Search

Chapter 27. Kerberos PKINIT Authentication in IdM

download PDF
Public Key Cryptography for Initial Authentication in Kerberos (PKINIT) is a preauthentication mechanism for Kerberos. As of Red Hat Enterprise Linux 7.4, the Identity Management (IdM) server includes a mechanism for Kerberos PKINIT authentication. The following sections give an overview of the PKINIT implementation in IdM and describe how to configure PKINIT in IdM.

27.1. Default PKINIT Status in Different IdM Versions

The default PKINIT configuration on your IdM servers depends on the version of IdM in Red Hat Enterprise Linux (RHEL) and the certificate authority (CA) configuration. See Table 27.1, “Default PKINIT configuration in IdM versions”.
Table 27.1. Default PKINIT configuration in IdM versions
RHEL version CA configuration PKINIT configuration
7.3 and earlier Without a CA Local PKINIT: IdM only uses PKINIT for internal purposes on servers.
7.3 and earlier With an integrated CA
IdM attempts to configure PKINIT by using the certificate signed by the integrated IdM CA.
If the attempt fails, IdM configures local PKINIT only.
7.4 and later
Without a CA
No external PKINIT certificate provided to IdM
Local PKINIT: IdM only uses PKINIT for internal purposes on servers.
7.4 and later
Without a CA
External PKINIT certificate provided to IdM
IdM configures PKINIT by using the external Kerberos key distribution center (KDC) certificate and CA certificate.
7.4 and later With an integrated CA IdM configures PKINIT by using the certificate signed by the IdM CA.
At domain level 0, PKINIT is disabled. The default behavior is local PKINIT: IdM only uses PKINIT for internal purposes on servers. See also Chapter 7, Displaying and Raising the Domain Level.
Red Hat logoGithubRedditYoutubeTwitter

Learn

Try, buy, & sell

Communities

About Red Hat Documentation

We help Red Hat users innovate and achieve their goals with our products and services with content they can trust.

Making open source more inclusive

Red Hat is committed to replacing problematic language in our code, documentation, and web properties. For more details, see the Red Hat Blog.

About Red Hat

We deliver hardened solutions that make it easier for enterprises to work across platforms and environments, from the core datacenter to the network edge.

© 2024 Red Hat, Inc.