60kerberos.ldif 18 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283
  1. dn: cn=schema
  2. # Novell Kerberos Schema Definitions
  3. # Novell Inc.
  4. # 1800 South Novell Place
  5. # Provo, UT 84606
  6. #
  7. # VeRsIoN=1.0
  8. # CoPyRiGhT=(c) Copyright 2006, Novell, Inc. All rights reserved
  9. #
  10. # OIDs:
  11. # joint-iso-ccitt(2)
  12. # country(16)
  13. # us(840)
  14. # organization(1)
  15. # Novell(113719)
  16. # applications(1)
  17. # kerberos(301)
  18. # Kerberos Attribute Type(4) attr# version#
  19. # specific attribute definitions
  20. # Kerberos Attribute Syntax(5)
  21. # specific syntax definitions
  22. # Kerberos Object Class(6) class# version#
  23. # specific class definitions
  24. ########################################################################
  25. ########################################################################
  26. # Attribute Type Definitions #
  27. ########################################################################
  28. ##### This is the principal name in the RFC 1964 specified format
  29. attributetypes: ( 2.16.840.1.113719.1.301.4.1.1 NAME 'krbPrincipalName' EQUALITY caseExactIA5Match SUBSTR caseExactSubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.26)
  30. ##### This specifies the type of the principal, the types could be any of
  31. ##### the types mentioned in section 6.2 of RFC 4120
  32. attributetypes: ( 2.16.840.1.113719.1.301.4.3.1 NAME 'krbPrincipalType' EQUALITY integerMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE)
  33. ##### This flag is used to find whether directory User Password has to be used
  34. ##### as kerberos password.
  35. ##### TRUE, if User Password is to be used as the kerberos password.
  36. ##### FALSE, if User Password and the kerberos password are different.
  37. attributetypes: ( 2.16.840.1.113719.1.301.4.5.1 NAME 'krbUPEnabled' DESC 'Boolean' SYNTAX 1.3.6.1.4.1.1466.115.121.1.7 SINGLE-VALUE)
  38. ##### The time at which the principal expires
  39. attributetypes: ( 2.16.840.1.113719.1.301.4.6.1 NAME 'krbPrincipalExpiration' EQUALITY generalizedTimeMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.24 SINGLE-VALUE)
  40. ##### The krbTicketFlags attribute holds information about the kerberos flags for a principal
  41. ##### The values (0x00000001 - 0x00800000) are reserved for standards and
  42. ##### values (0x01000000 - 0x80000000) can be used for proprietary extensions.
  43. ##### The flags and values as per RFC 4120 and MIT implementation are,
  44. ##### DISALLOW_POSTDATED 0x00000001
  45. ##### DISALLOW_FORWARDABLE 0x00000002
  46. ##### DISALLOW_TGT_BASED 0x00000004
  47. ##### DISALLOW_RENEWABLE 0x00000008
  48. ##### DISALLOW_PROXIABLE 0x00000010
  49. ##### DISALLOW_DUP_SKEY 0x00000020
  50. ##### DISALLOW_ALL_TIX 0x00000040
  51. ##### REQUIRES_PRE_AUTH 0x00000080
  52. ##### REQUIRES_HW_AUTH 0x00000100
  53. ##### REQUIRES_PWCHANGE 0x00000200
  54. ##### DISALLOW_SVR 0x00001000
  55. ##### PWCHANGE_SERVICE 0x00002000
  56. attributetypes: ( 2.16.840.1.113719.1.301.4.8.1 NAME 'krbTicketFlags' EQUALITY integerMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE)
  57. ##### The maximum ticket lifetime for a principal in seconds
  58. attributetypes: ( 2.16.840.1.113719.1.301.4.9.1 NAME 'krbMaxTicketLife' EQUALITY integerMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE)
  59. ##### Maximum renewable lifetime for a principal's ticket in seconds
  60. attributetypes: ( 2.16.840.1.113719.1.301.4.10.1 NAME 'krbMaxRenewableAge' EQUALITY integerMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE)
  61. ##### Forward reference to the Realm object.
  62. ##### (FDN of the krbRealmContainer object).
  63. ##### Example: cn=ACME.COM, cn=Kerberos, cn=Security
  64. attributetypes: ( 2.16.840.1.113719.1.301.4.14.1 NAME 'krbRealmReferences' EQUALITY distinguishedNameMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.12)
  65. ##### List of LDAP servers that kerberos servers can contact.
