summaryrefslogtreecommitdiff
path: root/docs-xml/smbdotconf/security/kdccertbindingenforcement.xml
blob: d347e8cdb2c229986dcf24a96ab322b86a1516f4 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
<samba:parameter name="strong certificate binding enforcement"
                 context="G"
                 type="enum"
                 enumlist="enum_strong_cert_binding_enforcement_vals"
                 xmlns:samba="http://www.samba.org/samba/DTD/samba-doc">
<description>
    <para>This parameter controls the enforcement of Windows Certificate
        bindings as outlined in
            <ulink url="https://support.microsoft.com/en-us/topic/kb5014754-certificate-based-authentication-changes-on-windows-domain-controllers-ad2c23b0-15d8-4340-a468-4d4f3b188f16">
                KB5014754: Certificate-based authentication changes on
                Windows domain controllers
            </ulink>, when performing certificate based kerberos authentication
            (PKINIT)
    </para>

    <para>The possible values are:
        <itemizedlist>
            <listitem>
                <para><constant>none</constant></para>
                <para>
                    No validation of the certificate mappings is performed
                </para>
            </listitem>
            <listitem>
                <para><constant>compatibility</constant></para>
                <para>
                        Weak certificate mappings are permitted.
                </para>
                <para>
                    In compatibility mode for WEAK mappings the date the
                    certificate was issued must be after the date that the user
                    was created.
                </para>
                <para>
                    <constant>Unless</constant>
                    <smbconfoption name="certificate backdating compensation"/>
                    has a value.  In that case the certificate may have been
                    issued no more than that number of minutes before the user
                    was created.
                </para>
            </listitem>
            <listitem>
                <para><constant>full</constant></para>
                <para>
                    Only <constant>strong</constant> certificate mappings are
                    permitted. This is the default.
                </para>
            </listitem>
        </itemizedlist>
    </para>

    <para>
        Certificate mappings are configured in the users
        <constant>altSecurityIdentities</constant>
            attribute and may be any of:
            <itemizedlist>
            <listitem>
                <para>X509 Issuer and subject</para>
                <para>Example: "X509:&lt;I&gt;IssuerName&lt;S&gt;SubjectName"</para>
                <para>
                    The values provided for the issuer name and subject name
                    must match those in the user's certificate exactly.
                </para>
                <para><emphasis>WEAK</emphasis></para>
            </listitem>
            <listitem>
                <para>X509 Subject only</para>
                <para>Example: "X509:&lt;S&gt;SubjectName"</para>
                <para>
                    The value provided for the issuer subject name
                    must match that in the user's certificate exactly.
                </para>
                <para><emphasis>WEAK</emphasis></para>
            </listitem>
            <listitem>
                <para>X509 RFC822</para>
                <para>Example: "X509:&lt;RFC822&gt;test@example.com"</para>
                <para>
                    Email address
                </para>
                <para><emphasis>WEAK</emphasis></para>
            </listitem>
            <listitem>
                <para>X509 Issuer and serial number</para>
                <para>Example: "X509:&lt;I&gt;IssuerName&lt;SR&gt;123456789"</para>
                <para>
                    Certificate issuer and serial number
                </para>
                <para><emphasis>STRONG</emphasis></para>
            </listitem>
            <listitem>
                <para>X509 Subject Key Identifier</para>
                <para>Example: "&lt;SKI&gt;01234xxxxx"</para>
                <para><emphasis>STRONG</emphasis></para>
            </listitem>
            <listitem>
                <para>X509 public key SHA1 </para>
                <para>Example: "X509:&lt;SHA1-PUKEY&gt;1234567890abcdef"</para>
                <para>
                    The SHA1 hash of the certificate's public key
                </para>
                <para><emphasis>STRONG</emphasis></para>
            </listitem>
            </itemizedlist>

        Certificate mappings may also take the form of a certificate extension
        (extension 1.3.6.1.4.1.311.25.2) that contains the user's SID. This is
        considered a <emphasis>STRONG</emphasis> mapping.
    </para>
</description>

<value type="default">full</value>
</samba:parameter>