[38040] in Kerberos

home help back first fref pref prev next nref lref last post

Re: more complex kadm5.acl

daemon@ATHENA.MIT.EDU (Greg Hudson)
Sun Jul 23 22:41:21 2017

To: =?UTF-8?Q?Michael_Str=c3=b6der?= <michael@stroeder.com>, kerberos@mit.edu
From: Greg Hudson <ghudson@mit.edu>
Message-ID: <0c60c9dc-8bbc-5231-7543-6722e8968e70@mit.edu>
Date: Sun, 23 Jul 2017 22:40:47 -0400
MIME-Version: 1.0
In-Reply-To: <3b374dfc-b28e-eff4-9e4a-9966af0e1566@stroeder.com>
Content-Type: text/plain; charset="windows-1252"
Errors-To: kerberos-bounces@mit.edu
Content-Transfer-Encoding: 8bit

On 07/22/2017 12:55 PM, Michael Ströder wrote:
> Are there more complex kadm5.acl examples out there leveraging more complex naming
> schemes for principal instances and realms? Or even more detailed presentations/docs?

You could look at the ACL file written by the automated test script:

https://github.com/krb5/krb5/blob/master/src/tests/t_kadmin_acl.py#L48

The source code for parsing the ACL file also isn't large.  We recently
refactored it without changing its behavior much, so you can look at the
old or new versions:

https://github.com/krb5/krb5/blob/krb5-1.15/src/lib/kadm5/srv/server_acl.c
https://github.com/krb5/krb5/blob/master/src/kadmin/server/auth_acl.c

We are also working on a pluggable interface for kadmin authorization,
targeted for 1.16:

https://k5wiki.kerberos.org/wiki/Projects/kadmin_access_interface
https://github.com/krb5/krb5/pull/675
________________________________________________
Kerberos mailing list           Kerberos@mit.edu
https://mailman.mit.edu/mailman/listinfo/kerberos


home help back first fref pref prev next nref lref last post