  66. ##### The attribute holds data in the ldap uri format,
  67. ##### Example: ldaps://acme.com:636
  68. #####
  69. ##### The values of this attribute need to be updated, when
  70. ##### the LDAP servers listed here are renamed, moved or deleted.
  71. attributetypes: ( 2.16.840.1.113719.1.301.4.15.1 NAME 'krbLdapServers' EQUALITY caseIgnoreMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15)
  72. ##### A set of forward references to the KDC Service objects.
  73. ##### (FDNs of the krbKdcService objects).
  74. ##### Example: cn=kdc - server 1, ou=uvw, o=xyz
  75. attributetypes: ( 2.16.840.1.113719.1.301.4.17.1 NAME 'krbKdcServers' EQUALITY distinguishedNameMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.12)
  76. ##### A set of forward references to the Password Service objects.
  77. ##### (FDNs of the krbPwdService objects).
  78. ##### Example: cn=kpasswdd - server 1, ou=uvw, o=xyz
  79. attributetypes: ( 2.16.840.1.113719.1.301.4.18.1 NAME 'krbPwdServers' EQUALITY distinguishedNameMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.12)
  80. ##### This attribute holds the Host Name or the ip address,
  81. ##### transport protocol and ports of the kerberos service host
  82. ##### The format is host_name-or-ip_address#protocol#port
  83. ##### Protocol can be 0 or 1. 0 is for UDP. 1 is for TCP.
  84. attributetypes: ( 2.16.840.1.113719.1.301.4.24.1 NAME 'krbHostServer' EQUALITY caseExactIA5Match SYNTAX 1.3.6.1.4.1.1466.115.121.1.26)
  85. ##### This attribute holds the scope for searching the principals
  86. ##### under krbSubTree attribute of krbRealmContainer
  87. ##### The value can either be 1 (ONE) or 2 (SUB_TREE).
  88. attributetypes: ( 2.16.840.1.113719.1.301.4.25.1 NAME 'krbSearchScope' EQUALITY integerMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE)
  89. ##### FDNs pointing to Kerberos principals
  90. attributetypes: ( 2.16.840.1.113719.1.301.4.26.1 NAME 'krbPrincipalReferences' EQUALITY distinguishedNameMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.12)
  91. ##### This attribute specifies which attribute of the user objects
  92. ##### be used as the principal name component for Kerberos.
  93. ##### The allowed values are cn, sn, uid, givenname, fullname.
  94. attributetypes: ( 2.16.840.1.113719.1.301.4.28.1 NAME 'krbPrincNamingAttr' EQUALITY caseIgnoreMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 SINGLE-VALUE)
  95. ##### A set of forward references to the Administration Service objects.
  96. ##### (FDNs of the krbAdmService objects).
  97. ##### Example: cn=kadmindd - server 1, ou=uvw, o=xyz
  98. attributetypes: ( 2.16.840.1.113719.1.301.4.29.1 NAME 'krbAdmServers' EQUALITY distinguishedNameMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.12)
  99. ##### Maximum lifetime of a principal's password
  100. attributetypes: ( 2.16.840.1.113719.1.301.4.30.1 NAME 'krbMaxPwdLife' EQUALITY integerMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE)
  101. ##### Minimum lifetime of a principal's password
  102. attributetypes: ( 2.16.840.1.113719.1.301.4.31.1 NAME 'krbMinPwdLife' EQUALITY integerMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE)
  103. ##### Minimum number of character clases allowed in a password
  104. attributetypes: ( 2.16.840.1.113719.1.301.4.32.1 NAME 'krbPwdMinDiffChars' EQUALITY integerMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE)
  105. ##### Minimum length of the password
  106. attributetypes: ( 2.16.840.1.113719.1.301.4.33.1 NAME 'krbPwdMinLength' EQUALITY integerMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE)
  107. ##### Number of previous versions of passwords that are stored
  108. attributetypes: ( 2.16.840.1.113719.1.301.4.34.1 NAME 'krbPwdHistoryLength' EQUALITY integerMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE)
  109. ##### FDN pointing to a Kerberos Password Policy object
  110. attributetypes: ( 2.16.840.1.113719.1.301.4.36.1 NAME 'krbPwdPolicyReference' EQUALITY distinguishedNameMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.12 SINGLE-VALUE)
  111. ##### The time at which the principal's password expires
  112. attributetypes: ( 2.16.840.1.113719.1.301.4.37.1 NAME 'krbPasswordExpiration' EQUALITY generalizedTimeMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.24 SINGLE-VALUE)
  113. ##### This attribute holds the principal's key (krbPrincipalKey) that is encrypted with
  114. ##### the master key (krbMKey).
