|
NAMEkadm5.acl - Kerberos ACL fileDESCRIPTIONThe Kerberos kadmind(8) daemon uses an Access Control List (ACL) file to manage access rights to the Kerberos database. For operations that affect principals, the ACL file also controls which principals can operate on which other principals.The default location of the Kerberos ACL file is /usr/local/var/krb5kdc/kadm5.acl unless this is overridden by the acl_file variable in kdc.conf(5). SYNTAXEmpty lines and lines starting with the sharp sign (#) are ignored. Lines containing ACL entries have the format:principal permissions [target_principal [restrictions] ] NOTE: Line order in the ACL file is important. The first
matching entry will control access for an actor principal on a target
principal.
NOTE: The extract privilege is not included in the
wildcard privilege; it must be explicitly assigned. This privilege allows the
user to extract keys from the database, and must be handled with great care to
avoid disclosure of important keys like those of the kadmin/* or krbtgt/*
principals. The lockdown_keys principal attribute can be used to
prevent key extraction from specific principals regardless of the granted
privilege.
The above flags act as restrictions on any add or modify operation which is allowed due to that ACL line. WARNING: If the kadmind ACL file is modified, the kadmind daemon
needs to be restarted for changes to take effect.
EXAMPLEHere is an example of a kadm5.acl file:*/admin@ATHENA.MIT.EDU * # line 1 joeadmin@ATHENA.MIT.EDU ADMCIL # line 2 joeadmin/*@ATHENA.MIT.EDU i */root@ATHENA.MIT.EDU # line 3 */root@ATHENA.MIT.EDU ci *1@ATHENA.MIT.EDU # line 4 */root@ATHENA.MIT.EDU l * # line 5 sms@ATHENA.MIT.EDU x * -maxlife 9h -postdateable # line 6 (line 1) Any principal in the ATHENA.MIT.EDU realm with an admin instance has all administrative privileges except extracting keys. (lines 1-3) The user joeadmin has all permissions except extracting keys with his admin instance, joeadmin/admin@ATHENA.MIT.EDU (matches line 1). He has no permissions at all with his null instance, joeadmin@ATHENA.MIT.EDU (matches line 2). His root and other non-admin, non-null instances (e.g., extra or dbadmin) have inquire permissions with any principal that has the instance root (matches line 3). (line 4) Any root principal in ATHENA.MIT.EDU can inquire or change the password of their null instance, but not any other null instance. (Here, *1 denotes a back-reference to the component matching the first wildcard in the actor principal.) (line 5) Any root principal in ATHENA.MIT.EDU can generate the list of principals in the database, and the list of policies in the database. This line is separate from line 4, because list permission can only be granted globally, not to specific target principals. (line 6) Finally, the Service Management System principal sms@ATHENA.MIT.EDU has all permissions except extracting keys, but any principal that it creates or modifies will not be able to get postdateable tickets or tickets with a life of longer than 9 hours. MODULE BEHAVIORThe ACL file can coexist with other authorization modules in release 1.16 and later, as configured in the kadm5_auth section of krb5.conf(5). The ACL file will positively authorize operations according to the rules above, but will never authoritatively deny an operation, so other modules can authorize operations in addition to those authorized by the ACL file.To operate without an ACL file, set the acl_file variable in kdc.conf(5) to the empty string with acl_file = "". SEE ALSOkdc.conf(5), kadmind(8)AUTHORMITCOPYRIGHT1985-2021, MIT
Visit the GSP FreeBSD Man Page Interface. |