBksslcfg\fR \fBdelete\fR without an host argument deletes only the \fBINADDR_ANY\fR instance. \fBksslcfg\fR \fBdelete\fR needs a host diff --git a/usr/src/man/man1m/ldapclient.1m b/usr/src/man/man1m/ldapclient.1m index d56e09fed5..bb8162458d 100644 --- a/usr/src/man/man1m/ldapclient.1m +++ b/usr/src/man/man1m/ldapclient.1m @@ -3,12 +3,11 @@ .\" The contents of this file are subject to the terms of the Common Development and Distribution License (the "License"). You may not use this file except in compliance with the License. .\" You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE or http://www.opensolaris.org/os/licensing. See the License for the specific language governing permissions and limitations under the License. .\" When distributing Covered Code, include this CDDL HEADER in each file and include the License file at usr/src/OPENSOLARIS.LICENSE. If applicable, add the following below this CDDL HEADER, with the fields enclosed by brackets "[]" replaced with your own identifying information: Portions Copyright [yyyy] [name of copyright owner] -.TH LDAPCLIENT 1M "Feb 25, 2017" +.TH LDAPCLIENT 1M "November 22, 2021" .SH NAME ldapclient \- initialize LDAP client machine or output an LDAP client profile in LDIF format .SH SYNOPSIS -.LP .nf \fB/usr/sbin/ldapclient\fR [\fB-v\fR | \fB-q\fR] init [\fB-a\fR profileName=\fIprofileName\fR] [\fB-a\fR domainName=\fIdomain\fR] [\fB-a\fR proxyDN=\fIproxyDN\fR] @@ -49,7 +48,6 @@ in LDIF format .fi .SH DESCRIPTION -.LP The \fBldapclient\fR utility can be used to: .RS +4 .TP @@ -108,7 +106,7 @@ self \fBcredentialLevel\fR is configured, \fBauthenticationMethod\fR must be \fBsasl/GSSAPI\fR. .sp .LP -Similarily, if a client is to be configured to enable shadow information update +Similarly, if a client is to be configured to enable shadow information update and use a proxy credentialLevel, administrator credentials must be provided using \fB-a\fR \fBadminDN=\fR\fIadminDN\fR and \fB-a\fR \fBadminPassword=\fR\fIadminPassword\fR. However, the shadow information update @@ -252,7 +250,6 @@ appropriate certificate databases to use TLS. Note that the \fBtls:none\fR authentication method requires a \fBcredentialLevel\fR of \fBproxy\fR to take effect. .SS "Commands" -.LP The following commands are supported: .sp .ne 2 @@ -319,7 +316,6 @@ directory for clients to use, with the \fBinit\fR form of this command. .RE .SS "Attributes" -.LP The following attributes are supported: .sp .ne 2 @@ -765,18 +761,17 @@ This is a multivalued attribute. In the example, .sp .in +2 .nf -serviceSearchDescriptor=passwd:ou=people,dc=a1,dc=acme,dc=com?one +serviceSearchDescriptor=passwd:ou=people,dc=a1,dc=example,dc=com?one .fi .in -2 .sp the LDAP client would do a one level search in -\fBou=people,dc=a1,dc=acme,dc=com\fR rather than +\fBou=people,dc=a1,dc=example,dc=com\fR rather than \fBou=people,\fIdefaultSearchBase\fR\fR for the \fBpasswd\fR service. .RE .SH OPTIONS -.LP The following options are supported: .sp .ne 2 @@ -876,7 +871,6 @@ This option is mutually exclusive of the \fB-a\fR \fIadminPassword\fR option. .RE .SH OPERANDS -.LP The following operand is supported: .sp .ne 2 @@ -892,7 +886,6 @@ Once the profile is loaded, the \fBpreferredServerList\fR and .RE .SH EXAMPLES -.LP \fBExample 1 \fRSetting Up a Client By Using the Default Profile Stored on a Specified LDAP Server .sp @@ -917,14 +910,14 @@ a Specified LDAP Server .LP The following example shows how to set up a client using the \fBsimple\fR profile stored on the specified LDAP