  115. ##### The attribute is ASN.1 encoded.
  116. #####
  117. ##### The format of the value for this attribute is explained below,
  118. ##### KrbKeySet ::= SEQUENCE {
  119. ##### attribute-major-vno [0] UInt16,
  120. ##### attribute-minor-vno [1] UInt16,
  121. ##### kvno [2] UInt32,
  122. ##### mkvno [3] UInt32 OPTIONAL,
  123. ##### keys [4] SEQUENCE OF KrbKey,
  124. ##### ...
  125. ##### }
  126. #####
  127. ##### KrbKey ::= SEQUENCE {
  128. ##### salt [0] KrbSalt OPTIONAL,
  129. ##### key [1] EncryptionKey,
  130. ##### s2kparams [2] OCTET STRING OPTIONAL,
  131. ##### ...
  132. ##### }
  133. #####
  134. ##### KrbSalt ::= SEQUENCE {
  135. ##### type [0] Int32,
  136. ##### salt [1] OCTET STRING OPTIONAL
  137. ##### }
  138. #####
  139. ##### EncryptionKey ::= SEQUENCE {
  140. ##### keytype [0] Int32,
  141. ##### keyvalue [1] OCTET STRING
  142. ##### }
  143. attributetypes: ( 2.16.840.1.113719.1.301.4.39.1 NAME 'krbPrincipalKey' EQUALITY octetStringMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.40)
  144. ##### FDN pointing to a Kerberos Ticket Policy object.
  145. attributetypes: ( 2.16.840.1.113719.1.301.4.40.1 NAME 'krbTicketPolicyReference' EQUALITY distinguishedNameMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.12 SINGLE-VALUE)
  146. ##### Forward reference to an entry that starts sub-trees
  147. ##### where principals and other kerberos objects in the realm are configured.
  148. ##### Example: ou=acme, ou=pq, o=xyz
  149. attributetypes: ( 2.16.840.1.113719.1.301.4.41.1 NAME 'krbSubTrees' EQUALITY distinguishedNameMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.12)
  150. ##### Holds the default encryption/salt type combinations of principals for
  151. ##### the Realm. Stores in the form of key:salt strings.
  152. ##### Example: des-cbc-crc:normal
  153. attributetypes: ( 2.16.840.1.113719.1.301.4.42.1 NAME 'krbDefaultEncSaltTypes' EQUALITY caseIgnoreMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15)
  154. ##### Holds the Supported encryption/salt type combinations of principals for
  155. ##### the Realm. Stores in the form of key:salt strings.
  156. ##### The supported encryption types are mentioned in RFC 3961
  157. ##### The supported salt types are,
  158. ##### NORMAL
  159. ##### V4
  160. ##### NOREALM
  161. ##### ONLYREALM
  162. ##### SPECIAL
  163. ##### AFS3
  164. ##### Example: des-cbc-crc:normal
  165. #####
  166. ##### This attribute obsoletes the krbSupportedEncTypes and krbSupportedSaltTypes
  167. ##### attributes.
  168. attributetypes: ( 2.16.840.1.113719.1.301.4.43.1 NAME 'krbSupportedEncSaltTypes' EQUALITY caseIgnoreMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15)
  169. ##### This attribute holds the principal's old keys (krbPwdHistory) that is encrypted with
  170. ##### the kadmin/history key.
  171. ##### The attribute is ASN.1 encoded.
  172. #####
  173. ##### The format of the value for this attribute is explained below,
  174. ##### KrbKeySet ::= SEQUENCE {
  175. ##### attribute-major-vno [0] UInt16,
  176. ##### attribute-minor-vno [1] UInt16,
  177. ##### kvno [2] UInt32,
  178. ##### mkvno [3] UInt32 OPTIONAL -- actually kadmin/history key,
  179. ##### keys [4] SEQUENCE OF KrbKey,
  180. ##### ...
  181. ##### }
  182. #####
  183. ##### KrbKey ::= SEQUENCE {
  184. ##### salt [0] KrbSalt OPTIONAL,
  185. ##### key [1] EncryptionKey,
  186. ##### s2kparams [2] OCTET STRING OPTIONAL,
  187. ##### ...
