Skip to content

Commit

Permalink
Update LDAP docs for password lockout
Browse files Browse the repository at this point in the history
The KDC now needs write access to the LDAP KDB, unless password
lockout and tracking of the last successful authentication time are
disabled.  Update the example LDAP access control configuration in
conf_ldap.rst to reflect this, add a note that only read access is
required if lockout is disabled, and add a section to lockout.rst
calling out the need for write access.  Reported by Will Fiveash.

[ci skip]

(cherry picked from commit c655083)

ticket: 8452
version_fixed: 1.14.3
  • Loading branch information
greghudson authored and tlyu committed Jul 15, 2016
1 parent b7ca623 commit 30aa355
Show file tree
Hide file tree
Showing 2 changed files with 16 additions and 3 deletions.
9 changes: 6 additions & 3 deletions doc/admin/conf_ldap.rst
Original file line number Diff line number Diff line change
Expand Up @@ -47,7 +47,10 @@ Configuring Kerberos with OpenLDAP back-end
container.

5. Configure the LDAP server ACLs to enable the KDC and kadmin server
DNs to read and write the Kerberos data.
DNs to read and write the Kerberos data. If
**disable_last_success** and **disable_lockout** are both set to
true in the :ref:`dbmodules` subsection for the realm, then the
KDC DN only requires read access to the Kerberos data.

Sample access control information::

Expand All @@ -67,13 +70,13 @@ Configuring Kerberos with OpenLDAP back-end

# Providing access to realm container
access to dn.subtree= "cn=EXAMPLE.COM,cn=krbcontainer,dc=example,dc=com"
by dn.exact="cn=kdc-service,dc=example,dc=com" read
by dn.exact="cn=kdc-service,dc=example,dc=com" write
by dn.exact="cn=adm-service,dc=example,dc=com" write
by * none

# Providing access to principals, if not underneath realm container
access to dn.subtree= "ou=users,dc=example,dc=com"
by dn.exact="cn=kdc-service,dc=example,dc=com" read
by dn.exact="cn=kdc-service,dc=example,dc=com" write
by dn.exact="cn=adm-service,dc=example,dc=com" write
by * none

Expand Down
10 changes: 10 additions & 0 deletions doc/admin/lockout.rst
Original file line number Diff line number Diff line change
Expand Up @@ -138,3 +138,13 @@ have the largest positive impact on performance, and will still allow
account lockout policies to operate. However, it will make it
impossible to observe the last successful authentication time with
kadmin.


KDC setup and account lockout
-----------------------------

To update the account lockout state on principals, the KDC must be
able to write to the principal database. For the DB2 module, no
special setup is required. For the LDAP module, the KDC DN must be
granted write access to the principal objects. If the KDC DN has only
read access, account lockout will not function.

0 comments on commit 30aa355

Please sign in to comment.