Hi all,

I'm looking to set up a KDC to issue TGTs from my organization's smart cards. 
Establishing a trust is a non-starter. My target environment is outside the 
firewall, all corporate infrastructure is inaccessible and will stay that way. 
However, CA bundles are public information. Looking at my PIV certificate, I 
see my SAN is:

Other Name:
     Principal Name=12001000550...@fedidcard.gov

I won't type that big long number every time I try to login. My peers will 
revolt. As it turns out, when I put the smart card in my corporate machine, 
klist shows that the client in the resulting tickets is: 
bnordg...@usda.net<mailto:bnordg...@usda.net>. There is really nothing in the 
certificate which would perform this mapping. I can, however, automatically 
generate a mapping file to push out to my KDC by querying AD. (For instance, 
I'm pretty sure a 1:1 mapping between userPrincipalName and sAMAccountName 
would do the trick.)

How would I compel the MIT Kerberos server to perform that same mapping? I want 
to be able to ask for a ticket for "bnordgren@MY.OTHER.REALM", provide a 
certificate with a MS UPN of 
12001000550...@fedidcard.gov<mailto:12001000550...@fedidcard.gov> and have it 
work. I also want it to KRB_ERROR if a valid certificate with any other MS UPN 
tries to get a ticket for 
bnordgren@MY.OTHER.REALM<mailto:bnordgren@MY.OTHER.REALM>.

Has this already been done, and if not, would it be possible to do the mapping 
by writing a plugin?

Bryce
________________________________________________
Kerberos mailing list           Kerberos@mit.edu
https://mailman.mit.edu/mailman/listinfo/kerberos

Reply via email to