5
5
-----
6
6
7
7
This module has been built as a replacement for the aging mod_auth_kerb.
8
- It's aim is to use only GSSAPI calls and be as much as possible agnostic
8
+ Its aim is to use only GSSAPI calls and be as much as possible agnostic
9
9
of the actual mechanism used.
10
10
11
11
Dependencies
@@ -17,15 +17,15 @@ extension](http://k5wiki.kerberos.org/wiki/Projects/Credential_Store_extensions)
17
17
is necessary to achieve full functionality. Reduced functionality is
18
18
provided without these extensions.
19
19
20
- krb5 (>=1.11)
21
- Apache (>=2.4)
20
+ krb5 (>=1.11)
21
+ Apache (>=2.4)
22
22
23
23
Installation
24
24
------------
25
25
26
- ./configure
27
- make
28
- make install
26
+ ./configure
27
+ make
28
+ make install
29
29
30
30
31
31
Configuration
@@ -41,12 +41,12 @@ The simplest configuration scheme specifies just one directive, which is the
41
41
location of the keytab.
42
42
43
43
#### Example
44
- <Location /private>
45
- AuthType GSSAPI
46
- AuthName "GSSAPI Single Sign On Login"
47
- GssapiCredStore keytab:/etc/httpd.keytab
48
- Require valid-user
49
- </Location>
44
+ <Location /private>
45
+ AuthType GSSAPI
46
+ AuthName "GSSAPI Single Sign On Login"
47
+ GssapiCredStore keytab:/etc/httpd.keytab
48
+ Require valid-user
49
+ </Location>
50
50
51
51
Your Apache server need read access to the keytab configured.
52
52
If your Kerberos implementation does not support the credential store
@@ -62,7 +62,7 @@ Configuration Directives
62
62
Forces the authentication attempt to fail if the connection is not being
63
63
established over TLS
64
64
65
- Example:
65
+ #### Example
66
66
GssapiSSLonly On
67
67
68
68
@@ -78,7 +78,7 @@ When this options is used the resolved name is set in the REMOTE_USER variable
78
78
however the complete client principal name is also made available in the
79
79
GSS_NAME variable.
80
80
81
- Example:
81
+ #### Example
82
82
GssapiLocalName on
83
83
84
84
@@ -90,15 +90,15 @@ the connection in order to keep the state between round-trips. With this option
90
90
enable incomplete context are store in the connection and retrieved on the next
91
91
request for continuation.
92
92
93
- Example:
93
+ #### Example
94
94
GssapiConnectionBound On
95
95
96
96
97
97
### GssapiSignalPersistentAuth
98
98
For clients that make use of Persistent-Auth header, send the header according
99
99
to GssapiConnectionBound setting.
100
100
101
- Example:
101
+ #### Example
102
102
GssapiSignalPersistentAuth On
103
103
104
104
@@ -116,7 +116,7 @@ See the
116
116
[mod_sessions](http://httpd.apache.org/docs/current/mod/mod_session.html)
117
117
documentation for more information.
118
118
119
- Example:
119
+ #### Example
120
120
GssapiUseSessions On
121
121
Session On
122
122
SessionCookieName gssapi_session path=/private;httponly;secure;
@@ -126,15 +126,15 @@ Example:
126
126
127
127
When GssapiUseSessions is enabled a key use to encrypt and MAC the session
128
128
data will be automatically generated at startup, this means session data will
129
- become unreadable if the server is restarted or multiple serves are used and
129
+ become unreadable if the server is restarted or multiple servers are used and
130
130
the client is load balanced from one to another. To obviate this problem the
131
131
admin can choose to install a permanent key in the configuration so that
132
132
session data remain accessible after a restart or by multiple servers
133
133
sharing the same key.
134
134
135
135
The key must be a base64 encoded raw key of 32 bytes of length.
136
136
137
- Example:
137
+ #### Example
138
138
GssapiSessionKey key:VGhpcyBpcyBhIDMyIGJ5dGUgbG9uZyBzZWNyZXQhISE=
139
139
140
140
@@ -143,7 +143,7 @@ Example:
143
143
The GssapiCredStore option allows to specify multiple credential related
144
144
options like keytab location, client_keytab location, ccache location etc.
