summaryrefslogtreecommitdiffstats
path: root/doc/appdev/init_creds.rst
diff options
context:
space:
mode:
authorGreg Hudson <ghudson@mit.edu>2012-12-12 15:46:41 -0500
committerGreg Hudson <ghudson@mit.edu>2012-12-12 15:46:41 -0500
commit9973812776fc69bc5fb8e3c7f85784cb295625f0 (patch)
tree9a68cae37cc383b515bb70cfdbad71eb69af5c86 /doc/appdev/init_creds.rst
parent4538146e1452e0966164119cefb0804993ce6bbb (diff)
downloadkrb5-9973812776fc69bc5fb8e3c7f85784cb295625f0.tar.gz
krb5-9973812776fc69bc5fb8e3c7f85784cb295625f0.tar.xz
krb5-9973812776fc69bc5fb8e3c7f85784cb295625f0.zip
Document API for getting anonymous tickets
In init_creds.rst, document how to get anonymous credentials from an application. ticket: 7496 (new) target_version: 1.11 tags: pullup
Diffstat (limited to 'doc/appdev/init_creds.rst')
-rw-r--r--doc/appdev/init_creds.rst26
1 files changed, 26 insertions, 0 deletions
diff --git a/doc/appdev/init_creds.rst b/doc/appdev/init_creds.rst
index f6012f778c..1fc81d19bb 100644
--- a/doc/appdev/init_creds.rst
+++ b/doc/appdev/init_creds.rst
@@ -34,6 +34,32 @@ parameter (which can be a null pointer). Use the function
:c:func:`krb5_get_init_creds_opt_alloc` to allocate an options
structure, and :c:func:`krb5_get_init_creds_opt_free` to free it.
+Getting anonymous credentials
+-----------------------------
+
+As of release 1.8, it is possible to obtain fully anonymous or
+partially anonymous (realm-exposed) credentials, if the KDC supports
+it. The MIT KDC supports issuing fully anonymous credentials as of
+release 1.8 if configured appropriately (see :ref:`anonymous_pkinit`),
+but does not support issuing realm-exposed anonymous credentials at
+this time.
+
+To obtain fully anonymous credentials, call
+:c:func:`krb5_get_init_creds_opt_set_anonymous` on the options
+structure to set the anonymous flag, and specify a client principal
+with the KDC's realm and a single empty data component (the principal
+obtained by parsing ``@``\ *realmname*). Authentication will take
+place using anonymous PKINIT; if successful, the client principal of
+the resulting tickets will be
+``WELLKNOWN/ANONYMOUS@WELLKNOWN:ANONYMOUS``.
+
+To obtain realm-exposed anonymous credentials, set the anonymous flag
+on the options structure as above, but specify a normal client
+principal in order to prove membership in the realm. Authentication
+will take place as it normally does; if successful, the client
+principal of the resulting tickets will be ``WELLKNOWN/ANONYMOUS@``\
+*realmname*.
+
User interaction
----------------