Chapter 17. Managing Kerberos flags


Manage Kerberos flags for service and host principals in Identity Management (IdM) to control delegation behavior, pre-authentication requirements, and ticket issuance. You can view and configure flags from the command line or the IdM Web UI.

17.1. Kerberos flags for services and hosts

Kerberos flags define specific aspects of ticket behavior for service and host principals in Identity Management (IdM). Configure flags such as OK_AS_DELEGATE, REQUIRES_PRE_AUTH, and OK_TO_AUTH_AS_DELEGATE to control delegation, pre-authentication requirements, and constrained delegation.

Principals in IdM accept the following Kerberos flags:

  • OK_AS_DELEGATE

    Use this flag to specify Kerberos tickets trusted for delegation.

    Active directory (AD) clients check the OK_AS_DELEGATE flag on the Kerberos ticket to determine whether a user credentials can be forwarded or delegated to a specific server. AD forwards the ticket-granting ticket (TGT) only to services or hosts with OK_AS_DELEGATE configured. With this flag, system security services daemon (SSSD) can add the AD user TGT to the default Kerberos credentials cache on the IdM client machine.

  • REQUIRES_PRE_AUTH

    Use this flag to specify that only pre-authenticated tickets are allowed to authenticate to a principal.

    With the REQUIRES_PRE_AUTH flag set, the key distribution center (KDC) requires additional authentication: the KDC issues the TGT for the principal with REQUIRES_PRE_AUTH only if the TGT has been pre-authenticated.

    You can clear REQUIRES_PRE_AUTH to disable pre-authentication for selected services or hosts. This lowers the load on the KDC, however slightly increases the possibility of a brute-force attack on a long-term key to succeed.

  • OK_TO_AUTH_AS_DELEGATE

    Use the OK_TO_AUTH_AS_DELEGATE flag to specify that the service is allowed to obtain a Kerberos ticket on behalf of a user. Note, that for obtaining other tickets on behalf of the user, the service needs the OK_AS_DELEGATE flag and a corresponding policy decision allowed on the key distribution center side.

Display Kerberos flag settings for a service principal using the kvno and klist commands to verify which flags are enabled.

Procedure

  1. To find out if OK_AS_DELEGATE is set for a principal, run the kvno utility:

    $ kvno demo/ipa.example.com@EXAMPLE.COM
  2. To display the flag setting, run the klist -f command. The 0 character means that the OK_AS_DELEGATE flag is disabled:

    $ klist -f
    Ticket cache: KEYRING:persistent:0:0
    Default principal: admin@EXAMPLE.COM
    
    Valid starting		Expires			Service principal
    02/19/2024 09:59:02	02/20/2024 08:21:33	demo/ipa/example.com@EXAMPLE.COM
        Flags: FATO

Set or remove Kerberos flags for a service principal using the ipa service-mod command to control delegation and pre-authentication behavior.

The ipa service-mod command uses the following command options for the flags:

  • --ok-as-delegate for OK_AS_DELEGATE
  • --requires-pre-auth for REQUIRES_PRE_AUTH
  • --ok-to-auth-as-delegate for OK_TO_AUTH_AS_DELEGATE

By setting an option value to 1, you enable a flag for a principle. By setting an option value to 0, you disable the flag.

The following procedure enables and disables the OK_AS_DELEGATE flag for the service/ipa.example.com@example.com principal.

Procedure

  • To add the OK_AS_DELEGATE flag for the service/ipa.example.com@example.com principle, run:

    $ ipa service-mod service/ipa.example.com@EXAMPLE.COM --ok-as-delegate=1
  • To remove the OK_AS_DELEGATE flag from the service/ipa.example.com@example.com principle, run:

    $ ipa service-mod service/ipa.example.com@EXAMPLE.COM --ok-as-delegate=0

17.4. Setting Kerberos flags from the Web UI

Set Kerberos flags for a service principal using the IdM Web UI to control delegation and pre-authentication behavior.

Procedure

  1. Select Identity Services in the menu.

    List of services

  2. Click on the service to which you want to add the flags.
  3. Check the option that you want to set:

    • To set the OK_AS_DELEGATE flag, check Trusted for delegation.
    • To set the REQUIRES_PRE_AUTH flag, check Requires pre-authentication.
    • To set the OK_TO_AUTH_AS_DELEGATE flag, check Trusted to authenticate as user.
Red Hat logoGithubredditYoutubeTwitter

Learn

Try, buy, & sell

Communities

About Red Hat Documentation

We help Red Hat users innovate and achieve their goals with our products and services with content they can trust. Explore our recent updates.

Making open source more inclusive

Red Hat is committed to replacing problematic language in our code, documentation, and web properties. For more details, see the Red Hat Blog.

About Red Hat

We deliver hardened solutions that make it easier for enterprises to work across platforms and environments, from the core datacenter to the network edge.

Theme

© 2026 Red Hat
Back to top