Provided by: krb5-doc_1.12+dfsg-2ubuntu5.4_all bug

NAME

       krb5.conf - Kerberos configuration file

       The krb5.conf file contains Kerberos configuration information, including the locations of KDCs and admin
       servers  for  the  Kerberos  realms  of  interest,  defaults  for  the  current  realm  and  for Kerberos
       applications, and mappings of  hostnames  onto  Kerberos  realms.   Normally,  you  should  install  your
       krb5.conf  file  in the directory /etc.  You can override the default location by setting the environment
       variable KRB5_CONFIG.

STRUCTURE

       The krb5.conf file is set up in the style of a Windows INI file.  Sections  are  headed  by  the  section
       name, in square brackets.  Each section may contain zero or more relations, of the form:

          foo = bar

       or

              fubar = {
                  foo = bar
                  baz = quux
              }

       Placing  a  '*' at the end of a line indicates that this is the final value for the tag.  This means that
       neither the remainder of this configuration file nor any other configuration file will be checked for any
       other values for this tag.

       For example, if you have the following lines:

              foo = bar*
              foo = baz

       then the second value of foo (baz) would never be read.

       The krb5.conf file can include other files using either of the following directives at the beginning of a
       line:

          include FILENAME
          includedir DIRNAME

       FILENAME or DIRNAME should be an absolute path. The named file or directory must exist and  be  readable.
       Including  a directory includes all files within the directory whose names consist solely of alphanumeric
       characters, dashes, or underscores.  Included  profile  files  are  syntactically  independent  of  their
       parents, so each included file must begin with a section header.

       The  krb5.conf file can specify that configuration should be obtained from a loadable module, rather than
       the file itself, using the following directive at the beginning of a line before any section headers:

          module MODULEPATH:RESIDUAL

       MODULEPATH may be relative to the library path of the krb5 installation, or it may be an  absolute  path.
       RESIDUAL  is  provided  to  the  module  at  initialization  time.  If krb5.conf uses a module directive,
       kdc.conf(5) should also use one if it exists.

SECTIONS

       The krb5.conf file may contain the following sections:
                              ──────────────────────────────────────────────────────────
                                [libdefaults]    Settings  used  by  the  Kerberos  V5
                                                 library
                              ──────────────────────────────────────────────────────────
                                [realms]         Realm-specific   contact  information
                                                 and settings
                              ──────────────────────────────────────────────────────────
                                [domain_realm]   Maps  server  hostnames  to  Kerberos
                                                 realms
                              ──────────────────────────────────────────────────────────
                                [capaths]        Authentication        paths       for
                                                 non-hierarchical cross-realm
                              ──────────────────────────────────────────────────────────
                                [appdefaults]    Settings used  by  some  Kerberos  V5
                                                 applications
                              ──────────────────────────────────────────────────────────
                                [plugins]        Controls plugin module registration
                              ┌────────────────┬───────────────────────────────────────┐
                              │                │                                       │
--

PKINIT OPTIONS

       Note   The following are PKINIT-specific options.  These values may  be  specified  in  [libdefaults]  as
              global  defaults,  or  within a realm-specific subsection of [libdefaults], or may be specified as
              realm-specific values in the [realms] section.  A realm-specific value overrides, not adds  to,  a
              generic [libdefaults] specification.  The search order is:

       1. realm-specific subsection of [libdefaults]:

             [libdefaults]
                 EXAMPLE.COM = {
                     pkinit_anchors = FILE:/usr/local/example.com.crt
                 }

       2. realm-specific value in the [realms] section,

             [realms]
                 OTHERREALM.ORG = {
                     pkinit_anchors = FILE:/usr/local/otherrealm.org.crt
                 }

       3. generic value in the [libdefaults] section.

             [libdefaults]
                 pkinit_anchors = DIR:/usr/local/generic_trusted_cas/

   Specifying PKINIT identity information
       The  syntax  for  specifying  Public  Key  identity,  trust,  and revocation information for PKINIT is as
       follows:

       FILE:filename[,keyfilename]
              This option has context-specific behavior.

              In pkinit_identity or  pkinit_identities,  filename  specifies  the  name  of  a  PEM-format  file
              containing  the  user's  certificate.   If keyfilename is not specified, the user's private key is
              expected to be in filename as well.  Otherwise, keyfilename is the name of the file containing the
              private key.

              In pkinit_anchors or pkinit_pool, filename is assumed to be the name of an OpenSSL-style ca-bundle
              file.

       DIR:dirname
              This option has context-specific behavior.

              In pkinit_identity or pkinit_identities, dirname specifies a directory with files named *.crt  and
              *.key  where  the  first  part  of the file name is the same for matching pairs of certificate and
              private key files.  When a file with a name ending with .crt is found, a matching file ending with
              .key is assumed to contain the private key.  If no such file is found, then the certificate in the
              .crt is not used.

