Managing Kerberos and Other Authentication Services in Oracle® Solaris 11.2

Exit Print View

Updated: August 2014

Observing Mapping From GSS Credentials to UNIX Credentials

To be able to monitor the credential mappings, first uncomment this line from the /etc/gss/gsscred.conf file.


Next, make the gssd service read the /etc/gss/gsscred.conf file.

# pkill -HUP gssd

Now you can monitor the credential mappings as gssd requests them. The mappings are recorded by the syslog daemon, if the syslog.conf file is configured for the auth system facility with the debug severity level.

Note - If the rsyslog service instance is enabled, the mappings are recorded by the rsyslog daemon.