JavaScript is required to for searching.
Skip Navigation Links
Exit Print View
man pages section 1M: System Administration Commands     Oracle Solaris 11.1 Information Library
search filter icon
search icon

Document Information

Preface

Introduction

System Administration Commands - Part 1

System Administration Commands - Part 2

luxadm(1M)

mail.local(1M)

makedbm(1M)

makemap(1M)

masfcnv(1M)

mdlogd(1M)

mdmonitord(1M)

mdnsd(1M)

medstat(1M)

metaclear(1M)

metadb(1M)

metadetach(1M)

metadevadm(1M)

metahs(1M)

metaimport(1M)

metainit(1M)

metaoffline(1M)

metaonline(1M)

metaparam(1M)

metarecover(1M)

metarename(1M)

metareplace(1M)

metaset(1M)

metassist(1M)

metastat(1M)

metasync(1M)

metattach(1M)

mib2mof(1M)

mibiisa(1M)

mkbootmedia(1M)

mkdevalloc(1M)

mkdevmaps(1M)

mkfifo(1M)

mkfile(1M)

mkfs(1M)

mkfs_pcfs(1M)

mkfs_udfs(1M)

mkfs_ufs(1M)

mknod(1M)

mkntfs(1M)

mkpwdict(1M)

modinfo(1M)

modload(1M)

modunload(1M)

mofcomp(1M)

mofreg(1M)

monacct(1M)

monitor(1M)

mount(1M)

mountall(1M)

mountd(1M)

mount_hsfs(1M)

mount_nfs(1M)

mount_pcfs(1M)

mount_smbfs(1M)

mount_tmpfs(1M)

mount_udfs(1M)

mount_ufs(1M)

mpathadm(1M)

mpstat(1M)

msgid(1M)

mvdir(1M)

named(1M)

named-checkconf(1M)

named-checkzone(1M)

named-compilezone(1M)

ncaconfd(1M)

ncheck(1M)

ncheck_ufs(1M)

ndd(1M)

ndmpadm(1M)

ndmpd(1M)

ndmpstat(1M)

netadm(1M)

netcfg(1M)

netcfgd(1M)

netservices(1M)

netstat(1M)

netstrategy(1M)

newaliases(1M)

newfs(1M)

newkey(1M)

nfs4cbd(1M)

nfsd(1M)

nfslogd(1M)

nfsmapid(1M)

nfsref(1M)

nfsstat(1M)

nscadm(1M)

nscd(1M)

nscfg(1M)

nsdb-list(1M)

nsdb-nces(1M)

nsdbparams(1M)

nsdb-resolve-fsn(1M)

nsdb-update-nci(1M)

nslookup(1M)

nsupdate(1M)

ntfscat(1M)

ntfsclone(1M)

ntfscluster(1M)

ntfscmp(1M)

ntfscp(1M)

ntfsfix(1M)

ntfsinfo(1M)

ntfslabel(1M)

ntfsls(1M)

ntfsprogs(1M)

ntfsresize(1M)

ntfsundelete(1M)

nulladm(1M)

nwamd(1M)

obpsym(1M)

oplhpd(1M)

pageout(1M)

parted(1M)

pbind(1M)

pcitool(1M)

pfedit(1M)

pginfo(1M)

pgstat(1M)

picld(1M)

ping(1M)

pkg2du(1M)

pkgadd(1M)

pkgadm(1M)

pkgask(1M)

pkgchk(1M)

pkgcond(1M)

pkg.depotd(1M)

pkgrm(1M)

pkg.sysrepo(1M)

plockstat(1M)

pntadm(1M)

polkit-is-privileged(1M)

pooladm(1M)

poolbind(1M)

poolcfg(1M)

poold(1M)

poolstat(1M)

ports(1M)

poweradm(1M)

poweroff(1M)

powertop(1M)

pppd(1M)

pppoec(1M)

pppoed(1M)

pppstats(1M)

praudit(1M)

prctmp(1M)

prdaily(1M)

projadd(1M)

projdel(1M)

projmod(1M)

prstat(1M)

prtacct(1M)

prtconf(1M)

prtdiag(1M)

prtdscp(1M)

prtfru(1M)