              In pkinit_anchors or pkinit_pool, dirname is assumed to be an OpenSSL-style  hashed  CA  directory
              where  each  CA  cert  is  stored  in  a  file  named  hash-of-ca-cert.#.   This infrastructure is
              encouraged, but all files in the directory will be examined and if they contain  certificates  (in
              PEM format), they will be used.

              In  pkinit_revoke,  dirname  is  assumed  to  be  an  OpenSSL-style hashed CA directory where each
              revocation list is stored in a file named hash-of-ca-cert.r#.  This infrastructure is  encouraged,
              but  all  files  in  the  directory will be examined and if they contain a revocation list (in PEM
              format), they will be used.

       PKCS12:filename
              filename is the name of a PKCS #12 format file, containing the user's certificate and private key.

       PKCS11:[module_name=]modname[:slotid=slot-id][:token=token-label][:certid=cert-id][:certlabel=cert-label]
              All keyword/values are optional.  modname specifies the location of a  library  implementing  PKCS
              #11.   If  a  value  is  encountered  with  no  keyword,  it  is assumed to be the modname.  If no
              module-name is specified, the default is opensc-pkcs11.so.  slotid= and/or token= may be specified
              to force the use of a particular smard card reader or token if there is more than  one  available.
              certid=  and/or  certlabel= may be specified to force the selection of a particular certificate on
              the device.  See the pkinit_cert_match configuration option for more ways to select  a  particular
              certificate to use for PKINIT.

       ENV:envvar
              envvar  specifies  the name of an environment variable which has been set to a value conforming to
              one of the previous values.  For example, ENV:X509_PROXY, where  environment  variable  X509_PROXY
              has been set to FILE:/tmp/my_proxy.pem.

   PKINIT krb5.conf options
       pkinit_anchors
              Specifies  the  location of trusted anchor (root) certificates which the client trusts to sign KDC
              certificates.  This option may be specified multiple times.  These values from the config file are
              not used if the user specifies X509_anchors on the command line.

       pkinit_cert_match
              Specifies matching rules that the client certificate must match  before  it  is  used  to  attempt
              PKINIT  authentication.   If  a  user has multiple certificates available (on a smart card, or via
              other  media),  there  must  be  exactly  one  certificate   chosen   before   attempting   PKINIT
              authentication.   This option may be specified multiple times.  All the available certificates are
              checked against each rule in order until there is a match of exactly one certificate.

              The Subject and Issuer comparison strings  are  the  RFC  2253  string  representations  from  the
              certificate Subject DN and Issuer DN values.

              The syntax of the matching rules is:
                 [relation-operator]component-rule ...

              where:

              relation-operator
                     can be either &&, meaning all component rules must match, or ||, meaning only one component
                     rule must match.  The default is &&.

              component-rule
                     can  be  one  of  the  following.   Note that there is no punctuation or whitespace between
                     component rules.
                        <SUBJECT>regular-expression
                        <ISSUER>regular-expression
                        <SAN>regular-expression
                        <EKU>extended-key-usage-list
                        <KU>key-usage-list

                     extended-key-usage-list is a comma-separated list of required Extended  Key  Usage  values.
                     All  values  in the list must be present in the certificate.  Extended Key Usage values can
                     be:

                     • pkinit

                     • msScLogin

                     • clientAuth

                     • emailProtection

                     key-usage-list is a comma-separated list of required Key Usage values.  All values  in  the
                     list must be present in the certificate.  Key Usage values can be:

                     • digitalSignature

                     • keyEncipherment

              Examples:

                 pkinit_cert_match = ||<SUBJECT>.*DoE.*<SAN>.*@EXAMPLE.COM
                 pkinit_cert_match = &&<EKU>msScLogin,clientAuth<ISSUER>.*DoE.*
                 pkinit_cert_match = <EKU>msScLogin,clientAuth<KU>digitalSignature

       pkinit_eku_checking
              This  option  specifies  what Extended Key Usage value the KDC certificate presented to the client
              must contain.  (Note that if the KDC certificate has the pkinit SubjectAlternativeName encoded  as
              the  Kerberos TGS name, EKU checking is not necessary since the issuing CA has certified this as a
              KDC certificate.)  The values recognized in the krb5.conf file are:

              kpKDC  This is the default value and specifies that the KDC must have the id-pkinit-KPKdc  EKU  as
                     defined in RFC 4556.

              kpServerAuth
                     If  kpServerAuth  is  specified, a KDC certificate with the id-kp-serverAuth EKU as used by
                     Microsoft will be accepted.

