jpayne@68
|
1 .\" Man page generated from reStructuredText.
|
jpayne@68
|
2 .
|
jpayne@68
|
3 .TH "KADM5.ACL" "5" " " "1.20.1" "MIT Kerberos"
|
jpayne@68
|
4 .SH NAME
|
jpayne@68
|
5 kadm5.acl \- Kerberos ACL file
|
jpayne@68
|
6 .
|
jpayne@68
|
7 .nr rst2man-indent-level 0
|
jpayne@68
|
8 .
|
jpayne@68
|
9 .de1 rstReportMargin
|
jpayne@68
|
10 \\$1 \\n[an-margin]
|
jpayne@68
|
11 level \\n[rst2man-indent-level]
|
jpayne@68
|
12 level margin: \\n[rst2man-indent\\n[rst2man-indent-level]]
|
jpayne@68
|
13 -
|
jpayne@68
|
14 \\n[rst2man-indent0]
|
jpayne@68
|
15 \\n[rst2man-indent1]
|
jpayne@68
|
16 \\n[rst2man-indent2]
|
jpayne@68
|
17 ..
|
jpayne@68
|
18 .de1 INDENT
|
jpayne@68
|
19 .\" .rstReportMargin pre:
|
jpayne@68
|
20 . RS \\$1
|
jpayne@68
|
21 . nr rst2man-indent\\n[rst2man-indent-level] \\n[an-margin]
|
jpayne@68
|
22 . nr rst2man-indent-level +1
|
jpayne@68
|
23 .\" .rstReportMargin post:
|
jpayne@68
|
24 ..
|
jpayne@68
|
25 .de UNINDENT
|
jpayne@68
|
26 . RE
|
jpayne@68
|
27 .\" indent \\n[an-margin]
|
jpayne@68
|
28 .\" old: \\n[rst2man-indent\\n[rst2man-indent-level]]
|
jpayne@68
|
29 .nr rst2man-indent-level -1
|
jpayne@68
|
30 .\" new: \\n[rst2man-indent\\n[rst2man-indent-level]]
|
jpayne@68
|
31 .in \\n[rst2man-indent\\n[rst2man-indent-level]]u
|
jpayne@68
|
32 ..
|
jpayne@68
|
33 .SH DESCRIPTION
|
jpayne@68
|
34 .sp
|
jpayne@68
|
35 The Kerberos kadmind(8) daemon uses an Access Control List
|
jpayne@68
|
36 (ACL) file to manage access rights to the Kerberos database.
|
jpayne@68
|
37 For operations that affect principals, the ACL file also controls
|
jpayne@68
|
38 which principals can operate on which other principals.
|
jpayne@68
|
39 .sp
|
jpayne@68
|
40 The default location of the Kerberos ACL file is
|
jpayne@68
|
41 \fB/mnt/c/Users/crash/Documents/BobLiterman/CSP2_Galaxy/CSP2/CSP2_env/env-d9b9114564458d9d-741b3de822f2aaca6c6caa4325c4afce/var\fP\fB/krb5kdc\fP\fB/kadm5.acl\fP unless this is overridden by the \fIacl_file\fP
|
jpayne@68
|
42 variable in kdc.conf(5)\&.
|
jpayne@68
|
43 .SH SYNTAX
|
jpayne@68
|
44 .sp
|
jpayne@68
|
45 Empty lines and lines starting with the sharp sign (\fB#\fP) are
|
jpayne@68
|
46 ignored. Lines containing ACL entries have the format:
|
jpayne@68
|
47 .INDENT 0.0
|
jpayne@68
|
48 .INDENT 3.5
|
jpayne@68
|
49 .sp
|
jpayne@68
|
50 .nf
|
jpayne@68
|
51 .ft C
|
jpayne@68
|
52 principal permissions [target_principal [restrictions] ]
|
jpayne@68
|
53 .ft P
|
jpayne@68
|
54 .fi
|
jpayne@68
|
55 .UNINDENT
|
jpayne@68
|
56 .UNINDENT
|
jpayne@68
|
57 .sp
|
jpayne@68
|
58 \fBNOTE:\fP
|
jpayne@68
|
59 .INDENT 0.0
|
jpayne@68
|
60 .INDENT 3.5
|
jpayne@68
|
61 Line order in the ACL file is important. The first matching entry
|
jpayne@68
|
62 will control access for an actor principal on a target principal.