prtpicl(1M)

prtvtoc(1M)

psradm(1M)

psrinfo(1M)

psrset(1M)

pwck(1M)

pwconv(1M)

quot(1M)

quota(1M)

quotacheck(1M)

quotaoff(1M)

quotaon(1M)

rad(1M)

raidctl(1M)

ramdiskadm(1M)

rarpd(1M)

rcapadm(1M)

rcapd(1M)

rctladm(1M)

rdate(1M)

rdisc(1M)

reboot(1M)

rem_drv(1M)

remove_allocatable(1M)

removef(1M)

reparsed(1M)

repquota(1M)

restricted_shell(1M)

rexd(1M)

rexecd(1M)

rlogind(1M)

rmmount(1M)

rmt(1M)

rmvolmgr(1M)

rndc(1M)

rndc-confgen(1M)

roleadd(1M)

roledel(1M)

rolemod(1M)

root_archive(1M)

route(1M)

routeadm(1M)

routed(1M)

rpcbind(1M)

rpc.bootparamd(1M)

rpcinfo(1M)

rpc.mdcommd(1M)

rpc.metad(1M)

rpc.metamedd(1M)

rpc.metamhd(1M)

rpc.rexd(1M)

rpc.rstatd(1M)

rpc.rusersd(1M)

rpc.rwalld(1M)

rpc.smserverd(1M)

rpc.sprayd(1M)

rpc.yppasswdd(1M)

rpc.ypupdated(1M)

rquotad(1M)

rsh(1M)

rshd(1M)

rstatd(1M)

rtc(1M)

rtquery(1M)

runacct(1M)

rusersd(1M)

rwall(1M)

rwalld(1M)

rwhod(1M)

sa1(1M)

sa2(1M)

sadc(1M)

sar(1M)

sasinfo(1M)

savecore(1M)

sbdadm(1M)

sched(1M)

sckmd(1M)

scmadm(1M)

sconadm(1M)

sendmail(1M)

sftp-server(1M)

shadowd(1M)

shadowstat(1M)

share(1M)

shareall(1M)

sharectl(1M)

share_nfs(1M)

share_smb(1M)

showmount(1M)

shutacct(1M)

shutdown(1M)

slpd(1M)

smattrpop(1M)

smbadm(1M)

smbd(1M)

smbiod(1M)

smbiod-svc(1M)

smbios(1M)

smbstat(1M)

smrsh(1M)

smtp-notify(1M)

sndradm(1M)

sndrd(1M)

sndrsyncd(1M)

snmpdx(1M)

snmp-notify(1M)

snmpXwbemd(1M)

snoop(1M)

soconfig(1M)

soladdapp(1M)

soldelapp(1M)

solstice(1M)

sppptun(1M)

spray(1M)

sprayd(1M)

srptadm(1M)

sshd(1M)

ssh-keysign(1M)

startup(1M)

statd(1M)

stclient(1M)

stmfadm(1M)

stmsboot(1M)

strace(1M)

strclean(1M)

strerr(1M)

sttydefs(1M)

su(1M)

sulogin(1M)

suriadm(1M)

svadm(1M)

svcadm(1M)

svcbundle(1M)

svccfg(1M)

svc.configd(1M)

svc.ipfd(1M)

svc.startd(1M)

swap(1M)

sxadm(1M)

sync(1M)

syncinit(1M)

syncloop(1M)

syncstat(1M)

sysconfig(1M)

sysdef(1M)

syseventadm(1M)

syseventconfd(1M)

syseventd(1M)

syslogd(1M)

talkd(1M)

tapes(1M)

telnetd(1M)

tftpd(1M)

th_define(1M)

th_manage(1M)

tic(1M)

tncfg(1M)

tnchkdb(1M)

tnctl(1M)

tnd(1M)

tninfo(1M)

tpmadm(1M)

traceroute(1M)

trapstat(1M)

ttymon(1M)

tunefs(1M)

turnacct(1M)

txzonemgr(1M)

tzreload(1M)

tzselect(1M)

uadmin(1M)

ucodeadm(1M)

ufsdump(1M)

ufsrestore(1M)

umount(1M)

umountall(1M)

