Provided by: krb5-doc_1.21.3-4ubuntu2_all bug

NAME

       krb5.conf - Kerberos configuration file

       The krb5.conf file contains Kerberos configuration information, including the locations of KDCs and admin
       servers  for  the  Kerberos  realms  of  interest,  defaults  for  the  current  realm  and  for Kerberos
       applications, and mappings of  hostnames  onto  Kerberos  realms.   Normally,  you  should  install  your
       krb5.conf  file  in the directory /etc.  You can override the default location by setting the environment
       variable KRB5_CONFIG.  Multiple colon-separated filenames may be  specified  in  KRB5_CONFIG;  all  files
       which  are  present  will  be  read.   Starting in release 1.14, directory names can also be specified in
       KRB5_CONFIG; all files within the directory  whose  names  consist  solely  of  alphanumeric  characters,
       dashes, or underscores will be read.

STRUCTURE

       The  krb5.conf  file  is  set  up  in  the  style of a Windows INI file.  Lines beginning with '#' or ';'
       (possibly after initial whitespace) are ignored as comments.  Sections are headed by the section name, in
       square brackets.  Each section may contain zero or more relations, of the form:

          foo = bar

       or:

          fubar = {
              foo = bar
              baz = quux
          }

       Placing a '*' after the closing bracket of a section name indicates that the section  is  final,  meaning
       that  if  the  same  section appears within a later file specified in KRB5_CONFIG, it will be ignored.  A
       subsection can be marked as final by placing a '*' after either the tag name or the closing brace.

       The krb5.conf file can include other files using either of the following directives at the beginning of a
       line:

          include FILENAME
          includedir DIRNAME

       FILENAME or DIRNAME should be an absolute path. The named file or directory must exist and  be  readable.
       Including  a directory includes all files within the directory whose names consist solely of alphanumeric
       characters, dashes, or underscores.  Starting in release 1.15, files with names  ending  in  ".conf"  are
       also  included, unless the name begins with ".".  Included profile files are syntactically independent of
       their parents, so each included file must begin with a section header.  Starting in release  1.17,  files
       are read in alphanumeric order; in previous releases, they may be read in any order.

       The  krb5.conf file can specify that configuration should be obtained from a loadable module, rather than
       the file itself, using the following directive at the beginning of a line before any section headers:

          module MODULEPATH:RESIDUAL

       MODULEPATH may be relative to the library path of the krb5 installation, or it may be an  absolute  path.
       RESIDUAL  is  provided  to  the  module  at  initialization  time.  If krb5.conf uses a module directive,
       kdc.conf(5) should also use one if it exists.

SECTIONS

       The krb5.conf file may contain the following sections:
                              ──────────────────────────────────────────────────────────
                                [libdefaults]    Settings  used  by  the  Kerberos  V5
                                                 library
                              ──────────────────────────────────────────────────────────
                                [realms]         Realm-specific   contact  information
                                                 and settings
                              ──────────────────────────────────────────────────────────
                                [domain_realm]   Maps  server  hostnames  to  Kerberos
                                                 realms
                              ──────────────────────────────────────────────────────────
                                [capaths]        Authentication        paths       for
                                                 non-hierarchical cross-realm
                              ──────────────────────────────────────────────────────────
                                [appdefaults]    Settings used  by  some  Kerberos  V5
                                                 applications
                              ──────────────────────────────────────────────────────────
                                [plugins]        Controls plugin module registration
                              ┌────────────────┬───────────────────────────────────────┐
                              │                │                                       │
--

PKINIT OPTIONS

       NOTE:
          The  following  are PKINIT-specific options.  These values may be specified in [libdefaults] as global
          defaults,  or  within  a  realm-specific  subsection  of  [libdefaults],  or  may  be   specified   as
          realm-specific  values  in  the  [realms]  section.   A realm-specific value overrides, not adds to, a
          generic [libdefaults] specification.  The search order is:

       1. realm-specific subsection of [libdefaults]:

             [libdefaults]
                 EXAMPLE.COM = {
                     pkinit_anchors = FILE:/usr/local/example.com.crt
                 }

       2. realm-specific value in the [realms] section:

             [realms]
                 OTHERREALM.ORG = {
                     pkinit_anchors = FILE:/usr/local/otherrealm.org.crt
                 }

       3. generic value in the [libdefaults] section:

             [libdefaults]
                 pkinit_anchors = DIR:/usr/local/generic_trusted_cas/

   Specifying PKINIT identity information
       The syntax for specifying Public Key identity,  trust,  and  revocation  information  for  PKINIT  is  as
       follows:

       FILE:filename[,keyfilename]
              This option has context-specific behavior.

              In  pkinit_identity  or  pkinit_identities,  filename  specifies  the  name  of  a PEM-format file
              containing the user's certificate.  If keyfilename is not specified, the  user's  private  key  is
              expected to be in filename as well.  Otherwise, keyfilename is the name of the file containing the
              private key.