|
jpayne@68
|
63 .UNINDENT
|
jpayne@68
|
64 .UNINDENT
|
jpayne@68
|
65 .INDENT 0.0
|
jpayne@68
|
66 .TP
|
jpayne@68
|
67 .B \fIprincipal\fP
|
jpayne@68
|
68 (Partially or fully qualified Kerberos principal name.) Specifies
|
jpayne@68
|
69 the principal whose permissions are to be set.
|
jpayne@68
|
70 .sp
|
jpayne@68
|
71 Each component of the name may be wildcarded using the \fB*\fP
|
jpayne@68
|
72 character.
|
jpayne@68
|
73 .TP
|
jpayne@68
|
74 .B \fIpermissions\fP
|
jpayne@68
|
75 Specifies what operations may or may not be performed by a
|
jpayne@68
|
76 \fIprincipal\fP matching a particular entry. This is a string of one or
|
jpayne@68
|
77 more of the following list of characters or their upper\-case
|
jpayne@68
|
78 counterparts. If the character is \fIupper\-case\fP, then the operation
|
jpayne@68
|
79 is disallowed. If the character is \fIlower\-case\fP, then the operation
|
jpayne@68
|
80 is permitted.
|
jpayne@68
|
81 .TS
|
jpayne@68
|
82 center;
|
jpayne@68
|
83 |l|l|.
|
jpayne@68
|
84 _
|
jpayne@68
|
85 T{
|
jpayne@68
|
86 a
|
jpayne@68
|
87 T} T{
|
jpayne@68
|
88 [Dis]allows the addition of principals or policies
|
jpayne@68
|
89 T}
|
jpayne@68
|
90 _
|
jpayne@68
|
91 T{
|
jpayne@68
|
92 c
|
jpayne@68
|
93 T} T{
|
jpayne@68
|
94 [Dis]allows the changing of passwords for principals
|
jpayne@68
|
95 T}
|
jpayne@68
|
96 _
|
jpayne@68
|
97 T{
|
jpayne@68
|
98 d
|
jpayne@68
|
99 T} T{
|
jpayne@68
|
100 [Dis]allows the deletion of principals or policies
|
jpayne@68
|
101 T}
|
jpayne@68
|
102 _
|
jpayne@68
|
103 T{
|
jpayne@68
|
104 e
|
jpayne@68
|
105 T} T{
|
jpayne@68
|
106 [Dis]allows the extraction of principal keys
|
jpayne@68
|
107 T}
|
jpayne@68
|
108 _
|
jpayne@68
|
109 T{
|
jpayne@68
|
110 i
|
jpayne@68
|
111 T} T{
|
jpayne@68
|
112 [Dis]allows inquiries about principals or policies
|
jpayne@68
|
113 T}
|
jpayne@68
|
114 _
|
jpayne@68
|
115 T{
|
jpayne@68
|
116 l
|
jpayne@68
|
117 T} T{
|
jpayne@68
|
118 [Dis]allows the listing of all principals or policies
|
jpayne@68
|
119 T}
|
jpayne@68
|
120 _
|
jpayne@68
|
121 T{
|
jpayne@68
|
122 m
|
jpayne@68
|
123 T} T{
|
jpayne@68
|
124 [Dis]allows the modification of principals or policies
|
jpayne@68
|
125 T}
|
jpayne@68
|
126 _
|
jpayne@68
|
127 T{
|
jpayne@68
|
128 p
|
jpayne@68
|
129 T} T{
|
jpayne@68
|
130 [Dis]allows the propagation of the principal database (used in incr_db_prop)
