capaths questions
Sam Hartman
hartmans at MIT.EDU
Tue May 18 16:43:56 EDT 2004
>>>>> "Will" == Will Fiveash <william.fiveash at sun.com> writes:
Will> While transited path checking may be in the realm of authz,
Will> my point about allowing the kdc to enforce a transited path
Will> policy for a realm is that this allows the kdc admin to
Will> control this policy in one place (the kdc) instead of on
Will> each app. server. The ability to manage this policy
Will> centrally by kdc admins that may have a better understanding
Will> of the trust issues should provide better security than
Will> having to manage the policy distributed across different
Will> app. servers.
My experience suggests that app server administrators are often aware
of trust paths that exist that KDC admins don't know about or are
unwilling to trust globally. You tend to get most of the benefits of
central admins by having a default allow policy on the KDC (with the
tp-checked bit) and a default-deny policy on the application servers.
There are a large class of problems for which you want to have central
configuration but have an ability for exceptions to be defined at the
edges.
More information about the krbdev
mailing list