Associating Kerberos identities to LDAP object

Will Fiveash William.Fiveash at sun.com
Thu Jul 27 17:36:10 EDT 2006


On Wed, Jul 26, 2006 at 08:13:27AM -0400, Sam Hartman wrote:
> >>>>> "Praveenkumar" == Praveenkumar Sahukar <psahukar at novell.com> writes:
> 
>     Praveenkumar> Additional kerberos identities will be created as
>     Praveenkumar> separate krbprincipal objects. The krbprincipal
>     Praveenkumar> objects will be created either in a separate
>     Praveenkumar> container under realm's subtree or directly under
>     Praveenkumar> the realm's subtree.  If a separate container under
>     Praveenkumar> realm's subtree is dedicated for the additional
>     Praveenkumar> principals then the information of this separate
>     Praveenkumar> container will be stored in the realm container
>     Praveenkumar> object.
> 
> First, I think that asserting the first principal will extend the
> directory object is problematic.  I think you want to explicitly
> distinguish between the containment and association cases; see my
> previous mail.  I believe that for example you would want containment
> when a principal is very tightly bound to some object.  For example
> the host principal and a host object; the user principal and the user
> object.  Other principals--services on a host, additional instances,
> tc should be associated.
> 
>   Do you need to limit where these objects can live for
> read or write?  I understand you need to limit where these objects are
> created by your code, but can you just find the principal object
> wherever it exists?

I agree that the LDAP plugin should not hard-code assumptions about
whether krb principal attributes are to be mixed in with an existing
object or that a new krb principal structural object will be created.

(I'll comment more on Sam's other e-mails regarding this topic.)
-- 
Will Fiveash
Sun Microsystems Inc.
Austin, TX, USA (TZ=CST6CDT)



More information about the krbdev mailing list