keylogout - delete stored secret key with keyserv


     /usr/bin/keylogout [-f]


     keylogout deletes the key stored by the key  server  process
     keyserv(1M).  Further access to the key is revoked; however,
     current session keys may remain valid until they  expire  or
     are refreshed.

     Deleting the keys stored by keyserv  will  cause  any  back-
     ground  jobs  or  scheduled  at(1) jobs that need secure RPC
     services to fail. Since only one copy of the key is kept  on
     a  machine, it is a bad idea to place a call to this command
     in your  .logout file since it will affect other sessions on
     the same machine.

     If multiple NIS+ authentication  mechanisms  are  configured
     for  the system, then all keys stored by the key server pro-
     cess will be deleted, including  keys  that  are  no  longer


     -f    Force keylogout to  delete  the  secret  key  for  the
           superuser.  By  default, keylogout by the superuser is
           disallowed because it would break  all  RPC  services,
           such as  NFS, that are started by the superuser.


     See attributes(5) for descriptions of the  following  attri-

    |       ATTRIBUTE TYPE        |       ATTRIBUTE VALUE       |
    | Availability                | SUNWcsu                     |


     at(1),   chkey(1),   login(1),   keylogin(1),   keyserv(1M),
     newkey(1M), nisauthconf(1M), publickey(4), attributes(5)


     NIS+ might not  be  supported  in  future  releases  of  the
     SolarisTM  Operating Environment. Tools to aid the migration
     from NIS+ to LDAP are available in the Solaris  9  operating
     environment.      For      more      information,      visit

Man(1) output converted with man2html