Provided by: krb5-admin-server_1.13.2+dfsg-5ubuntu2.2_amd64 

NAME
kadm5.acl - Kerberos ACL file
DESCRIPTION
The Kerberos kadmind(8) daemon uses an Access Control List (ACL) file to manage access rights to the
Kerberos database. For operations that affect principals, the ACL file also controls which principals
can operate on which other principals.
The default location of the Kerberos ACL file is /etc/krb5kdc/kadm5.acl unless this is overridden by the
acl_file variable in kdc.conf(5).
SYNTAX
Empty lines and lines starting with the sharp sign (#) are ignored. Lines containing ACL entries have
the format:
principal permissions [target_principal [restrictions] ]
NOTE:
Line order in the ACL file is important. The first matching entry will control access for an actor
principal on a target principal.
principal
(Partially or fully qualified Kerberos principal name.) Specifies the principal whose permissions
are to be set.
Each component of the name may be wildcarded using the * character.
permissions
Specifies what operations may or may not be performed by a principal matching a particular entry.
This is a string of one or more of the following list of characters or their upper-case
counterparts. If the character is upper-case, then the operation is disallowed. If the character
is lower-case, then the operation is permitted.
┌───┬───────────────────────────────────────┐
│ a │ [Dis]allows the addition of │
│ │ principals or policies │
├───┼───────────────────────────────────────┤
│ c │ [Dis]allows the changing of passwords │
│ │ for principals │
├───┼───────────────────────────────────────┤
│ d │ [Dis]allows the deletion of │
│ │ principals or policies │
├───┼───────────────────────────────────────┤
│ i │ [Dis]allows inquiries about │
│ │ principals or policies │
├───┼───────────────────────────────────────┤
│ l │ [Dis]allows the listing of all │
│ │ principals or policies │
├───┼───────────────────────────────────────┤
│ m │ [Dis]allows the modification of │
│ │ principals or policies │
├───┼───────────────────────────────────────┤
│ p │ [Dis]allows the propagation of the │
│ │ principal database (used in │
│ │ incr_db_prop) │
├───┼───────────────────────────────────────┤
│ s │ [Dis]allows the explicit setting of │
│ │ the key for a principal │
├───┼───────────────────────────────────────┤
│ x │ Short for admcilsp. All privileges │
├───┼───────────────────────────────────────┤
│ * │ Same as x. │
└───┴───────────────────────────────────────┘
target_principal
(Optional. Partially or fully qualified Kerberos principal name.) Specifies the principal on
which permissions may be applied. Each component of the name may be wildcarded using the *
character.
target_principal can also include back-references to principal, in which *number matches the
corresponding wildcard in principal.
restrictions
(Optional) A string of flags. Allowed restrictions are:
{+|-}flagname
flag is forced to the indicated value. The permissible flags are the same as those for
the default_principal_flags variable in kdc.conf(5).
-clearpolicy
policy is forced to be empty.
-policy pol
policy is forced to be pol.
-{expire, pwexpire, maxlife, maxrenewlife} time
(getdate string) associated value will be forced to MIN(time, requested value).
The above flags act as restrictions on any add or modify operation which is allowed due to that
ACL line.
WARNING:
If the kadmind ACL file is modified, the kadmind daemon needs to be restarted for changes to take
effect.
EXAMPLE
Here is an example of a kadm5.acl file:
*/admin@ATHENA.MIT.EDU * # line 1
joeadmin@ATHENA.MIT.EDU ADMCIL # line 2
joeadmin/*@ATHENA.MIT.EDU i */root@ATHENA.MIT.EDU # line 3
*/root@ATHENA.MIT.EDU ci *1@ATHENA.MIT.EDU # line 4
*/root@ATHENA.MIT.EDU l * # line 5
sms@ATHENA.MIT.EDU x * -maxlife 9h -postdateable # line 6
(line 1) Any principal in the ATHENA.MIT.EDU realm with an admin instance has all administrative
privileges.
(lines 1-3) The user joeadmin has all permissions with his admin instance, joeadmin/admin@ATHENA.MIT.EDU
(matches line 1). He has no permissions at all with his null instance, joeadmin@ATHENA.MIT.EDU (matches
line 2). His root and other non-admin, non-null instances (e.g., extra or dbadmin) have inquire
permissions with any principal that has the instance root (matches line 3).
(line 4) Any root principal in ATHENA.MIT.EDU can inquire or change the password of their null instance,
but not any other null instance. (Here, *1 denotes a back-reference to the component matching the first
wildcard in the actor principal.)
(line 5) Any root principal in ATHENA.MIT.EDU can generate the list of principals in the database, and
the list of policies in the database. This line is separate from line 4, because list permission can
only be granted globally, not to specific target principals.
(line 6) Finally, the Service Management System principal sms@ATHENA.MIT.EDU has all permissions, but any
principal that it creates or modifies will not be able to get postdateable tickets or tickets with a life
of longer than 9 hours.
SEE ALSO
kdc.conf(5), kadmind(8)
AUTHOR
MIT
COPYRIGHT
1985-2015, MIT
1.13.2 KADM5.ACL(5)