              none   If none is specified, then the KDC certificate will not be checked  to  verify  it  has  an
                     acceptable EKU.  The use of this option is not recommended.

       pkinit_dh_min_bits
              Specifies  the  size  of  the  Diffie-Hellman  key the client will attempt to use.  The acceptable
              values are 1024, 2048, and 4096.  The default is 2048.

       pkinit_identities
              Specifies the location(s) to be used to find the user's X.509 identity information.   This  option
              may  be  specified multiple times.  Each value is attempted in order until identity information is
              found and authentication is attempted.  Note that these values are not used if the user  specifies
              X509_user_identity on the command line.

       pkinit_kdc_hostname
              The  presense of this option indicates that the client is willing to accept a KDC certificate with
              a dNSName SAN (Subject Alternative Name) rather than requiring the id-pkinit-san as defined in RFC
              4556.  This option may be specified multiple times.   Its  value  should  contain  the  acceptable
              hostname for the KDC (as contained in its certificate).

       pkinit_longhorn
              If this flag is set to true, we are talking to the Longhorn KDC.

       pkinit_pool
              Specifies  the  location  of intermediate certificates which may be used by the client to complete
              the trust chain between a KDC certificate and a trusted anchor.   This  option  may  be  specified
              multiple times.

       pkinit_require_crl_checking
              The   default  certificate  verification  process  will  always  check  the  available  revocation
              information to see if a certificate has been revoked.  If a match is found for the certificate  in
              a  CRL, verification fails.  If the certificate being verified is not listed in a CRL, or there is
              no CRL present for its issuing CA, and pkinit_require_crl_checking  is  false,  then  verification
              succeeds.

              However,  if pkinit_require_crl_checking is true and there is no CRL information available for the
              issuing CA, then verification fails.

              pkinit_require_crl_checking should be set to true if the policy is such that up-to-date CRLs  must
              be present for every CA.

       pkinit_revoke
              Specifies  the  location of Certificate Revocation List (CRL) information to be used by the client
              when verifying the validity of the KDC  certificate  presented.   This  option  may  be  specified
              multiple times.

       pkinit_win2k
              This  flag  specifies whether the target realm is assumed to support only the old, pre-RFC version
              of the protocol.  The default is false.

       pkinit_win2k_require_binding
              If this flag is set to true, it expects that the target KDC is patched to return a  reply  with  a
              checksum rather than a nonce.  The default is false.

PARAMETER EXPANSION

       Starting  with  release  1.11,  several  variables,  such  as default_keytab_name, allow parameters to be
       expanded.  Valid parameters are:
                              ─────────────────────────────────────────────────────────────
                                %{TEMP}             Temporary directory
                              ─────────────────────────────────────────────────────────────
                                %{uid}              Unix real UID or Windows SID
                              ─────────────────────────────────────────────────────────────
                                %{euid}             Unix effective user ID or Windows SID
                              ─────────────────────────────────────────────────────────────
                                %{USERID}           Same as %{uid}
                              ─────────────────────────────────────────────────────────────
                                %{null}             Empty string
                              ─────────────────────────────────────────────────────────────
                                %{LIBDIR}           Installation library directory
                              ─────────────────────────────────────────────────────────────
                                %{BINDIR}           Installation binary directory
                              ─────────────────────────────────────────────────────────────
                                %{SBINDIR}          Installation admin binary directory
                              ─────────────────────────────────────────────────────────────
                                %{username}         (Unix) Username of effective user ID
                              ─────────────────────────────────────────────────────────────
                                %{APPDATA}          (Windows)  Roaming  application  data
                                                    for current user
                              ─────────────────────────────────────────────────────────────
                                %{COMMON_APPDATA}   (Windows)  Application  data  for all
                                                    users
                              ─────────────────────────────────────────────────────────────
                                %{LOCAL_APPDATA}    (Windows) Local application data  for
                                                    current user
                              ─────────────────────────────────────────────────────────────
                                %{SYSTEM}           (Windows) Windows system folder
                              ─────────────────────────────────────────────────────────────
                                %{WINDOWS}          (Windows) Windows folder
                              ─────────────────────────────────────────────────────────────
                                %{USERCONFIG}       (Windows)  Per-user  MIT  krb5 config
                                                    file directory
                              ─────────────────────────────────────────────────────────────
                                %{COMMONCONFIG}     (Windows) Common MIT krb5 config file
                                                    directory
                              ┌───────────────────┬───────────────────────────────────────┐
                              │                   │                                       │
SAMPLE KRB5.CONF FILE         │                   │                                       │
--

FILES

       /etc/krb5.conf

SEE ALSO

       syslog(3)

AUTHOR

       MIT

COPYRIGHT

       1985-2013, MIT

1.12                                                                                                KRB5.CONF(5)