NAME
kadm5.acl - Kerberos ACL fileDESCRIPTION
The Kerberos kadmind(8) daemon uses an Access Control List (ACL) file to manage access rights to the Kerberos database. For operations that affect principals, the ACL file also controls which principals can operate on which other principals.SYNTAX
Empty lines and lines starting with the sharp sign ( #) are ignored. Lines containing ACL entries have the format:principal permissions [target_principal [restrictions] ]
Line order in the ACL file is important. The
first matching entry will control access for an actor principal on a target
principal.
- principal
- (Partially or fully qualified Kerberos principal name.) Specifies the principal whose permissions are to be set. Each component of the name may be wildcarded using the * character.
- permissions
- Specifies what operations may or may not be performed by a
principal matching a particular entry. This is a string of one or
more of the following list of characters or their upper-case counterparts.
If the character is upper-case, then the operation is disallowed.
If the character is lower-case, then the operation is permitted.
a [Dis]allows the addition of principals or policies c [Dis]allows the changing of passwords for principals d [Dis]allows the deletion of principals or policies e [Dis]allows the extraction of principal keys i [Dis]allows inquiries about principals or policies l [Dis]allows the listing of all principals or policies m [Dis]allows the modification of principals or policies p [Dis]allows the propagation of the principal database (used in incr_db_prop) s [Dis]allows the explicit setting of the key for a principal x Short for admcilsp. All privileges (except e) * Same as x.
The extract privilege is not included
in the wildcard privilege; it must be explicitly assigned. This privilege
allows the user to extract keys from the database, and must be handled with
great care to avoid disclosure of important keys like those of the kadmin/* or
krbtgt/* principals. The lockdown_keys principal attribute can be used
to prevent key extraction from specific principals regardless of the granted
privilege.
- target_principal
- (Optional. Partially or fully qualified Kerberos principal name.) Specifies the principal on which permissions may be applied. Each component of the name may be wildcarded using the * character. target_principal can also include back-references to principal, in which *number matches the corresponding wildcard in principal.
- restrictions
- (Optional) A string of flags. Allowed restrictions are:
- {+|-}flagname
- flag is forced to the indicated value. The permissible flags are the same as those for the default_principal_flags variable in kdc.conf(5).
- -clearpolicy
- policy is forced to be empty.
- -policy pol
- policy is forced to be pol.
- -{expire, pwexpire, maxlife, maxrenewlife} time
- (getdate string) associated value will be forced to MIN( time, requested value).
If the kadmind ACL file is modified, the
kadmind daemon needs to be restarted for changes to take effect.
EXAMPLE
Here is an example of a kadm5.acl file:*/[email protected] * # line 1 [email protected] ADMCIL # line 2 joeadmin/*@ATHENA.MIT.EDU i */[email protected] # line 3 */[email protected] ci *[email protected] # line 4 */[email protected] l * # line 5 [email protected] x * -maxlife 9h -postdateable # line 6
MODULE BEHAVIOR
The ACL file can coexist with other authorization modules in release 1.16 and later, as configured in the kadm5_auth section of krb5.conf(5). The ACL file will positively authorize operations according to the rules above, but will never authoritatively deny an operation, so other modules can authorize operations in addition to those authorized by the ACL file.SEE ALSO
kdc.conf(5), kadmind(8)AUTHOR
MITCOPYRIGHT
1985-2022, MIT1.20.1 |