HP-UX Remote Access Services Administrator's Guide

Kerberos-Specific Options
You can set the default Kerberos options in the configuration file /etc/krb5.conf.
You can set the -f and -F options with the tag names forward and forwardable,
respectively, and set the fallback option within the appdefaults section in the
/etc/krb5.conf file. If you set the fallback option to true and the Kerberos
authentication fails, remsh uses the non-secure mode of authentication. The -f and
-F options are mutually exclusive. For more information, type man 4 krb5.conf at
the HP-UX prompt.
The rexec Command
The rexec command differs from the remsh command in the following ways:
rexec uses the rexec() library routine and rexed daemon for command
execution.
rexec does not support Kerberos authentication. It prompts for a password before
executing the command instead of using the /etc/hosts.equiv file for
authentication.
You must use the rexec command in instances where you are aware of the password
to a remote account but you do not have sufficient permission for remsh.
For detailed information on remsh and rexec, type man 1 remsh at the HP-UX
prompt.
The rcp Command
The rcp command copies files, directory subtrees, or a combination of files and directory
subtrees from one or more systems to another. In many respects, it is similar to the cp
command.
The syntax for the rcp command is as follows:
rcp [-p] [-S size] [-R size] source_file dest_file
To use rcp, you must have read access to the files being copied, and read and execute
permission on all directories in the directory path. Third-party transfers have special
requirements.
In a Kerberos V5 network authentication environment, rcp uses the Kerberos V5
protocol to initiate the connection to a remote host. The authorization mechanism
depends on the command-line options that invoke remshd on the remote host (-K, -R,
-k, or -r). For a detailed description of the Kerberos authentication and authorization
rules, type man 5 sis on the HP-UX prompt.
Although the rcp command uses Kerberos authentication and authorization, it does
not apply the Kerberos mechanism while copying files. The files are transferred in text
format over the network.
22 Remote Access Services Overview