server. The domainname is set to -\fBxyz.mycompany.com\fR and the proxyPassword is \fBsecret\fR. +\fBxyz.example.com\fR and the proxyPassword is \fBsecret\fR. .sp .in +2 .nf example# \fBldapclient init -a profileName=simple \e --a domainName=xyz.mycompany.com \e --a proxyDN=cn=proxyagent,ou=profile,dc=xyz,dc=mycompany,dc=com \e +-a domainName=xyz.example.com \e +-a proxyDN=cn=proxyagent,ou=profile,dc=xyz,dc=example,dc=com \e -a proxyPassword=secret '['fe80::a00:20ff:fea3:388']':386\fR .fi .in -2 @@ -936,13 +929,13 @@ example# \fBldapclient init -a profileName=simple \e .LP The following example shows how to set up a client using only one server. The authentication method is set to \fBnone\fR, and the search base is -\fBdc=mycompany,dc=com\fR. +\fBdc=example,dc=com\fR. .sp .in +2 .nf example# \fBldapclient manual -a authenticationMethod=none \e --a defaultSearchBase=dc=mycompany,dc=com \e +-a defaultSearchBase=dc=example,dc=com \e -a defaultServerList=172.16.100.1\fR .fi .in -2 @@ -956,7 +949,7 @@ Referrals The following example shows how to set up a client using only one server. The credential level is set to \fBproxy\fR. The authentication method of is \fBsasl/CRAM-MD5\fR, with the option not to follow referrals. The domain name -is \fBxyz.mycompany.com\fR, and the LDAP server is running on port number 386 +is \fBxyz.example.com\fR, and the LDAP server is running on port number 386 at IP address \fB172.16.100.1\fR. .sp @@ -966,9 +959,9 @@ example# \fBldapclient manual \e -a credentialLevel=proxy \e -a authenticationMethod=sasl/CRAM-MD5 \e -a proxyPassword=secret \e --a proxyDN=cn=proxyagent,ou=profile,dc=xyz,dc=mycompany,dc=com \e --a defaultSearchBase=dc=xyz,dc=mycompany,dc=com \e --a domainName=xyz.mycompany.com \e +-a proxyDN=cn=proxyagent,ou=profile,dc=xyz,dc=example,dc=com \e +-a defaultSearchBase=dc=xyz,dc=example,dc=com \e +-a domainName=xyz.example.com \e -a followReferrals=false \e -a defaultServerList=172.16.100.1:386\fR .fi @@ -1006,8 +999,8 @@ The following example creates a profile on IPv6 servers example# \fBldapclient genprofile -a profileName=eng \e -a credentialLevel=proxy \e -a authenticationMethod=sasl/DIGEST-MD5 \e --a defaultSearchBase=dc=eng,dc=acme,dc=com \e --a "serviceSearchDescriptor=passwd:ou=people,dc=a1,dc=acme,dc=com?one"\e +-a defaultSearchBase=dc=eng,dc=example,dc=com \e +-a "serviceSearchDescriptor=passwd:ou=people,dc=a1,dc=example,dc=com?one"\e -a preferredServerList= '['fe80::a00:20ff:fea3:388']' \e -a "defaultServerList='['fec0::111:a00:20ff:fea3:edcf']' \e '['fec0::111:a00:20ff:feb5:e41']'" > eng.ldif\fR @@ -1027,8 +1020,8 @@ The following example shows a profile that overrides every default value. example# \fBldapclient genprofile -a profileName=eng \e -a credentialLevel=proxy -a authenticationMethod=sasl/DIGEST-MD5 \e -a bindTimeLimit=20 \e --a defaultSearchBase=dc=eng,dc=acme,dc=com \e --a "serviceSearchDescriptor=passwd:ou=people,dc=a1,dc=acme,dc=com?one"\e +-a defaultSearchBase=dc=eng,dc=example,dc=com \e +-a "serviceSearchDescriptor=passwd:ou=people,dc=a1,dc=example,dc=com?one"\e -a serviceAuthenticationMethod=pam_ldap:tls:simple \e -a defaultSearchScope=sub \e -a attributeMap=passwd:uid=employeeNumber \e @@ -1041,7 +1034,6 @@ example# \fBldapclient genprofile -a profileName=eng \e .sp .SH EXIT STATUS -.LP The following exit values are returned: .sp .ne 2 @@ -1120,7 +1112,6 @@ files. .RE .SH ATTRIBUTES -.LP See \fBattributes\fR(5) for descriptions of the following attributes: .sp @@ -1135,14 +1126,12 @@ Interface