System Administration Commands - Part 3

rad

- remote administration daemon

Synopsis

/usr/lib/rad [-d] [-s] [-S fmri]
     [-M module [ -M module ]...]
     [-m moduledir [ -m moduledir ]...]
     [-t transpec [ -t transpec ]...]
     [-e timeout]

Description

rad is a facility that securely exposes programmatic system administrative and monitoring interfaces to consumers in a variety of high-level languages.

rad can be used in the following ways:

rad is modular. The APIs published by rad are delivered as shared objects, as are the protocols it understands and the transports it can communicate over. Multiple instances of rad can run simultaneously, each functioning independently of the others, providing different services to different consumers, and listening for different types of connections on different ports or interfaces. rad obtains its configuration from its command-line options, from smf(5), or from a combination of the two.

Options

The following options are available for use on the command line:

-d

Emit verbose debugging output.

-e timeout

Specify a connection timeout in seconds. The default value is 180 seconds.

-m moduledir

Add moduledir to the list of directories to scan and load modules from. The -m option can be used multiple times to add multiple module directories.

-M module

Add module to the list of modules to load. module should be an absolute pathname or a pathname relative to the current working directory. Modules loaded with -M take precedence over modules found using -m. The -M option can be used multiple times to add multiple modules.

-t transpec

Instantiate a transport specified by transport specification transpec. A transport specification has the following format:

transport[:option[=value][,option2[=value2]]...]
-s

Behave as an svc.startd(1M) start method. This option has the following effects:

  • If the -S option is not specified, rad will read its configuration from the service identified by scf_myname() (see scf_handle_create(3SCF)).

  • rad will use smf_method(5)-compatible exit statuses.

  • rad will daemonize, returning success only once it is ready to handle requests.

-S fmri

Read configuration from the SMF service instance specified by fmri. When the -s option is not specified, configured transports are not read from the service to avoid endpoint conflicts with a running service.

Module directories specified on the command line are searched before module directories configured in SMF, permitting command line configuration to override SMF configuration.

SMF Configuration

When rad reads its configuration from smf(5), it reads general configuration from a property group called config of type application, and reads configuration for each of an arbitrary number of transports from a series of properties groups of type xport_XYZ where XYZ is replaced with the name of the transport type. Multiple instances of a particular transport type can be configured by creating multiple property groups of the corresponding type. The names of the property groups used to configure transports are not important.

The config property group contains the following properties:

moduledir

A list of astrings. The directories to scan and load modules from.

modules

A list of astrings. The file names of specific modules to load.

debug

A boolean. If true, rad will emit verbose debugging output. Defaults to false.

timeout

An integer. The maximum time in seconds to wait for an individual response from the client while authenticating. Defaults to 180.

Service Instances

Two instances of the svc:/system/rad SMF service are configured to run /usr/lib/rad/rad:

svc:/system/rad:local

Configures rad to use the unix transport, with AF_UNIX sockets at:

  • /system/volatile/rad/radsocket, for getpeerucred(3C)-authenticated connections, and...

  • /system/volatile/rad/radsocket-unauth, for pam(3PAM)-authenticated connections.

svc:/system/rad:remote

Configures rad to use the tls transport.

Each service is configured with the following directories in its moduledir setting:

/usr/lib/rad/module

content-specific modules

/usr/lib/rad/transport

transport modules

/usr/lib/rad/protocol

protocol modules

/usr/lib/rad/site-modules

site-specific modules

Transports

Support for different transport types is delivered in module form. Modules for the following transports are supplied with the system: pipes (pipe), TCP sockets (tcp), TLS sockets (tls), and Unix-domain sockets (unix). Each transport type has a unique set of configuration properties. The options for an instance of a transport type are configured either by defining properties in an SMF property group or by supplying sub-options to a -t command-line option.

The pipe transport reads from and writes to a specific file descriptor, as is needed when a process wishes to communicate with a child rad process using a pipe. The pipe transport has the following options:

proto

An astring. The protocol to use with this transport instance. Defaults to rad.

fd

An integer. The file descriptor to read from/write to.

exit

A boolean. If true, rad will exit when communication over the pipe ends. Defaults to false.

