On 12/28/2017 02:05 PM, Pallissard, Matthew wrote: > I'm having issues when trying to use set_string with pkinit_cert_match. > PKINIT does work when the SAN matches the user's principal explicitly. It > does not work when I try to map it to a user where the principal does not > match the SAN.
The intended use case for pkinit_cert_match is client certificates which weren't issued for use with PKINIT at all, and therefore have no id-pkinit-san values. If there is an id-pkinit-san value, the KDC requires it to match the requested client principal. Currently, the only way to allow this is to disable the pkinit_san module: [plugins] certauth = { disable = pkinit_san } You would then have to specify a pkinit_cert_match string for every principal, as SAN matching would be turned off entirely. If enough people have the use case where they want certificates with mismatched id-pkinit-san values to be accepted based on matching strings, we could provide a more convenient configuration hook for it. I had (perhaps naively) assumed that if people were going to the trouble of issuing client certs with id-pkinit-san values, they could include values for all of the desired client principal names. ________________________________________________ Kerberos mailing list Kerberos@mit.edu https://mailman.mit.edu/mailman/listinfo/kerberos