  188. ##### }
  189. #####
  190. ##### KrbSalt ::= SEQUENCE {
  191. ##### type [0] Int32,
  192. ##### salt [1] OCTET STRING OPTIONAL
  193. ##### }
  194. #####
  195. ##### EncryptionKey ::= SEQUENCE {
  196. ##### keytype [0] Int32,
  197. ##### keyvalue [1] OCTET STRING
  198. ##### }
  199. attributetypes: ( 2.16.840.1.113719.1.301.4.44.1 NAME 'krbPwdHistory' EQUALITY octetStringMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.40)
  200. ##### The time at which the principal's password last password change happened.
  201. attributetypes: ( 2.16.840.1.113719.1.301.4.45.1 NAME 'krbLastPwdChange' EQUALITY generalizedTimeMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.24 SINGLE-VALUE)
  202. ##### This attribute holds the kerberos master key.
  203. ##### This can be used to encrypt principal keys.
  204. ##### This attribute has to be secured in directory.
  205. #####
  206. ##### This attribute is ASN.1 encoded.
  207. ##### The format of the value for this attribute is explained below,
  208. ##### KrbMKey ::= SEQUENCE {
  209. ##### kvno [0] UInt32,
  210. ##### key [1] MasterKey
  211. ##### }
  212. #####
  213. ##### MasterKey ::= SEQUENCE {
  214. ##### keytype [0] Int32,
  215. ##### keyvalue [1] OCTET STRING
  216. ##### }
  217. attributetypes: ( 2.16.840.1.113719.1.301.4.46.1 NAME 'krbMKey' EQUALITY octetStringMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.40)
  218. ##### This stores the alternate principal names for the principal in the RFC 1961 specified format
  219. attributetypes: ( 2.16.840.1.113719.1.301.4.47.1 NAME 'krbPrincipalAliases' EQUALITY caseExactIA5Match SYNTAX 1.3.6.1.4.1.1466.115.121.1.26)
  220. ##### The time at which the principal's last successful authentication happened.
  221. attributetypes: ( 2.16.840.1.113719.1.301.4.48.1 NAME 'krbLastSuccessfulAuth' EQUALITY generalizedTimeMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.24 SINGLE-VALUE)
  222. ##### The time at which the principal's last failed authentication happened.
  223. attributetypes: ( 2.16.840.1.113719.1.301.4.49.1 NAME 'krbLastFailedAuth' EQUALITY generalizedTimeMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.24 SINGLE-VALUE)
  224. ##### This attribute stores the number of failed authentication attempts
  225. ##### happened for the principal since the last successful authentication.
  226. attributetypes: ( 2.16.840.1.113719.1.301.4.50.1 NAME 'krbLoginFailedCount' EQUALITY integerMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE)
  227. ##### This attribute holds the application specific data.
  228. attributetypes: ( 2.16.840.1.113719.1.301.4.51.1 NAME 'krbExtraData' EQUALITY octetStringMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.40)
  229. ##### This attributes holds references to the set of directory objects.
  230. ##### This stores the DNs of the directory objects to which the
  231. ##### principal object belongs to.
  232. attributetypes: ( 2.16.840.1.113719.1.301.4.52.1 NAME 'krbObjectReferences' EQUALITY distinguishedNameMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.12)
  233. ##### This attribute holds references to a Container object where
  234. ##### the additional principal objects and stand alone principal
  235. ##### objects (krbPrincipal) can be created.
  236. attributetypes: ( 2.16.840.1.113719.1.301.4.53.1 NAME 'krbPrincContainerRef' EQUALITY distinguishedNameMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.12)
  237. ########################################################################
  238. ########################################################################
  239. # Object Class Definitions #
  240. ########################################################################
  241. #### This is a kerberos container for all the realms in a tree.
  242. objectClasses: ( 2.16.840.1.113719.1.301.6.1.1 NAME 'krbContainer' SUP top MUST ( cn ) )
  243. ##### The krbRealmContainer is created per realm and holds realm specific data.