Stability Evolving .TE .SH SEE ALSO -.LP \fBchkey\fR(1), \fBldap\fR(1), \fBldapadd\fR(1), \fBldapdelete\fR(1), \fBldaplist\fR(1), \fBldapmodify\fR(1), \fBldapmodrdn\fR(1), \fBldapsearch\fR(1), \fBidsconfig\fR(1M), \fBldapaddent\fR(1M), \fBldap_cachemgr\fR(1M), \fBdefaultdomain\fR(4), \fBnsswitch.conf\fR(4), \fBresolv.conf\fR(4), \fBattributes\fR(5) .SH CAUTION -.LP Currently \fBStartTLS\fR is not supported by \fBlibldap.so.5\fR, therefore the port number provided refers to the port used during a TLS open, rather than the port used as part of a \fBStartTLS\fR sequence. To avoid timeout delays, mixed diff --git a/usr/src/man/man1m/lpset.1m b/usr/src/man/man1m/lpset.1m index 4556d8d27b..a25eed3fc5 100644 --- a/usr/src/man/man1m/lpset.1m +++ b/usr/src/man/man1m/lpset.1m @@ -3,12 +3,11 @@ .\" The contents of this file are subject to the terms of the Common Development and Distribution License (the "License"). You may not use this file except in compliance with the License. .\" You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE or http://www.opensolaris.org/os/licensing. See the License for the specific language governing permissions and limitations under the License. .\" When distributing Covered Code, include this CDDL HEADER in each file and include the License file at usr/src/OPENSOLARIS.LICENSE. If applicable, add the following below this CDDL HEADER, with the fields enclosed by brackets "[]" replaced with your own identifying information: Portions Copyright [yyyy] [name of copyright owner] -.TH LPSET 1M "Feb 25, 2017" +.TH LPSET 1M "November 22, 2021" .SH NAME lpset \- set printing configuration in /etc/printers.conf or other supported databases .SH SYNOPSIS -.LP .nf \fBlpset\fR [\fB-n\fR system | fnsldap] [\fB-x\fR] [ [\fB-D\fR binddn] [\fB-w\fR passwd] [\fB-h\fR ldaphost]] @@ -16,7 +15,6 @@ databases .fi .SH DESCRIPTION -.LP The \fBlpset\fR utility sets printing configuration information in the system configuration databases. Use \fBlpset\fR to create and update printing configuration in \fB/etc/printers.conf\fR. @@ -25,7 +23,6 @@ See \fBnsswitch.conf\fR(4) and \fBprinters.conf\fR(4). .LP Only a superuser or a member of Group 14 may execute \fBlpset\fR. .SH OPTIONS -.LP The following options are supported: .sp .ne 2 @@ -105,7 +102,6 @@ not specified, the default is the current host system. .RE .SH OPERANDS -.LP The following operand is supported: .sp .ne 2 @@ -123,7 +119,6 @@ atomic names and \fBstandards\fR(5) for information regarding POSIX. .RE .SH EXAMPLES -.LP \fBExample 1 \fRRemoving All Existing Printing Configuration Information .sp .LP @@ -143,14 +138,13 @@ example% \fBlpset -x dogs\fR .sp .in +2 .nf -example% \fBlpset -n ldap -h ldapl.xyz.com -D "cn=Directory Manager" \e +example% \fBlpset -n ldap -h ldapl.example.com -D "cn=Directory Manager" \e -w passwd -a key1=value1 printer1\fR .fi .in -2 .sp .SH EXIT STATUS -.LP The following exit values are returned: .sp .ne 2 @@ -180,7 +174,6 @@ System configuration database. .RE .SH ATTRIBUTES -.LP See \fBattributes\fR(5) for descriptions of the following attributes: .sp @@ -195,7 +188,6 @@ Stability Level Stable .TE .SH SEE ALSO -.LP \fBldap\fR(1), \fBlp\fR(1), \fBlpc\fR(1B), \fBlpq\fR(1B), \fBlpr\fR(1B), \fBlpstat\fR(1), \fBldapclient\fR(1M), \fBlpadmin\fR(1M), \fBlpget\fR(1M), \fBnsswitch.conf\fR(4), \fBprinters\fR(4), \fBprinters.conf\fR(4), @@ -204,7 +196,6 @@ Stability Level Stable .LP \fI\fR .SH NOTES -.LP If the \fBldap\fR database is used, the printer administrator should be mindful of the following when updating printer information. .RS +4 @@ -219,7 +210,7 @@ host the same domain that is used by the current \fBldapclient\fR(1M) server. 