Questo contenuto non è disponibile nella lingua selezionata.
Chapter 50. Managing Kerberos flags
Kerberos flags are crucial for specifying authentication mechanisms, authorization levels, and security protocols within a Kerberos-enabled network environment. With Kerberos flags, you can ensure secure access control, protect against unauthorized access, and improve interoperability between different Kerberos implementations.
50.1. Kerberos flags for services and hosts Copia collegamentoCollegamento copiato negli appunti!
You can use various Kerberos flags to define specific aspects of the Kerberos ticket behavior. You can add these flags to service and host Kerberos principals.
Principals in Identity Management (IdM) accept the following Kerberos flags:
OK_AS_DELEGATEUse this flag to specify Kerberos tickets trusted for delegation.
Active directory (AD) clients check the
OK_AS_DELEGATEflag on the Kerberos ticket to determine whether a user credentials can be forwarded or delegated to a specific server. AD forwards the ticket-granting ticket (TGT) only to services or hosts withOK_AS_DELEGATEconfigured. With this flag, system security services daemon (SSSD) can add the AD user TGT to the default Kerberos credentials cache on the IdM client machine.REQUIRES_PRE_AUTHUse this flag to specify that only pre-authenticated tickets are allowed to authenticate to a principal.
With the
REQUIRES_PRE_AUTHflag set, the key distribution center (KDC) requires additional authentication: the KDC issues the TGT for the principal withREQUIRES_PRE_AUTHonly if the TGT has been pre-authenticated.You can clear
REQUIRES_PRE_AUTHto disable pre-authentication for selected services or hosts. This lowers the load on the KDC, however slightly increases the possibility of a brute-force attack on a long-term key to succeed.OK_TO_AUTH_AS_DELEGATEUse the
OK_TO_AUTH_AS_DELEGATEflag to specify that the service is allowed to obtain a Kerberos ticket on behalf of a user. Note, that for obtaining other tickets on behalf of the user, the service needs theOK_AS_DELEGATEflag and a corresponding policy decision allowed on the key distribution center side.
50.2. Setting Kerberos flags from the Web UI Copia collegamentoCollegamento copiato negli appunti!
You can set a Kerberos flags by using the IdM Web UI. The following procedure sets the Kerberos flag to a principal.
Procedure
Select
in the menu.
- Click on the service to which you want to add the flags.
Check the option that you want to set:
-
To set the
OK_AS_DELEGATEflag, check Trusted for delegation. -
To set the
REQUIRES_PRE_AUTHflag, check Requires pre-authentication. -
To set the
OK_TO_AUTH_AS_DELEGATEflag, check Trusted to authenticate as user.
-
To set the
50.3. Setting and removing Kerberos flags from the command line Copia collegamentoCollegamento copiato negli appunti!
You can add or remove a Kerberos flag by using the command line. The ipa service-mod command uses the following command options for the flags:
-
--ok-as-delegateforOK_AS_DELEGATE -
--requires-pre-authforREQUIRES_PRE_AUTH -
--ok-to-auth-as-delegateforOK_TO_AUTH_AS_DELEGATE
By setting an option value to 1, you enable a flag for a principle. By setting an option value to 0, you disable the flag.
The following procedure enables and disables the OK_AS_DELEGATE flag for the service/ipa.example.com@example.com principal.
Procedure
To add the
OK_AS_DELEGATEflag for theservice/ipa.example.com@example.comprinciple, run:ipa service-mod service/ipa.example.com@EXAMPLE.COM --ok-as-delegate=1
$ ipa service-mod service/ipa.example.com@EXAMPLE.COM --ok-as-delegate=1Copy to Clipboard Copied! Toggle word wrap Toggle overflow To remove the
OK_AS_DELEGATEflag from theservice/ipa.example.com@example.comprinciple, run:ipa service-mod service/ipa.example.com@EXAMPLE.COM --ok-as-delegate=0
$ ipa service-mod service/ipa.example.com@EXAMPLE.COM --ok-as-delegate=0Copy to Clipboard Copied! Toggle word wrap Toggle overflow
50.4. Displaying Kerberos flags from the command line Copia collegamentoCollegamento copiato negli appunti!
You can display Kerberos flag setting by using the command line. The following procedure displays the OK_AS_DELEGATE flag for the demo/ipa.example.com@EXAMPLE.COM principal.
Procedure
To find out if OK_AS_DELEGATE is set for a principal:
Run the
kvnoutility:kvno demo/ipa.example.com@EXAMPLE.COM
$ kvno demo/ipa.example.com@EXAMPLE.COMCopy to Clipboard Copied! Toggle word wrap Toggle overflow To display the flag setting, run the
klist -fcommand. The0character means that theOK_AS_DELEGATEflag is disabled:Copy to Clipboard Copied! Toggle word wrap Toggle overflow