klist - macOS


The klist command in macOS is used for listing the current Kerberos tickets held in a user’s credential cache. This command is essential for debugging authentication issues and managing Kerberos tickets. It’s commonly used in environments where Kerberos authentication is a part of the infrastructure, such as in systems integrated with Active Directory or other Kerberos-based authentication services.


klist [-e] [-V] [cache_name]


  • cache_name: Specify a particular credential cache.


  • -e, –extended:
    Show extended information about each credential, such as the encryption type of the session key and ticket.

  • -V, –verbose:
    Provide verbose output for debugging purposes, offering more detailed information about the underlying processes and tickets.

  • -f:
    Show flags in the ticket, such as initial, pre-authenticated, and hardware-authenticated, providing insights into the various states and capabilities of each ticket.


  1. List current tickets:
    Simply running klist without any options will display the list of all current Kerberos tickets in the default credential cache:

  2. Show extended information:
    To view detailed information about each ticket, including the encryption types:

    klist -e
  3. Using a specific cache:
    If you want to specify a different cache file:

    klist /tmp/krb5cc_1000

Common Issues

  • No Tickets: Users may encounter a “No tickets” error if there are no active sessions. Ensure you are logged into a Kerberos-authenticated session.
  • Permission issues: Running klist on caches that do not belong to the user without proper permissions will result in access errors. Running with sudo might be necessary.


The klist command can be integrated with other commands for scripting and advanced monitoring:

# Script to check and renew tickets
if klist -s; then
    echo "Ticket is active."
    echo "Renewing ticket."

This script checks if a Kerberos ticket is active, and if not, it renews the ticket using kinit.

  • kinit: Authenticate a user to the Kerberos server and obtain an initial ticket-granting ticket.
  • kdestroy: Destroy Kerberos credentials (delete all tickets).
  • kvno: Print the version number of a Kerberos principal.

For further reading and more in-depth information, refer to the official MIT Kerberos Documentation.