2. If the LDAP server being updated is a replica LDAP server, the updates will be referred to the master LDAP server and completed there. The updates might be -out of sync and not appear immediatedly, as the replica server may not have +out of sync and not appear immediately, as the replica server may not have been updated by the master server. For example, a printer that you deleted by using \fBlpset\fR may still appear in the printer list you display with \fBlpget\fR until the replica is updated from the master. Replica servers vary diff --git a/usr/src/man/man1m/mount_smbfs.1m b/usr/src/man/man1m/mount_smbfs.1m index f47587ba67..74d38ba013 100644 --- a/usr/src/man/man1m/mount_smbfs.1m +++ b/usr/src/man/man1m/mount_smbfs.1m @@ -7,12 +7,11 @@ .\" SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE .\" OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. .\" Copyright 2012 Nexenta Systems, Inc. All rights reserved. -.TH MOUNT_SMBFS 1M "Jan 2, 2012" +.TH MOUNT_SMBFS 1M "November 22, 2021" .SH NAME mount_smbfs, umount_smbfs \- mount and unmount a shared resource from a CIFS file server .SH SYNOPSIS -.LP .nf \fB/sbin/mount\fR [\fB-F smbfs\fR] [\fIgeneric-options\fR] [\fB-o\fR \fIname\fR\fB=\fR\fIvalue\fR] [\fB-O\fR] \fIresource\fR .fi @@ -34,8 +33,6 @@ file server .fi .SH DESCRIPTION -.sp -.LP The \fBmount\fR utility attaches a named resource, \fIresource\fR, to the file system hierarchy at the path name location, \fImount-point\fR, which must already exist. @@ -78,8 +75,6 @@ To enable the service, enter the following \fBsvcadm\fR(1M) command: .sp .SS "Operands" -.sp -.LP The \fBmount\fR command supports the following operands: .sp .ne 2 @@ -148,8 +143,6 @@ The \fBmount\fR command maintains a table of mounted file systems in the .RE .SH OPTIONS -.sp -.LP See the \fBmount\fR(1M) man page for the list of supported \fIgeneric-options\fR. .sp @@ -323,7 +316,6 @@ producing the error "device busy." .RE .SH EXAMPLES -.LP \fBExample 1 \fRMounting an SMBFS Share .sp .LP @@ -335,7 +327,7 @@ perform the mount operation. .sp .in +2 .nf -# \fBmount -F smbfs "//SALES;root@nano.sfbay/tmp" /mnt\fR +# \fBmount -F smbfs "//SALES;root@nano.example.org/tmp" /mnt\fR Password: .fi .in -2 @@ -352,7 +344,7 @@ password for the \fBroot\fR user to successfully perform the mount operation. .sp .in +2 .nf -# \fBmount -F smbfs //root@nano.sfbay/tmp /mnt\fR +# \fBmount -F smbfs //root@nano.example.org/tmp /mnt\fR Password: .fi .in -2 @@ -370,7 +362,7 @@ View the file system entry in the \fB/etc/mnttab\fR file. .in +2 .nf # \fBgrep root /etc/mnttab\fR -//root@nano.sfbay/tmp /mnt smbfs dev=4900000 1177097833 +//root@nano.example.org/tmp /mnt smbfs dev=4900000 1177097833 .fi .in -2 .sp @@ -385,7 +377,7 @@ View the output of the \fBmount\fR command. .in +2 .nf # \fBmount | grep root\fR -/mnt on //root@nano.sfbay/tmp read/write/setuid/devices/dev=4900000 on +/mnt on //root@nano.example.org/tmp read/write/setuid/devices/dev=4900000 on Fri Apr 20 13:37:13 2007 .fi .in -2 @@ -401,7 +393,7 @@ View the output of the \fBdf /mnt\fR command. .in +2 .nf # \fBdf /mnt\fR -/mnt (//root@nano.sfbay/tmp): 3635872 blocks -1 files +/mnt (//root@nano.example.org/tmp): 3635872 blocks -1 files .fi .in -2 .sp @@ -417,7 +409,7 @@ Obtain information about the mounted share by viewing the output of the \fBdf .nf # \fBdf -k /mnt\fR Filesystem kbytes used avail