diff options
author | Greg Hudson <ghudson@mit.edu> | 2012-12-12 15:46:41 -0500 |
---|---|---|
committer | Greg Hudson <ghudson@mit.edu> | 2012-12-12 15:46:41 -0500 |
commit | 9973812776fc69bc5fb8e3c7f85784cb295625f0 (patch) | |
tree | 9a68cae37cc383b515bb70cfdbad71eb69af5c86 /doc/appdev/init_creds.rst | |
parent | 4538146e1452e0966164119cefb0804993ce6bbb (diff) | |
download | krb5-9973812776fc69bc5fb8e3c7f85784cb295625f0.tar.gz krb5-9973812776fc69bc5fb8e3c7f85784cb295625f0.tar.xz krb5-9973812776fc69bc5fb8e3c7f85784cb295625f0.zip |
Document API for getting anonymous tickets
In init_creds.rst, document how to get anonymous credentials from an
application.
ticket: 7496 (new)
target_version: 1.11
tags: pullup
Diffstat (limited to 'doc/appdev/init_creds.rst')
-rw-r--r-- | doc/appdev/init_creds.rst | 26 |
1 files changed, 26 insertions, 0 deletions
diff --git a/doc/appdev/init_creds.rst b/doc/appdev/init_creds.rst index f6012f778c..1fc81d19bb 100644 --- a/doc/appdev/init_creds.rst +++ b/doc/appdev/init_creds.rst @@ -34,6 +34,32 @@ parameter (which can be a null pointer). Use the function :c:func:`krb5_get_init_creds_opt_alloc` to allocate an options structure, and :c:func:`krb5_get_init_creds_opt_free` to free it. +Getting anonymous credentials +----------------------------- + +As of release 1.8, it is possible to obtain fully anonymous or +partially anonymous (realm-exposed) credentials, if the KDC supports +it. The MIT KDC supports issuing fully anonymous credentials as of +release 1.8 if configured appropriately (see :ref:`anonymous_pkinit`), +but does not support issuing realm-exposed anonymous credentials at +this time. + +To obtain fully anonymous credentials, call +:c:func:`krb5_get_init_creds_opt_set_anonymous` on the options +structure to set the anonymous flag, and specify a client principal +with the KDC's realm and a single empty data component (the principal +obtained by parsing ``@``\ *realmname*). Authentication will take +place using anonymous PKINIT; if successful, the client principal of +the resulting tickets will be +``WELLKNOWN/ANONYMOUS@WELLKNOWN:ANONYMOUS``. + +To obtain realm-exposed anonymous credentials, set the anonymous flag +on the options structure as above, but specify a normal client +principal in order to prove membership in the realm. Authentication +will take place as it normally does; if successful, the client +principal of the resulting tickets will be ``WELLKNOWN/ANONYMOUS@``\ +*realmname*. + User interaction ---------------- |