              In pkinit_anchors or pkinit_pool, filename is assumed to be the name of an OpenSSL-style ca-bundle
              file.

       DIR:dirname
              This option has context-specific behavior.

              In  pkinit_identity or pkinit_identities, dirname specifies a directory with files named *.crt and
              *.key where the first part of the file name is the same for  matching  pairs  of  certificate  and
              private key files.  When a file with a name ending with .crt is found, a matching file ending with
              .key is assumed to contain the private key.  If no such file is found, then the certificate in the
              .crt is not used.

              In  pkinit_anchors  or  pkinit_pool, dirname is assumed to be an OpenSSL-style hashed CA directory
              where each CA  cert  is  stored  in  a  file  named  hash-of-ca-cert.#.   This  infrastructure  is
              encouraged,  but  all files in the directory will be examined and if they contain certificates (in
              PEM format), they will be used.

              In pkinit_revoke, dirname is assumed to  be  an  OpenSSL-style  hashed  CA  directory  where  each
              revocation  list is stored in a file named hash-of-ca-cert.r#.  This infrastructure is encouraged,
              but all files in the directory will be examined and if they contain  a  revocation  list  (in  PEM
              format), they will be used.

       PKCS12:filename
              filename is the name of a PKCS #12 format file, containing the user's certificate and private key.

       PKCS11:[module_name=]modname[:slotid=slot-id][:token=token-label][:certid=cert-id][:certlabel=cert-label]
              All  keyword/values  are  optional.  modname specifies the location of a library implementing PKCS
              #11.  If a value is encountered with no  keyword,  it  is  assumed  to  be  the  modname.   If  no
              module-name is specified, the default is opensc-pkcs11.so.  slotid= and/or token= may be specified
              to  force  the use of a particular smard card reader or token if there is more than one available.
              certid= and/or certlabel= may be specified to force the selection of a particular  certificate  on
              the  device.   See the pkinit_cert_match configuration option for more ways to select a particular
              certificate to use for PKINIT.

       ENV:envvar
              envvar specifies the name of an environment variable which has been set to a value  conforming  to
              one  of  the  previous values.  For example, ENV:X509_PROXY, where environment variable X509_PROXY
              has been set to FILE:/tmp/my_proxy.pem.

   PKINIT krb5.conf options
       pkinit_anchors
              Specifies the location of trusted anchor (root) certificates which the client trusts to  sign  KDC
              certificates.  This option may be specified multiple times.  These values from the config file are
              not used if the user specifies X509_anchors on the command line.

       pkinit_cert_match
              Specifies  matching  rules  that  the  client  certificate must match before it is used to attempt
              PKINIT authentication.  If a user has multiple certificates available (on a  smart  card,  or  via
              other   media),   there   must   be  exactly  one  certificate  chosen  before  attempting  PKINIT
              authentication.  This option may be specified multiple times.  All the available certificates  are
              checked against each rule in order until there is a match of exactly one certificate.

              The  Subject  and  Issuer  comparison  strings  are  the  RFC 2253 string representations from the
              certificate Subject DN and Issuer DN values.

              The syntax of the matching rules is:
                 [relation-operator]component-rule ...

              where:

              relation-operator
                     can be either &&, meaning all component rules must match, or ||, meaning only one component
                     rule must match.  The default is &&.

              component-rule
                     can be one of the following.  Note that there  is  no  punctuation  or  whitespace  between
                     component rules.
                        <SUBJECT>regular-expression
                        <ISSUER>regular-expression
                        <SAN>regular-expression
                        <EKU>extended-key-usage-list
                        <KU>key-usage-list

                     extended-key-usage-list  is  a  comma-separated list of required Extended Key Usage values.
                     All values in the list must be present in the certificate.  Extended Key Usage  values  can
                     be:

                     • pkinit

                     • msScLogin

                     • clientAuth

                     • emailProtection

                     key-usage-list  is  a comma-separated list of required Key Usage values.  All values in the
                     list must be present in the certificate.  Key Usage values can be:

                     • digitalSignature

                     • keyEncipherment

              Examples:

                 pkinit_cert_match = ||<SUBJECT>.*DoE.*<SAN>.*@EXAMPLE.COM
                 pkinit_cert_match = &&<EKU>msScLogin,clientAuth<ISSUER>.*DoE.*
                 pkinit_cert_match = <EKU>msScLogin,clientAuth<KU>digitalSignature

       pkinit_eku_checking
              This option specifies what Extended Key Usage value the KDC certificate presented  to  the  client
              must  contain.  (Note that if the KDC certificate has the pkinit SubjectAlternativeName encoded as
              the Kerberos TGS name, EKU checking is not necessary since the issuing CA has certified this as  a
              KDC certificate.)  The values recognized in the krb5.conf file are:

              kpKDC  This  is  the default value and specifies that the KDC must have the id-pkinit-KPKdc EKU as
                     defined in RFC 4556.