capacity Mounted on -//root@nano.sfbay/tmp +//root@nano.example.org/tmp 1882384 64448 1817936 4% /mnt .fi .in -2 @@ -439,7 +431,6 @@ point. The following command line unmounts the share from the mount point. .sp .SH FILES -.sp .ne 2 .na \fB\fB/etc/mnttab\fR\fR @@ -481,8 +472,6 @@ connection. .RE .SH ATTRIBUTES -.sp -.LP See the \fBattributes\fR(5) man page for descriptions of the following attributes: .sp @@ -498,21 +487,15 @@ Interface Stability Committed .TE .SH SEE ALSO -.sp -.LP \fBldap\fR(1), \fBsmbutil\fR(1), \fBmount\fR(1M), \fBmountall\fR(1M), \fBsvcadm\fR(1M), \fBacl\fR(2), \fBfcntl\fR(2), \fBlink\fR(2), \fBmknod\fR(2), \fBmount\fR(2), \fBsymlink\fR(2), \fBumount\fR(2), \fBmnttab\fR(4), \fBnsmbrc\fR(4), \fBvfstab\fR(4), \fBattributes\fR(5), \fBpcfs\fR(7FS), \fBsmbfs\fR(7FS) .SH AUTHORS -.sp -.LP This manual page contains material originally authored by Boris Popov, \fBbpATbutya.kz\fR, \fBbpATFreeBSD.org\fR. .SH NOTES -.sp -.LP The Solaris CIFS client always attempts to use \fBgethostbyname()\fR to resolve host names. If the host name cannot be resolved, the CIFS client uses NetBIOS name resolution (NBNS). By default, the Solaris CIFS client permits the use of diff --git a/usr/src/man/man1m/pppd.1m b/usr/src/man/man1m/pppd.1m index 712976375a..8862ee9b94 100644 --- a/usr/src/man/man1m/pppd.1m +++ b/usr/src/man/man1m/pppd.1m @@ -3,18 +3,15 @@ .\" Redistribution and use in source and binary forms are permitted provided that the above copyright notice and this paragraph are duplicated in all such forms and that any documentation, advertising materials, and other materials related to such distribution and use acknowledge that the software was developed by Carnegie Mellon University. The name of the University may not be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED .\" WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE. .\" Portions Copyright (c) 2008, Sun Microsystems, Inc. All Right Reserved. -.TH PPPD 1M "Nov 21, 2001" +.TH PPPD 1M "November 22, 2021" .SH NAME pppd \- point to point protocol daemon .SH SYNOPSIS -.LP .nf \fBpppd\fR [\fItty_name\fR] [\fIspeed\fR] [\fIoptions\fR] .fi .SH DESCRIPTION -.sp -.LP The point-to-point protocol (PPP) provides a method for transmitting datagrams over serial point-to-point links. PPP is composed of three components: a facility for encapsulating datagrams over serial links, an extensible link @@ -27,12 +24,8 @@ provides the basic LCP authentication support and several NCPs for establishing and configuring the Internet Protocol (referred to as the IP Control Protocol or "IPCP") and IPv6 (IPV6CP). .SH OPTIONS -.sp -.LP The following sections discuss the \fBpppd\fR options: .SS "Options Files" -.sp -.LP Options are taken from files and the command line. \fBpppd\fR reads options from the files \fB/etc/ppp/options\fR, \fB$HOME/.ppprc\fR and \fB/etc/ppp/options.\fR\fIttyname\fR (in that order) before processing the @@ -51,7 +44,6 @@ starts a comment, which continues until the end of the line. There is no restriction on using the \fBfile\fR or \fBcall\fR options within an options file. .SS "Frequently Used Options" -.sp .ne 2 .na \fB\fB<tty_name>\fR \fR @@ -269,7 +261,6 @@ this option. .RE .SS "Options" -.sp .ne 2 .na \fB\fB<local_IP_address>:<remote_IP_address>\fR \fR @@ -507,9 +498,9 @@ in conjunction with the \fBdemand\fR option. .RS 4n Append the domain name \fId\fR to the local host name for authentication purposes. For example, if \fBgethostname()\fR returns the name \fBporsche\fR, -but the fully