| 1 | .\" Copyright (c) 1980 Regents of the University of California. |
| 2 | .\" All rights reserved. The Berkeley software License Agreement |
| 3 | .\" specifies the terms and conditions for redistribution. |
| 4 | .\" |
| 5 | .\" @%G |
| 6 | .\" |
| 7 | .TH REGISTER LOCAL "May 10, 1990" |
| 8 | .UC 4 |
| 9 | .SH NAME |
| 10 | register \- register with Kerberos |
| 11 | .SH SYNOPSIS |
| 12 | .B register |
| 13 | .SH DESCRIPTION |
| 14 | The |
| 15 | .I register |
| 16 | command |
| 17 | is used to register a new user with Kerberos. |
| 18 | The Kerberos server keeps record of certain trusted hosts |
| 19 | from which it will accept new registrations. |
| 20 | If the host on which |
| 21 | .I register |
| 22 | is run is trusted by Kerberos, the user |
| 23 | is asked for his current password, and then |
| 24 | a new password to be used with Kerberos. |
| 25 | A user may only register with Kerberos one time. |
| 26 | .SH FILES |
| 27 | .br |
| 28 | /.update.keyxx.xx.xx.xx shared DES key with server |
| 29 | .SH "SEE ALSO" |
| 30 | registerd(8), kerberos(1) |
| 31 | .SH DIAGNOSTICS |
| 32 | \*(lqAlready exists,\*(rq |
| 33 | if the user already exists in the Kerberos database. |
| 34 | .br |
| 35 | \*(lqPermission Denied,\*(rq |
| 36 | if the host on which register is being run is untrusted. |
| 37 | .SH AUTHOR |
| 38 | Kevin Fall |