              kpServerAuth
                     If kpServerAuth is specified, a KDC certificate  with  the  id-kp-serverAuth  EKU  will  be
                     accepted.  This key usage value is used in most commercially issued server certificates.

              none   If  none  is  specified,  then  the KDC certificate will not be checked to verify it has an
                     acceptable EKU.  The use of this option is not recommended.

       pkinit_dh_min_bits
              Specifies the size of the Diffie-Hellman key the client  will  attempt  to  use.   The  acceptable
              values are 1024, 2048, and 4096.  The default is 2048.

       pkinit_identities
              Specifies  the  location(s)  to  be  used  to find the user's X.509 identity information.  If this
              option is specified multiple times, each value is attempted in order until certificates are found.
              Note that these values are not used if the user specifies X509_user_identity on the command line.

       pkinit_kdc_hostname
              The presence of this option indicates that the client is willing to accept a KDC certificate  with
              a dNSName SAN (Subject Alternative Name) rather than requiring the id-pkinit-san as defined in RFC
              4556.   This  option  may  be  specified  multiple times.  Its value should contain the acceptable
              hostname for the KDC (as contained in its certificate).

       pkinit_pool
              Specifies the location of intermediate certificates which may be used by the  client  to  complete
              the  trust  chain  between  a  KDC certificate and a trusted anchor.  This option may be specified
              multiple times.

       pkinit_require_crl_checking
              The  default  certificate  verification  process  will  always  check  the  available   revocation
              information  to see if a certificate has been revoked.  If a match is found for the certificate in
              a CRL, verification fails.  If the certificate being verified is not listed in a CRL, or there  is
              no  CRL  present  for  its issuing CA, and pkinit_require_crl_checking is false, then verification
              succeeds.

              However, if pkinit_require_crl_checking is true and there is no CRL information available for  the
              issuing CA, then verification fails.

              pkinit_require_crl_checking  should be set to true if the policy is such that up-to-date CRLs must
              be present for every CA.

       pkinit_revoke
              Specifies the location of Certificate Revocation List (CRL) information to be used by  the  client
              when  verifying  the  validity  of  the  KDC  certificate presented.  This option may be specified
              multiple times.

PARAMETER EXPANSION

       Starting with release 1.11, several variables,  such  as  default_keytab_name,  allow  parameters  to  be
       expanded.  Valid parameters are:
                              ─────────────────────────────────────────────────────────────
                                %{TEMP}             Temporary directory
                              ─────────────────────────────────────────────────────────────
                                %{uid}              Unix real UID or Windows SID
                              ─────────────────────────────────────────────────────────────
                                %{euid}             Unix effective user ID or Windows SID
                              ─────────────────────────────────────────────────────────────
                                %{USERID}           Same as %{uid}
                              ─────────────────────────────────────────────────────────────
                                %{null}             Empty string
                              ─────────────────────────────────────────────────────────────
                                %{LIBDIR}           Installation library directory
                              ─────────────────────────────────────────────────────────────
                                %{BINDIR}           Installation binary directory
                              ─────────────────────────────────────────────────────────────
                                %{SBINDIR}          Installation admin binary directory
                              ─────────────────────────────────────────────────────────────
                                %{username}         (Unix) Username of effective user ID
                              ─────────────────────────────────────────────────────────────
                                %{APPDATA}          (Windows)  Roaming  application  data
                                                    for current user
                              ─────────────────────────────────────────────────────────────
                                %{COMMON_APPDATA}   (Windows) Application  data  for  all
                                                    users
                              ─────────────────────────────────────────────────────────────
                                %{LOCAL_APPDATA}    (Windows)  Local application data for
                                                    current user
                              ─────────────────────────────────────────────────────────────
                                %{SYSTEM}           (Windows) Windows system folder
                              ─────────────────────────────────────────────────────────────
                                %{WINDOWS}          (Windows) Windows folder
                              ─────────────────────────────────────────────────────────────
                                %{USERCONFIG}       (Windows) Per-user  MIT  krb5  config
                                                    file directory
                              ─────────────────────────────────────────────────────────────
                                %{COMMONCONFIG}     (Windows) Common MIT krb5 config file
                                                    directory
                              ┌───────────────────┬───────────────────────────────────────┐
                              │                   │                                       │
SAMPLE KRB5.CONF FILE         │                   │                                       │
--
FILES                         │                   │                                       │
       /etc/krb5.conf         │                   │                                       │
                              │                   │                                       │
SEE ALSO                      │                   │                                       │
       syslog(3)              │                   │                                       │
                              │                   │                                       │
AUTHOR                        │                   │                                       │
       MIT

COPYRIGHT

       1985-2024, MIT

1.21.3                                                                                              KRB5.CONF(5)