Is there a way when using PKINIT to not need any internal list of
principals but to rely on the validity of the certificate to proxy the >certificate identity into the Kerberos ticket?
— the KDC need to issue the needed TGT then TGS based on the identity
in the certificate if CRL is OK
Is there a way when using PKINIT to not need any internal list of
principals but to rely on the validity of the certificate to proxy the
certificate identity into the Kerberos ticket?
I know what all of those words are, but I'm unclear what they mean all together. I think you mean _this_ step:
It looks like there is some code in the MIT KDC to perform such
a lookup; the database plugin API contains a function called krb5_db_get_s4u_x509_principal(), which takes a client certificate.
Informations about the principal (name and everything) could be
extracted from the certificate. Principal and certificate contains the
same informations.
Other option I wonder is using the LDAP backend to answer dynamic
content (we have an LDAP gateway in our codebase, so we can use it as a backend API between MIT Kerberos and our identity store).
Doing so the main issue would be to know what Kerberos need to write, to handle it.
Sysop: | Keyop |
---|---|
Location: | Huddersfield, West Yorkshire, UK |
Users: | 546 |
Nodes: | 16 (2 / 14) |
Uptime: | 147:51:37 |
Calls: | 10,383 |
Calls today: | 8 |
Files: | 14,054 |
D/L today: |
2 files (1,861K bytes) |
Messages: | 6,417,737 |