[36884] in Kerberos

home help back first fref pref prev next nref lref last post

Re: S4U2self/S4U2Proxy question

daemon@ATHENA.MIT.EDU (Rick van Rein)
Sun Apr 5 12:48:38 2015

Message-ID: <55214126.4060108@openfortress.nl>
Date: Sun, 05 Apr 2015 16:05:26 +0200
From: Rick van Rein <rick@openfortress.nl>
MIME-Version: 1.0
To: Praveen Pattanshetti <praveen.pattanshetti.pp@gmail.com>
In-Reply-To: <CABeEy069jkMFTDoaNJJem1PYDcc15=MDnV8R=g8JftAGdUgMRQ@mail.gmail.com>
Cc: kerberos@mit.edu
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: kerberos-bounces@mit.edu

Hello Praveen,

The following information says it is expired,
http://k5wiki.kerberos.org/wiki/Projects/Services4User
and points to,
http://k5wiki.kerberos.org/wiki/Projects/ConstrainedDelegation
which states "This project was completed in release 1.8."

Further below, it says:
    "We provide a CHECK_ALLOWED_TO_DELEGATE db_invoke callback for the
LDAP backend that authorizes that target service against the
krbAllowedToDelegateTo attribute. There is no support for administrating
this attribute via kadmin, or for the DB2 backend."

So you should opt for the backend option you didn't mention :) not AD or
DB2, but LDAP which generally is the most flexibile one (but a bit of a
drama to setup IMHO).

I also know that FreeIPA has a variation on this scheme, but I don't
know the details on that.

-Rick

________________________________________________
Kerberos mailing list           Kerberos@mit.edu
https://mailman.mit.edu/mailman/listinfo/kerberos

home help back first fref pref prev next nref lref last post