qualified domain name is \fBporsche.Quotron.COM\fR, you could -specify \fBdomain Quotron.COM\fR. With this configuration, \fBpppd\fR uses the -name \fBporsche.Quotron.COM\fR for accessing secrets in the secrets file and as +but the fully qualified domain name is \fBporsche.Example.COM\fR, you could +specify \fBdomain Example.COM\fR. With this configuration, \fBpppd\fR uses the +name \fBporsche.Example.COM\fR for accessing secrets in the secrets file and as the default name when authenticating to the peer. This option is privileged. .RE @@ -1813,8 +1804,6 @@ the serial port. .RE .SS "Obsolete Options" -.sp -.LP The following options are obsolete: .sp .ne 2 @@ -1855,12 +1844,8 @@ Show brief help message and exit. .RE .SH EXTENDED DESCRIPTION -.sp -.LP The following sections discuss miscellaneous features of \fBpppd\fR: .SS "Security" -.sp -.LP \fBpppd\fR allows system administrators to provide legitimate users with PPP access to a server machine without fear of compromising the security of the server or the network it runs on. Access control is provided by restricting IP @@ -1902,8 +1887,6 @@ administrator can allow users to establish a PPP connection via a device that they would not normally have access to. Otherwise \fBpppd\fR uses the invoking user's real UID when opening the device. .SS "Authentication" -.sp -.LP During the authentication process, one peer convinces the other of its identity by sending its name and some secret information to the other. During authentication, the first peer becomes the "client" and the second becomes the @@ -2027,8 +2010,6 @@ peername servername secret ip-address -- novj .in -2 .SS "Routing" -.sp -.LP When IPCP negotiation is complete, \fBpppd\fR informs the kernel of the local and remote IP addresses for the PPP interface and creates a host route to the remote end of the link that enables peers to exchange IP packets. Communication @@ -2060,8 +2041,6 @@ addresses to the negotiated addresses. This may disrupt existing connections. Using demand dialing with peers that perform dynamic IP address assignment is not recommended. .SS "Scripts" -.sp -.LP \fBpppd\fR invokes scripts at various stages during processing that are used to perform site-specific ancillary processing. These scripts may be shell scripts or executable programs. \fBpppd\fR does not wait for the scripts to finish. The @@ -2262,7 +2241,6 @@ script. .RE .SH EXAMPLES -.LP \fBExample 1 \fRUsing the \fBauth\fR Option .sp .LP @@ -2336,13 +2314,13 @@ To provide a user with access to the PPP facilities, allocate an IP address for the user's machine, create an entry in \fB/etc/ppp/pap-secrets\fR or \fB/etc/ppp/chap-secrets\fR. This enables the user's machine to authenticate itself. For example, to enable user "Joe" using machine "joespc" to dial in to -machine "server" and use the IP address "joespc.my.net," add the following +machine "server" and use the IP address "joespc.example.net," add the following entry to the \fB/etc/ppp/pap-secrets\fR or \fB/etc/ppp/chap-secrets\fR files: .sp .in +2 .nf -\fBjoespc server "joe's secret" joespc.my.net\fR +\fBjoespc server "joe's secret" joespc.example.net\fR .fi .in -2 .sp @@ -2363,8 +2341,6 @@ includes a telnet, escape ^] (\fBasyncmap 200a0000\fR). If the path includes a followed by any 8 bytes] from the stream. .SH EXIT STATUS -.sp -.LP The \fBpppd\fR exit status indicates errors or specifies why a link was terminated. Exit status values are: .sp @@ -2554,7 +2530,6 @@ Authentication to the peer failed. .RE .SH FILES -.sp .ne 2 .na \fB\fB/var/run/sppp\fIn\fR\fR\fB\&.pid\fR \fR @@ -2641,8 +2616,6 @@ but only to certain trusted peers. .RE .SH ATTRIBUTES -.sp -.LP See \fBattributes\fR(5) for descriptions of the following attributes: .sp @@ -2657,8 +2630,6 @@ Interface Stability Evolving .TE .SH SEE ALSO -.sp -.LP \fBchat\fR(1M), \fBifconfig\fR(1M), \fBcrypt\fR(3C), \fBpam\fR(3PAM), \fBattributes\fR(5) .sp @@ -2690,8 +2661,6 @@ Group. July 1994. Simpson, W. \fIRFC 1662, HDLC-like Framing \fR. Network Working Group. July 1994. .SH NOTES -.sp -.LP These signals affect \fBpppd\fR behavior: .sp .ne 2 @@ -2738,8 +2707,6 @@ implementation.) .RE .SH DIAGNOSTICS -.sp -.LP Messages are sent to the syslog daemon using facility \fBLOG_DAEMON\fR. To see error and debug messages, edit the \fB/etc/syslog.conf\fR file to direct the messages to the desired output device or file, or use the \fBupdetach\fR or diff --git a/usr/src/man/man1m/share_nfs.1m b/usr/src/man/man1m/share_nfs.1m index 8904de8ba1..ff360207e1 100644 --- a/usr/src/man/man1m/share_nfs.1m +++ b/usr/src/man/man1m/share_nfs.1m @@ -23,7 +23,7 @@ .\" Copyright 2014 Nexenta Systems, Inc. All rights reserved. .\" Copyright 2016 Jason King. .\" -.Dd March 23, 2017 +.Dd November 22, 2021 .Dt SHARE_NFS 1M .Os .Sh NAME @@ -440,14 +440,14 @@ NIS 172.16.45.9 --> "myhost" .Pp and .Bd -literal -offset indent -DNS or LDAP 172.16.45.9 --> "myhost.mydomain.mycompany.com" +DNS or LDAP 172.16.45.9 --> "myhost.mydomain.example.com" .Ed .Pp The domain name suffix is distinguished from hostnames and netgroups by a prefixed dot. For example, .Bd -literal -offset indent -rw=.mydomain.mycompany.com +rw=.mydomain.example.com .Ed .Pp A single dot can be used to match a hostname with no suffix. @@ -459,7 +459,7 @@ rw=. matches .Qq mydomain but not -.Qq mydomain.mycompany.com . +.Qq mydomain.example.com . This feature can be used to match hosts resolved through NIS rather than DNS and LDAP. .It Sy network diff --git a/usr/src/man/man1m/sharectl.1m b/usr/src/man/man1m/sharectl.1m index 74d260d4e7..bd27bb4911 100644 --- a/usr/src/man/man1m/sharectl.1m +++ b/usr/src/man/man1m/sharectl.1m @@ -18,7 +18,7 @@ .\" Copyright (c) 2007, Sun Microsystems, Inc. All Rights Reserved .\" Copyright 2016 Nexenta Systems, Inc. .\" -.Dd December 16, 2016 +.Dd November 22, 2021 .Dt SHARECTL 1M .Os .Sh NAME @@ -148,7 +148,7 @@ lockd_listen_backlog=32 lockd_servers=256 lockd_retransmit_timeout=5 grace_period=90 -nfsmapid_domain=sun.com +nfsmapid_domain=example.com servers=1024 server_versmin=2 server_versmax=4 @@ -172,24 +172,24 @@ nfs enabled The following command shows how an authorized user can use .Nm commands to configure global settings for the -.Pa ex.com +.Pa example.com environment in the service management facility .Pq SMF . See .Xr nsmbrc 4 for a description of the example environment, -.Pa ex.com . +.Pa example.com . See .Xr smf 5 for a description of the SMF. .Bd -literal # sharectl set -p section=default -p workgroup=SALES \e -p timeout=5 smbfs -# sharectl set -p section=FSERVER -p addr=fserv.ex.com smbfs +# sharectl set -p section=FSERVER -p addr=fserv.example.com smbfs # sharectl set -p section=RSERVER -p workgroup=REMGROUP \e - -p addr=rserv.ex.com smbfs + -p addr=rserv.example.com smbfs # sharectl set -p section=RSERVER:george -p timeout=30 smbfs -# sharectl set -p section="SSERV:*:POKY" -p addr=sserv.ex.com \e +# sharectl set -p section="SSERV:*:POKY" -p addr=sserv.example.com \e -p timeout=25 smbfs .Ed .It Sy Example 5 No Displaying Current Settings @@ -205,14 +205,14 @@ The values shown are those set by the previous example. workgroup=SALES timeout=5 [FSERVER] -addr=fserv.ex.com +addr=fserv.example.com [RSERVER] workgroup=REMGROUP -addr=rserv.ex.com +addr=rserv.example.com [RSERVER:george] timeout=30 [SSERV:*:POKY] -addr=sserv.ex.com +addr=sserv.example.com timeout=25 .Ed .El diff --git a/usr/src/man/man1m/sharemgr.1m b/usr/src/man/man1m/sharemgr.1m index e7e86f4961..6bf52efd94 100644 --- a/usr/src/man/man1m/sharemgr.1m +++ b/usr/src/man/man1m/sharemgr.1m @@ -4,11 +4,10 @@ .