diff options
Diffstat (limited to 'upstream/archlinux/man8/systemd-homed.service.8')
-rw-r--r-- | upstream/archlinux/man8/systemd-homed.service.8 | 116 |
1 files changed, 116 insertions, 0 deletions
diff --git a/upstream/archlinux/man8/systemd-homed.service.8 b/upstream/archlinux/man8/systemd-homed.service.8 new file mode 100644 index 00000000..b9f44fb1 --- /dev/null +++ b/upstream/archlinux/man8/systemd-homed.service.8 @@ -0,0 +1,116 @@ +'\" t +.TH "SYSTEMD\-HOMED\&.SERVICE" "8" "" "systemd 255" "systemd-homed.service" +.\" ----------------------------------------------------------------- +.\" * Define some portability stuff +.\" ----------------------------------------------------------------- +.\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ +.\" http://bugs.debian.org/507673 +.\" http://lists.gnu.org/archive/html/groff/2009-02/msg00013.html +.\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ +.ie \n(.g .ds Aq \(aq +.el .ds Aq ' +.\" ----------------------------------------------------------------- +.\" * set default formatting +.\" ----------------------------------------------------------------- +.\" disable hyphenation +.nh +.\" disable justification (adjust text to left margin only) +.ad l +.\" ----------------------------------------------------------------- +.\" * MAIN CONTENT STARTS HERE * +.\" ----------------------------------------------------------------- +.SH "NAME" +systemd-homed.service, systemd-homed \- Home Area/User Account Manager +.SH "SYNOPSIS" +.PP +systemd\-homed\&.service +.PP +/usr/lib/systemd/systemd\-homed +.SH "DESCRIPTION" +.PP +\fBsystemd\-homed\fR +is a system service that may be used to create, remove, change or inspect home areas (directories and network mounts and real or loopback block devices with a filesystem, optionally encrypted)\&. +.PP +Most of +\fBsystemd\-homed\fR\*(Aqs functionality is accessible through the +\fBhomectl\fR(1) +command\&. +.PP +See the +\m[blue]\fBHome Directories\fR\m[]\&\s-2\u[1]\d\s+2 +documentation for details about the format and design of home areas managed by +systemd\-homed\&.service\&. +.PP +Each home directory managed by +systemd\-homed\&.service +synthesizes a local user and group\&. These are made available to the system using the +\m[blue]\fBUser/Group Record Lookup API via Varlink\fR\m[]\&\s-2\u[2]\d\s+2, and thus may be browsed with +\fBuserdbctl\fR(1)\&. +.SH "KEY MANAGEMENT" +.PP +User records are cryptographically signed with a public/private key pair (the signature is part of the JSON record itself)\&. For a user to be permitted to log in locally the public key matching the signature of their user record must be installed\&. For a user record to be modified locally the private key matching the signature must be installed locally, too\&. The keys are stored in the +/var/lib/systemd/home/ +directory: +.PP +/var/lib/systemd/home/local\&.private +.RS 4 +The private key of the public/private key pair used for local records\&. Currently, only a single such key may be installed\&. +.sp +Added in version 246\&. +.RE +.PP +/var/lib/systemd/home/local\&.public +.RS 4 +The public key of the public/private key pair used for local records\&. Currently, only a single such key may be installed\&. +.sp +Added in version 246\&. +.RE +.PP +/var/lib/systemd/home/*\&.public +.RS 4 +Additional public keys\&. Any users whose user records are signed with any of these keys are permitted to log in locally\&. An arbitrary number of keys may be installed this way\&. +.sp +Added in version 246\&. +.RE +.PP +All key files listed above are in PEM format\&. +.PP +In order to migrate a home directory from a host +"foobar" +to another host +"quux" +it is hence sufficient to copy +/var/lib/systemd/home/local\&.public +from the host +"foobar" +to +"quux", maybe calling the file on the destination +/var/lib/systemd/home/foobar\&.public, reflecting the origin of the key\&. If the user record should be modifiable on +"quux" +the pair +/var/lib/systemd/home/local\&.public +and +/var/lib/systemd/home/local\&.private +need to be copied from +"foobar" +to +"quux", and placed under the identical paths there, as currently only a single private key is supported per host\&. Note of course that the latter means that user records generated/signed before the key pair is copied in, lose their validity\&. +.SH "SEE ALSO" +.PP +\fBsystemd\fR(1), +\fBhomed.conf\fR(5), +\fBhomectl\fR(1), +\fBpam_systemd_home\fR(8), +\fBuserdbctl\fR(1), +\fBorg.freedesktop.home1\fR(5) +.SH "NOTES" +.IP " 1." 4 +Home Directories +.RS 4 +\%https://systemd.io/HOME_DIRECTORY +.RE +.IP " 2." 4 +User/Group Record Lookup API via Varlink +.RS 4 +\%https://systemd.io/USER_GROUP_API +.RE |