  244. objectClasses: ( 2.16.840.1.113719.1.301.6.2.1 NAME 'krbRealmContainer' SUP top MUST ( cn ) MAY ( krbMKey $ krbUPEnabled $ krbSubTrees $ krbSearchScope $ krbLdapServers $ krbSupportedEncSaltTypes $ krbDefaultEncSaltTypes $ krbTicketPolicyReference $ krbKdcServers $ krbPwdServers $ krbAdmServers $ krbPrincNamingAttr $krbPwdPolicyReference $ krbPrincContainerRef ) )
  245. ##### An instance of a class derived from krbService is created per
  246. ##### kerberos authentication or administration server in an realm and holds
  247. ##### references to the realm objects. These references is used to further read
  248. ##### realm specific data to service AS/TGS requests. Additionally this object
  249. ##### contains some server specific data like pathnames and ports that the
  250. ##### server uses. This is the identity the kerberos server logs in with. A key
  251. ##### pair for the same is created and the kerberos server logs in with the same.
  252. #####
  253. ##### krbKdcService, krbAdmService and krbPwdService derive from this class.
  254. objectClasses: ( 2.16.840.1.113719.1.301.6.3.1 NAME 'krbService' ABSTRACT SUP ( top ) MUST ( cn ) MAY ( krbHostServer $ krbRealmReferences ) )
  255. ##### Representative object for the KDC server to bind into a LDAP directory
  256. ##### and have a connection to access Kerberos data with the required
  257. ##### access rights.
  258. objectClasses: ( 2.16.840.1.113719.1.301.6.4.1 NAME 'krbKdcService' SUP ( krbService ) )
  259. ##### Representative object for the Kerberos Password server to bind into a LDAP directory
  260. ##### and have a connection to access Kerberos data with the required
  261. ##### access rights.
  262. objectClasses: ( 2.16.840.1.113719.1.301.6.5.1 NAME 'krbPwdService' SUP ( krbService ) )
  263. ###### The principal data auxiliary class. Holds principal information
  264. ###### and is used to store principal information for Person, Service objects.
  265. objectClasses: ( 2.16.840.1.113719.1.301.6.8.1 NAME 'krbPrincipalAux' AUXILIARY MAY ( krbPrincipalName $ krbUPEnabled $ krbPrincipalKey $ krbTicketPolicyReference $ krbPrincipalExpiration $ krbPasswordExpiration $ krbPwdPolicyReference $ krbPrincipalType $ krbPwdHistory $ krbLastPwdChange $ krbPrincipalAliases $ krbLastSuccessfulAuth $ krbLastFailedAuth $ krbLoginFailedCount $ krbExtraData ) )
  266. ###### This class is used to create additional principals and stand alone principals.
  267. objectClasses: ( 2.16.840.1.113719.1.301.6.9.1 NAME 'krbPrincipal' SUP ( top ) MUST ( krbPrincipalName ) MAY ( krbObjectReferences ) )
  268. ###### The principal references auxiliary class. Holds all principals referred
  269. ###### from a service
  270. objectClasses: ( 2.16.840.1.113719.1.301.6.11.1 NAME 'krbPrincRefAux' SUP top AUXILIARY MAY krbPrincipalReferences )
  271. ##### Representative object for the Kerberos Administration server to bind into a LDAP directory
  272. ##### and have a connection Id to access Kerberos data with the required access rights.
  273. objectClasses: ( 2.16.840.1.113719.1.301.6.13.1 NAME 'krbAdmService' SUP ( krbService ) )
  274. ##### The krbPwdPolicy object is a template password policy that
  275. ##### can be applied to principals when they are created.
  276. ##### These policy attributes will be in effect, when the Kerberos
  277. ##### passwords are different from users' passwords (UP).
  278. objectClasses: ( 2.16.840.1.113719.1.301.6.14.1 NAME 'krbPwdPolicy' SUP top MUST ( cn ) MAY ( krbMaxPwdLife $ krbMinPwdLife $ krbPwdMinDiffChars $ krbPwdMinLength $ krbPwdHistoryLength ) )
  279. ##### The krbTicketPolicyAux holds Kerberos ticket policy attributes.
  280. ##### This class can be attached to a principal object or realm object.
  281. objectClasses: ( 2.16.840.1.113719.1.301.6.16.1 NAME 'krbTicketPolicyAux' AUXILIARY MAY ( krbTicketFlags $ krbMaxTicketLife $ krbMaxRenewableAge ) )
  282. ##### The krbTicketPolicy object is an effective ticket policy that is associated with a realm or a principal
  283. objectClasses: ( 2.16.840.1.113719.1.301.6.17.1 NAME 'krbTicketPolicy' SUP top MUST ( cn ) )