[38954] in Kerberos

home help back first fref pref prev next nref lref last post

AW: gss_localname() with multiple KDC/User Directories + Apache +

daemon@ATHENA.MIT.EDU (Tobias Kritten (EXT))
Tue Jul 20 12:17:04 2021

From: "Tobias Kritten (EXT)" <tk@dogado.de>
To: Greg Hudson <ghudson@mit.edu>, "kerberos@mit.edu" <kerberos@mit.edu>
Date: Tue, 20 Jul 2021 16:13:48 +0000
Message-ID: <AM9PR08MB6708BB3C2CB3D9ABECF4F266CCE29@AM9PR08MB6708.eurprd08.prod.outlook.com>
In-Reply-To: <fe1fabf2-618e-8318-028f-3f08fe1a3930@mit.edu>
Content-Language: de-DE
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Errors-To: kerberos-bounces@mit.edu
Content-Transfer-Encoding: 8bit

Hi Greg,

thanks for your quick help!

> auth_to_local is always looked up in the default realm, not in the realm of
> the principal being authorized.  This is why the rule has to do the annoying
> dance of explicitly including the realm in the [] part, matching it in the () part,
> and removing it in the s// part.  Fixing this historical botch isn't trivial since the
> obvious fixes would be likely to break existing deployments.  (The same
> problem applies to auth_to_local_names, which is even worse since there's
> no workaround aside from not doing any cross-realm.)

Moving the auth_to_local directive into the default realm solved the issue - thank you so much! :-)

Best,
Tobias

--
Mit freundlichen Grüßen aus Dortmund,
Tobias Kritten (EXT), Head of Internal IT
________________________________
dogado GmbH
Antonio-Segni-Straße 11
44263 Dortmund


Hotline:        +49 (231) 28 66 200
Fax:    +49 (231) 28 66 20 20
Website:        http://www.dogado.de
Profil auf XING:        http://www.xing.com/companies/dogado
The Cloud Sourcing Blog:        http://www.dogado.de/blog
Twitter:        https://twitter.com/dogado
Facebook:       https://www.facebook.com/dogado
Technischer Support:    support@dogado.de<mailto:support@dogado.de>

Sitz der Gesellschaft: Dortmund Handelsregister: HRB 19737 Amtsgericht Dortmund,
Ust-IdNr: DE249338561 Geschäftsführer: Marcel Chorengel, Daniel Hagemeier, Ralph Cammerrath, Claus Boyens

________________________________

________________________________________________
Kerberos mailing list           Kerberos@mit.edu
https://mailman.mit.edu/mailman/listinfo/kerberos


home help back first fref pref prev next nref lref last post