kadm5.acl man page on DragonFly

Man page or keyword search:  
man Server   44335 pages
apropos Keyword Search (all sections)
Output format
DragonFly logo
[printable version]

KADM5.ACL(5)			 MIT Kerberos			  KADM5.ACL(5)

NAME
       kadm5.acl - Kerberos ACL file

DESCRIPTION
       The  Kerberos  kadmind(8) daemon uses an Access Control List (ACL) file
       to manage access rights to the Kerberos database.  For operations  that
       affect  principals,  the	 ACL  file  also controls which principals can
       operate on which other principals.

       The   default	location    of	  the	 Kerberos    ACL    file    is
       /usr/local/var/krb5kdc/kadm5.acl	  unless  this	is  overridden	by the
       acl_file variable in kdc.conf(5).

SYNTAX
       Empty lines and lines starting with the sharp  sign  (#)	 are  ignored.
       Lines containing ACL entries have the format:

	  principal  permissions  [target_principal  [restrictions] ]

       NOTE:
	  Line	order  in the ACL file is important.  The first matching entry
	  will control access for an actor principal on a target principal.

       principal
	      (Partially or fully qualified Kerberos principal	name.)	Speci‐
	      fies the principal whose permissions are to be set.

	      Each component of the name may be wildcarded using the * charac‐
	      ter.

       permissions
	      Specifies what operations may or may not be performed by a prin‐
	      cipal  matching  a particular entry.  This is a string of one or
	      more of the following list of  characters	 or  their  upper-case
	      counterparts.   If  the character is upper-case, then the opera‐
	      tion is disallowed.  If the character is	lower-case,  then  the
	      operation is permitted.

			      ┌──┬────────────────────────────┐
			      │a │ [Dis]allows	the  addition │
			      │	 │ of principals or policies  │
			      ├──┼────────────────────────────┤
			      │c │ [Dis]allows	the  changing │
			      │	 │ of  passwords  for princi‐ │
			      │	 │ pals			      │
			      ├──┼────────────────────────────┤
			      │d │ [Dis]allows	the  deletion │
			      │	 │ of principals or policies  │
			      ├──┼────────────────────────────┤
			      │i │ [Dis]allows	    inquiries │
			      │	 │ about principals or	poli‐ │
			      │	 │ cies			      │
			      ├──┼────────────────────────────┤
			      │l │ [Dis]allows the listing of │
			      │	 │ all principals or policies │
			      ├──┼────────────────────────────┤
			      │m │ [Dis]allows the  modifica‐ │
			      │	 │ tion	  of   principals  or │
			      │	 │ policies		      │
			      └──┴────────────────────────────┘

			      │p │ [Dis]allows	the  propaga‐ │
			      │	 │ tion	  of   the  principal │
			      │	 │ database	(used	   in │
			      │	 │ incr_db_prop)	      │
			      ├──┼────────────────────────────┤
			      │s │ [Dis]allows	the  explicit │
			      │	 │ setting of the key  for  a │
			      │	 │ principal		      │
			      ├──┼────────────────────────────┤
			      │x │ Short  for  admcilsp.  All │
			      │	 │ privileges		      │
			      ├──┼────────────────────────────┤
			      │* │ Same as x.		      │
			      └──┴────────────────────────────┘

       target_principal
	      (Optional.  Partially  or	 fully	qualified  Kerberos  principal
	      name.)   Specifies  the  principal  on  which permissions may be
	      applied.	Each component of the name may be wildcarded using the
	      * character.

	      target_principal	can also include back-references to principal,
	      in which *number matches the corresponding wildcard  in  princi‐
	      pal.

       restrictions
	      (Optional) A string of flags. Allowed restrictions are:

		 {+|-}flagname
			flag  is forced to the indicated value.	 The permissi‐
			ble flags are the same as those for the	 default_prin‐
			cipal_flags variable in kdc.conf(5).

		 -clearpolicy
			policy is forced to be empty.

		 -policy pol
			policy is forced to be pol.

		 -{expire, pwexpire, maxlife, maxrenewlife} time
			(getdate  string)  associated  value will be forced to
			MIN(time, requested value).

	      The above flags act as restrictions on any add or modify	opera‐
	      tion which is allowed due to that ACL line.

       WARNING:
	  If  the kadmind ACL file is modified, the kadmind daemon needs to be
	  restarted for changes to take effect.

EXAMPLE
       Here is an example of a kadm5.acl file:

	  */admin@ATHENA.MIT.EDU    *				    # line 1
	  joeadmin@ATHENA.MIT.EDU   ADMCIL			    # line 2
	  joeadmin/*@ATHENA.MIT.EDU i	*/root@ATHENA.MIT.EDU	    # line 3
	  */root@ATHENA.MIT.EDU	    ci	*1@ATHENA.MIT.EDU	    # line 4
	  */root@ATHENA.MIT.EDU	    l	*			    # line 5
	  sms@ATHENA.MIT.EDU	    x	* -maxlife 9h -postdateable # line 6

       (line 1) Any principal  in  the	ATHENA.MIT.EDU	realm  with  an	 admin
       instance has all administrative privileges.

       (lines  1-3)  The  user	joeadmin  has  all  permissions with his admin
       instance, joeadmin/admin@ATHENA.MIT.EDU (matches line 1).   He  has  no
       permissions  at	all  with  his	null instance, joeadmin@ATHENA.MIT.EDU
       (matches line 2).  His root and	other  non-admin,  non-null  instances
       (e.g.,  extra  or  dbadmin) have inquire permissions with any principal
       that has the instance root (matches line 3).

       (line 4) Any root principal in ATHENA.MIT.EDU can inquire or change the
       password	 of  their  null  instance,  but  not any other null instance.
       (Here, *1 denotes a back-reference to the component matching the	 first
       wildcard in the actor principal.)

       (line  5) Any root principal in ATHENA.MIT.EDU can generate the list of
       principals in the database, and the list of policies in	the  database.
       This  line is separate from line 4, because list permission can only be
       granted globally, not to specific target principals.

       (line   6)   Finally,   the   Service   Management   System   principal
       sms@ATHENA.MIT.EDU  has all permissions, but any principal that it cre‐
       ates or modifies will not be able to get postdateable tickets or	 tick‐
       ets with a life of longer than 9 hours.

SEE ALSO
       kdc.conf(5), kadmind(8)

AUTHOR
       MIT

COPYRIGHT
       1985-2015, MIT

1.14								  KADM5.ACL(5)
[top]

List of man pages available for DragonFly

Copyright (c) for man pages and the logo by the respective OS vendor.

For those who want to learn more, the polarhome community provides shell access and support.

[legal] [privacy] [GNU] [policy] [cookies] [netiquette] [sponsors] [FAQ]
Tweet
Polarhome, production since 1999.
Member of Polarhome portal.
Based on Fawad Halim's script.
....................................................................
Vote for polarhome
Free Shell Accounts :: the biggest list on the net