\" The contents of this file are subject to the terms of the Common Development and Distribution License (the "License"). You may not use this file except in compliance with the License. You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE or http://www.opensolaris.org/os/licensing. .\" See the License for the specific language governing permissions and limitations under the License. When distributing Covered Code, include this CDDL HEADER in each file and include the License file at usr/src/OPENSOLARIS.LICENSE. If applicable, add the following below this CDDL HEADER, with .\" the fields enclosed by brackets "[]" replaced with your own identifying information: Portions Copyright [yyyy] [name of copyright owner] -.TH SHAREMGR 1M "Feb 25, 2017" +.TH SHAREMGR 1M "November 22, 2021" .SH NAME sharemgr \- configure and manage file sharing .SH SYNOPSIS -.LP .nf \fBsharemgr\fR \fIsubcommand\fR [\fIoptions\fR] .fi @@ -89,7 +88,6 @@ sharemgr \- configure and manage file sharing .fi .SH DESCRIPTION -.LP The \fBsharemgr\fR command configures share groups and the shares contained within them. .sp @@ -123,7 +121,6 @@ The options shown in the SYNOPSIS section are described in the context of each subcommand. All subcommands except \fBlist\fR and \fBshow\fR require root privileges or that you assume the Primary Administrator role. .SS "Subcommands" -.LP With no subcommand entered, a \fBsharemgr\fR command with the \fB-h\fR option displays a usage message for all subcommands. .sp @@ -629,7 +626,6 @@ across reboots. .RE .SS "Supported Properties" -.LP Properties are protocol-specific. Currently, only the NFS and SMB protocols are supported. Properties have the following characteristics: .RS +4 @@ -1130,7 +1126,6 @@ is when the access list is an asterisk (\fB*\fR), in which case \fBro\fR or .RE .SS "Access List Argument" -.LP The \fIaccess-list\fR argument is either the string \fB"*"\fR to represent all hosts or a colon-separated list whose components can be any number of the following: @@ -1191,7 +1186,7 @@ Returns: \fBmyhost\fR .ad .sp .6 .RS 4n -Returns: \fBmyhost.mydomain.mycompany.com\fR +Returns: \fBmyhost.mydomain.example.com\fR .RE The domain name suffix is distinguished from hostnames and netgroups by a @@ -1199,7 +1194,7 @@ prefixed dot. For example: .sp .in +2 .nf -rw=.mydomain.mycompany.com +rw=.mydomain.example.com .fi .in -2 @@ -1212,7 +1207,7 @@ rw=. .fi .in -2 -\&...matches \fBmydomain\fR but not \fBmydomain.mycompany.com\fR. This feature +\&...matches \fBmydomain\fR but not \fBmydomain.example.com\fR. This feature can be used to match hosts resolved through NIS rather than DNS and LDAP. .RE @@ -1321,7 +1316,6 @@ Error codes used for exit status. .RE .SH ATTRIBUTES -.LP See \fBattributes\fR(5) for descriptions of the following attributes: .sp @@ -1336,6 +1330,5 @@ Interface Stability Committed .TE .SH SEE ALSO -.LP \fBidmap\fR(1M), \fBsharectl\fR(1M), \fBzfs\fR(1M), \fBattributes\fR(5), \fBnfssec\fR(5), \fBsmf\fR(5), \fBstandards\fR(5) |