|
jpayne@68
|
131 T}
|
jpayne@68
|
132 _
|
jpayne@68
|
133 T{
|
jpayne@68
|
134 s
|
jpayne@68
|
135 T} T{
|
jpayne@68
|
136 [Dis]allows the explicit setting of the key for a principal
|
jpayne@68
|
137 T}
|
jpayne@68
|
138 _
|
jpayne@68
|
139 T{
|
jpayne@68
|
140 x
|
jpayne@68
|
141 T} T{
|
jpayne@68
|
142 Short for admcilsp. All privileges (except \fBe\fP)
|
jpayne@68
|
143 T}
|
jpayne@68
|
144 _
|
jpayne@68
|
145 T{
|
jpayne@68
|
146 *
|
jpayne@68
|
147 T} T{
|
jpayne@68
|
148 Same as x.
|
jpayne@68
|
149 T}
|
jpayne@68
|
150 _
|
jpayne@68
|
151 .TE
|
jpayne@68
|
152 .UNINDENT
|
jpayne@68
|
153 .sp
|
jpayne@68
|
154 \fBNOTE:\fP
|
jpayne@68
|
155 .INDENT 0.0
|
jpayne@68
|
156 .INDENT 3.5
|
jpayne@68
|
157 The \fBextract\fP privilege is not included in the wildcard
|
jpayne@68
|
158 privilege; it must be explicitly assigned. This privilege
|
jpayne@68
|
159 allows the user to extract keys from the database, and must be
|
jpayne@68
|
160 handled with great care to avoid disclosure of important keys
|
jpayne@68
|
161 like those of the kadmin/* or krbtgt/* principals. The
|
jpayne@68
|
162 \fBlockdown_keys\fP principal attribute can be used to prevent
|
jpayne@68
|
163 key extraction from specific principals regardless of the
|
jpayne@68
|
164 granted privilege.
|
jpayne@68
|
165 .UNINDENT
|
jpayne@68
|
166 .UNINDENT
|
jpayne@68
|
167 .INDENT 0.0
|
jpayne@68
|
168 .TP
|
jpayne@68
|
169 .B \fItarget_principal\fP
|
jpayne@68
|
170 (Optional. Partially or fully qualified Kerberos principal name.)
|
jpayne@68
|
171 Specifies the principal on which \fIpermissions\fP may be applied.
|
jpayne@68
|
172 Each component of the name may be wildcarded using the \fB*\fP
|
jpayne@68
|
173 character.
|
jpayne@68
|
174 .sp
|
jpayne@68
|
175 \fItarget_principal\fP can also include back\-references to \fIprincipal\fP,
|
jpayne@68
|
176 in which \fB*number\fP matches the corresponding wildcard in
|
jpayne@68
|
177 \fIprincipal\fP\&.
|
jpayne@68
|
178 .TP
|
jpayne@68
|
179 .B \fIrestrictions\fP
|
jpayne@68
|
180 (Optional) A string of flags. Allowed restrictions are:
|
jpayne@68
|
181 .INDENT 7.0
|
jpayne@68
|
182 .INDENT 3.5
|
jpayne@68
|
183 .INDENT 0.0
|
jpayne@68
|
184 .TP
|
jpayne@68
|
185 .B {+|\-}\fIflagname\fP
|
jpayne@68
|
186 flag is forced to the indicated value. The permissible flags
|
jpayne@68
|
187 are the same as those for the \fBdefault_principal_flags\fP
|
jpayne@68
|
188 variable in kdc.conf(5)\&.
|
jpayne@68
|
189 .TP
|
jpayne@68
|
190 .B \fI\-clearpolicy\fP
|
jpayne@68
|
191 policy is forced to be empty.
|
jpayne@68
|
192 .TP
|
jpayne@68
|
193 .B \fI\-policy pol\fP
|
jpayne@68
|
194 policy is forced to be \fIpol\fP\&.
|
jpayne@68
|
195 .TP
|
jpayne@68
|
196 .B \-{\fIexpire, pwexpire, maxlife, maxrenewlife\fP} \fItime\fP
|
jpayne@68
|
197 (getdate string) associated value will be forced to
|
jpayne@68
|
198 MIN(\fItime\fP, requested value).
|
jpayne@68
|
199 .UNINDENT
|
jpayne@68
|
200 .UNINDENT
|
jpayne@68
|
201 .UNINDENT
|
jpayne@68
|
202 .sp
|
jpayne@68
|
203 The above flags act as restrictions on any add or modify operation
|
jpayne@68
|
204 which is allowed due to that ACL line.
|
jpayne@68
|
205 .UNINDENT
|
jpayne@68
|
206 .sp
|
jpayne@68
|
207 \fBWARNING:\fP
|
jpayne@68
|
208 .INDENT 0.0
|
jpayne@68
|
209 .INDENT 3.5
|
jpayne@68
|
210 If the kadmind ACL file is modified, the kadmind daemon needs to be
|
jpayne@68
|
211 restarted for changes to take effect.