The tcp transport listens for clear-text connections on a TCP socket. The tcp transport has the following options:

proto

An astring. The protocol to use with this transport instance. Defaults to rad.

port

An integer. The port to listen on for connections.

localonly

A boolean. If true, rad will only listen for connections from the local machine. Defaults to true.

pam_service

An astring. The pam(3PAM) service name to use when authenticating. Defaults to rad-tcp. See the “Authenticating with PAM” section below.

The tls transport listens for TLS connections on a TCP socket. The tls transport has the following options:

proto

An astring. The protocol to use with this transport instance. Defaults to rad.

port

An integer. The port to listen on for connections.

localonly

A boolean. If true, rad will only listen for connections from the local machine. Defaults to true.

certificate

An astring. The location of the PEM-formatted x509 certificate to use.

privatekey

An astring. The location of the PEM-formatted private key to use.

generate

A boolean. If true, and if the specified certificate and privatekey do not exist, rad will generate a new certificate and private key using openssl(5). Defaults to false.

pam_service

An astring. The pam(3PAM) service name to use when authenticating. Defaults to rad-tls. See the “Authenticating with PAM” section below.

The unix transport listens for connections on an AF_UNIX socket. The unix transport has the following options:

proto

An astring. The protocol to use with this transport instance. Defaults to rad.

path

An astring. The path to listen on.

peercred

A boolean. If true, rad will attempt to automatically authenticate connections using getpeerucred(3C). Defaults to true.

pam_service

n astring. The pam(3PAM) service name to use when authenticating. Defaults to rad-unix. See the “Authenticating with PAM” section below.

Authenticating with PAM

When rad is run as a service, and getpeerucred(3C) is not applicable to the transport being used, pam(3PAM) is used to authenticate connections. The PAM service name used is dependent on the transport:

rad-tls

when connecting by means of the tls transport

rad-tcp

when connecting by means of the tcp transport

rad-unix

when connecting by means of the unix transport (and peercred is false)

rad

when connecting by means of any other transport

In rare cases, administrators may need to override the PAM service name used on a per-transport basis. For example, two rad TLS transports serving a single rad instance, with one listening on a local (more trusted) network and the other on a remote (less trusted) network, could require different PAM configurations.

In such cases, administrators can specify the name of the PAM service to use as a transport configuration property (see the “Transports” section above).

As with all PAM services, PAM will for look for entries corresponding to the PAM service for rad in /etc/pam.conf first and then /etc/pam.d/service. If no entries are found PAM will look in /etc/pam.conf for entries corresponding to the “other” service. If no “other” entries are found PAM will finally look for entries in /etc/pam.d/other.

Files

/etc/rad/cert.pem

The location where the remote rad instance (svc:/system/rad:remote) stores its certificate. This file is readable by all users.

/etc/rad/key.pem

The location where the remote rad instance (svc:/system/rad:remote) stores its private key.

/system/volatile/rad/radsocket

The AF_UNIX socket where the local rad instance (svc:/system/rad:local) accepts connections that are implicitly authenticated with getpeerucred(3C).

/system/volatile/rad/radsocket-unauth

The AF_UNIX socket where the local rad instance (svc:/system/rad:local) accepts connections that must explicitly authenticate using pam(3PAM).

Attributes

See attributes(5) for descriptions of the following attributes:

ATTRIBUTE TYPE
ATTRIBUTE VALUE
Availability
system/management/rad
Interface Stability
Private

See Also

radadrgen(1), svc.startd(1M), pipe(2), getpeerucred(3C), pam(3PAM), scf_handle_create(3SCF), attributes(5), openssl(5), smf(5), smf_method(5)

Notes

Two instances of rad are delivered by the system. svc:/system/rad:local listens to AF_UNIX connections at the paths /system/volatile/rad/radsocket and /system/volatile/rad/radsocket-unauth, and is enabled by default. The former AF_UNIX socket will automatically authenticate the connecting process using getpeerucred(3C), while the latter requires the connecting process to explicitly authenticate. svc:/system/rad:remote listens to TLS connections on the port 12302, requires all clients to explicitly authenticate, and is disabled by default.

Other system components, including some desktop administrative user interfaces, rely on the local instance of rad (svc:/system/rad:local).