145
145
146
- Example:
146
+ #### Example
147
147
GssapiCredStore keytab:/etc/httpd.keytab
148
148
GssapiCredStore ccache:FILE:/var/run/httpd/krb5ccache
149
149
@@ -156,13 +156,13 @@ The delegated credentials will be stored in a file named after the client
156
156
principal and the subprocess environment variable KRB5CCNAME will be set
157
157
to point to that file.
158
158
159
- Example:
159
+ #### Example
160
160
GssapiDelegCcacheDir /var/run/httpd/clientcaches
161
161
162
-
163
162
A user foo@EXAMPLE.COM delegating its credentials would cause the server to
164
163
create a ccache file named /var/run/httpd/clientcaches/foo@EXAMPLE.COM
165
164
165
+
166
166
### GssapiUseS4U2Proxy
167
167
168
168
Enables the use of the s4u2Proxy Kerberos extension also known as
@@ -174,14 +174,14 @@ This options requires GssapiDelegCcacheDir to be set. The ccache will be
174
174
populated with the user's provided ticket which is later used as evidence
175
175
ticket by the application.
176
176
177
- Example:
177
+ #### Example
178
178
GssapiUseS4U2Proxy On
179
179
GssapiCredStore keytab:/etc/httpd.keytab
180
180
GssapiCredStore client_keytab:/etc/httpd.keytab
181
181
GssapiCredStore ccache:FILE:/var/run/httpd/krb5ccache
182
182
GssapiDelegCcacheDir /var/run/httpd/clientcaches
183
183
184
- NOTE: The client keytab is necessary to allow GSSAPI to initate via keytab
184
+ ** NOTE:** The client keytab is necessary to allow GSSAPI to initiate via keytab
185
185
on its own. If not present an external mechanism needs to kinit with the
186
186
keytab and store a ccache in the configured ccache file.
187
187
@@ -191,19 +191,19 @@ Allows the use of Basic Auth in conjunction with Negotiate.
191
191
If the browser fails to use Negotiate is will instead fallback to Basic and
192
192
the username and password will be used to try to acquire credentials in the
193
193
module via GSSAPI. If credentials are acquire successfully then they are
194
- validated agaist the server's keytab.
194
+ validated against the server's keytab.
195
195
196
- Enable with: GssapiBasicAuth On
197
- Default: GssapiBasicAuth Off
196
+ - ** Enable with:** GssapiBasicAuth On
197
+ - ** Default:** GssapiBasicAuth Off
198
198
199
- Example:
200
- <Location /gssapi>
201
- AuthType GSSAPI
202
- AuthName "Login"
203
- GssapiBasicAuth On
204
- GssapiCredStore keytab:/etc/httpd/http.keytab
205
- Require valid-user
206
- </Location>
199
+ #### Example
200
+ <Location /gssapi>
201
+ AuthType GSSAPI
202
+ AuthName "Login"
203
+ GssapiBasicAuth On
204
+ GssapiCredStore keytab:/etc/httpd/http.keytab
205
+ Require valid-user
206
+ </Location>
207
207
208
208
209
209
### GssapiAllowedMech
@@ -213,19 +213,19 @@ can be used when credentials for multiple mechanisms are available.
213
213
By default no mechanism is set, this means all locally available mechanisms
214
214
are allowed. The recognized mechanism names are: krb5, iakerb, ntlmssp
215
215
216
- Example:
216
+ #### Example
217
217
GssapiAllowedMech krb5
218
218
GssapiAllowedMech ntlmssp
219
219
220
220
221
221
### GssapiBasicAuthMech
222
222
223
223
List of mechanisms against which Basic Auth is attempted. This is useful to
224
- restrict the mechanisms that can be used to attaempt password auth.
224
+ restrict the mechanisms that can be used to attempt password auth.
225
225
By default no mechanism is set, this means all locally available mechanisms
226
226
are allowed, unless GssapiAllowedMech is set, in which case those are used.
227
- GssapiBasicAuthMech always takes precendence over GssapiAllowedMech.
227
+ GssapiBasicAuthMech always takes precedence over GssapiAllowedMech.
228
228
The recognized mechanism names are: krb5, iakerb, ntlmssp
229
229
230
- Example:
230
+ #### Example
231
231
GssapiBasicAuthMech krb5
0 commit comments