|
jpayne@68
|
212 .UNINDENT
|
jpayne@68
|
213 .UNINDENT
|
jpayne@68
|
214 .SH EXAMPLE
|
jpayne@68
|
215 .sp
|
jpayne@68
|
216 Here is an example of a kadm5.acl file:
|
jpayne@68
|
217 .INDENT 0.0
|
jpayne@68
|
218 .INDENT 3.5
|
jpayne@68
|
219 .sp
|
jpayne@68
|
220 .nf
|
jpayne@68
|
221 .ft C
|
jpayne@68
|
222 */admin@ATHENA.MIT.EDU * # line 1
|
jpayne@68
|
223 joeadmin@ATHENA.MIT.EDU ADMCIL # line 2
|
jpayne@68
|
224 joeadmin/*@ATHENA.MIT.EDU i */root@ATHENA.MIT.EDU # line 3
|
jpayne@68
|
225 */root@ATHENA.MIT.EDU ci *1@ATHENA.MIT.EDU # line 4
|
jpayne@68
|
226 */root@ATHENA.MIT.EDU l * # line 5
|
jpayne@68
|
227 sms@ATHENA.MIT.EDU x * \-maxlife 9h \-postdateable # line 6
|
jpayne@68
|
228 .ft P
|
jpayne@68
|
229 .fi
|
jpayne@68
|
230 .UNINDENT
|
jpayne@68
|
231 .UNINDENT
|
jpayne@68
|
232 .sp
|
jpayne@68
|
233 (line 1) Any principal in the \fBATHENA.MIT.EDU\fP realm with an
|
jpayne@68
|
234 \fBadmin\fP instance has all administrative privileges except extracting
|
jpayne@68
|
235 keys.
|
jpayne@68
|
236 .sp
|
jpayne@68
|
237 (lines 1\-3) The user \fBjoeadmin\fP has all permissions except
|
jpayne@68
|
238 extracting keys with his \fBadmin\fP instance,
|
jpayne@68
|
239 \fBjoeadmin/admin@ATHENA.MIT.EDU\fP (matches line 1). He has no
|
jpayne@68
|
240 permissions at all with his null instance, \fBjoeadmin@ATHENA.MIT.EDU\fP
|
jpayne@68
|
241 (matches line 2). His \fBroot\fP and other non\-\fBadmin\fP, non\-null
|
jpayne@68
|
242 instances (e.g., \fBextra\fP or \fBdbadmin\fP) have inquire permissions
|
jpayne@68
|
243 with any principal that has the instance \fBroot\fP (matches line 3).
|
jpayne@68
|
244 .sp
|
jpayne@68
|
245 (line 4) Any \fBroot\fP principal in \fBATHENA.MIT.EDU\fP can inquire
|
jpayne@68
|
246 or change the password of their null instance, but not any other
|
jpayne@68
|
247 null instance. (Here, \fB*1\fP denotes a back\-reference to the
|
jpayne@68
|
248 component matching the first wildcard in the actor principal.)
|
jpayne@68
|
249 .sp
|
jpayne@68
|
250 (line 5) Any \fBroot\fP principal in \fBATHENA.MIT.EDU\fP can generate
|
jpayne@68
|
251 the list of principals in the database, and the list of policies
|
jpayne@68
|
252 in the database. This line is separate from line 4, because list
|
jpayne@68
|
253 permission can only be granted globally, not to specific target
|
jpayne@68
|
254 principals.
|
jpayne@68
|
255 .sp
|
jpayne@68
|
256 (line 6) Finally, the Service Management System principal
|
jpayne@68
|
257 \fBsms@ATHENA.MIT.EDU\fP has all permissions except extracting keys, but
|
jpayne@68
|
258 any principal that it creates or modifies will not be able to get
|
jpayne@68
|
259 postdateable tickets or tickets with a life of longer than 9 hours.
|
jpayne@68
|
260 .SH MODULE BEHAVIOR
|
jpayne@68
|
261 .sp
|
jpayne@68
|
262 The ACL file can coexist with other authorization modules in release
|
jpayne@68
|
263 1.16 and later, as configured in the kadm5_auth section of
|
jpayne@68
|
264 krb5.conf(5)\&. The ACL file will positively authorize
|
jpayne@68
|
265 operations according to the rules above, but will never
|
jpayne@68
|
266 authoritatively deny an operation, so other modules can authorize
|
jpayne@68
|
267 operations in addition to those authorized by the ACL file.
|
jpayne@68
|
268 .sp
|
jpayne@68
|
269 To operate without an ACL file, set the \fIacl_file\fP variable in
|
jpayne@68
|
270 kdc.conf(5) to the empty string with \fBacl_file = ""\fP\&.
|
jpayne@68
|
271 .SH SEE ALSO
|
jpayne@68
|
272 .sp
|
jpayne@68
|
273 kdc.conf(5), kadmind(8)
|
jpayne@68
|
274 .SH AUTHOR
|
jpayne@68
|
275 MIT
|
jpayne@68
|
276 .SH COPYRIGHT
|
jpayne@68
|
277 1985-2022, MIT
|
jpayne@68
|
278 .\" Generated by docutils manpage writer.
|
jpayne@68
|
279 .
|