Hi, I started playing with the pass[1] unix password manager and finally found workflow that makes my Kerberos workflow scriptable :) Here is an example: $ klist klist: Credentials cache keyring 'persistent:1000:1000' not found $ pass show fedoraproject.org | head -n1 | kinit jonny@xxxxxxxxxxxxxxxxx Password for jonny@xxxxxxxxxxxxxxxxx: $ klist Ticket cache: KEYRING:persistent:1000:1000 Default principal: jonny@xxxxxxxxxxxxxxxxx Valid starting Expires Service principal 11/02/2017 18:25:32 11/03/2017 18:25:25 krbtgt/FEDORAPROJECT.ORG@xxxxxxxxxxxxxxxxx renew until 11/09/2017 18:25:25 Jonny [1] https://www.passwordstore.org/
Attachment:
signature.asc
Description: OpenPGP digital signature
_______________________________________________ devel mailing list -- devel@xxxxxxxxxxxxxxxxxxxxxxx To unsubscribe send an email to devel-leave@xxxxxxxxxxxxxxxxxxxxxxx