1# Novell Kerberos Schema Definitions 2# Novell Inc. 3# 1800 South Novell Place 4# Provo, UT 84606 5# 6# VeRsIoN=1.0 7# CoPyRiGhT=(c) Copyright 2006, Novell, Inc. All rights reserved 8# 9# OIDs: 10# joint-iso-ccitt(2) 11# country(16) 12# us(840) 13# organization(1) 14# Novell(113719) 15# applications(1) 16# kerberos(301) 17# Kerberos Attribute Type(4) attr# version# 18# specific attribute definitions 19# Kerberos Attribute Syntax(5) 20# specific syntax definitions 21# Kerberos Object Class(6) class# version# 22# specific class definitions 23# 24# iso(1) 25# member-body(2) 26# United States(840) 27# mit (113554) 28# infosys(1) 29# ldap(4) 30# attributeTypes(1) 31# Kerberos(6) 32 33######################################################################## 34 35 36######################################################################## 37# Attribute Type Definitions # 38######################################################################## 39 40##### This is the principal name in the RFC 1964 specified format 41 42attributetype ( 2.16.840.1.113719.1.301.4.1.1 43 NAME 'krbPrincipalName' 44 EQUALITY caseExactIA5Match 45 SUBSTR caseExactSubstringsMatch 46 SYNTAX 1.3.6.1.4.1.1466.115.121.1.26) 47 48##### If there are multiple krbPrincipalName values for an entry, this 49##### is the canonical principal name in the RFC 1964 specified 50##### format. (If this attribute does not exist, then all 51##### krbPrincipalName values are treated as canonical.) 52 53attributetype ( 1.2.840.113554.1.4.1.6.1 54 NAME 'krbCanonicalName' 55 EQUALITY caseExactIA5Match 56 SUBSTR caseExactSubstringsMatch 57 SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 58 SINGLE-VALUE) 59 60##### This specifies the type of the principal, the types could be any of 61##### the types mentioned in section 6.2 of RFC 4120 62 63attributetype ( 2.16.840.1.113719.1.301.4.3.1 64 NAME 'krbPrincipalType' 65 EQUALITY integerMatch 66 SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 67 SINGLE-VALUE) 68 69 70##### This flag is used to find whether directory User Password has to be used 71##### as kerberos password. 72##### TRUE, if User Password is to be used as the kerberos password. 73##### FALSE, if User Password and the kerberos password are different. 74 75attributetype ( 2.16.840.1.113719.1.301.4.5.1 76 NAME 'krbUPEnabled' 77 DESC 'Boolean' 78 SYNTAX 1.3.6.1.4.1.1466.115.121.1.7 79 SINGLE-VALUE) 80 81 82##### The time at which the principal expires 83 84attributetype ( 2.16.840.1.113719.1.301.4.6.1 85 NAME 'krbPrincipalExpiration' 86 EQUALITY generalizedTimeMatch 87 SYNTAX 1.3.6.1.4.1.1466.115.121.1.24 88 SINGLE-VALUE) 89 90 91##### The krbTicketFlags attribute holds information about the kerberos flags for a principal 92##### The values (0x00000001 - 0x00800000) are reserved for standards and 93##### values (0x01000000 - 0x80000000) can be used for proprietary extensions. 94##### The flags and values as per RFC 4120 and MIT implementation are, 95##### DISALLOW_POSTDATED 0x00000001 96##### DISALLOW_FORWARDABLE 0x00000002 97##### DISALLOW_TGT_BASED 0x00000004 98##### DISALLOW_RENEWABLE 0x00000008 99##### DISALLOW_PROXIABLE 0x00000010 100##### DISALLOW_DUP_SKEY 0x00000020 101##### DISALLOW_ALL_TIX 0x00000040 102##### REQUIRES_PRE_AUTH 0x00000080 103##### REQUIRES_HW_AUTH 0x00000100 104##### REQUIRES_PWCHANGE 0x00000200 105##### DISALLOW_SVR 0x00001000 106##### PWCHANGE_SERVICE 0x00002000 107 108 109attributetype ( 2.16.840.1.113719.1.301.4.8.1 110 NAME 'krbTicketFlags' 111 EQUALITY integerMatch 112 SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 113 SINGLE-VALUE) 114 115 116##### The maximum ticket lifetime for a principal in seconds 117 118attributetype ( 2.16.840.1.113719.1.301.4.9.1 119 NAME 'krbMaxTicketLife' 120 EQUALITY integerMatch 121 SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 122 SINGLE-VALUE) 123 124 125##### Maximum renewable lifetime for a principal's ticket in seconds 126 127attributetype ( 2.16.840.1.113719.1.301.4.10.1 128 NAME 'krbMaxRenewableAge' 129 EQUALITY integerMatch 130 SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 131 SINGLE-VALUE) 132 133 134##### Forward reference to the Realm object. 135##### (FDN of the krbRealmContainer object). 136##### Example: cn=ACME.COM, cn=Kerberos, cn=Security 137 138attributetype ( 2.16.840.1.113719.1.301.4.14.1 139 NAME 'krbRealmReferences' 140 EQUALITY distinguishedNameMatch 141 SYNTAX 1.3.6.1.4.1.1466.115.121.1.12) 142 143 144##### List of LDAP servers that kerberos servers can contact. 145##### The attribute holds data in the ldap uri format, 146##### Examples: acme.com#636, 164.164.164.164#1636, ldaps://acme.com:636 147##### 148##### The values of this attribute need to be updated, when 149##### the LDAP servers listed here are renamed, moved or deleted. 150 151attributetype ( 2.16.840.1.113719.1.301.4.15.1 152 NAME 'krbLdapServers' 153 EQUALITY caseIgnoreMatch 154 SYNTAX 1.3.6.1.4.1.1466.115.121.1.15) 155 156 157##### A set of forward references to the KDC Service objects. 158##### (FDNs of the krbKdcService objects). 159##### Example: cn=kdc - server 1, ou=uvw, o=xyz 160 161attributetype ( 2.16.840.1.113719.1.301.4.17.1 162 NAME 'krbKdcServers' 163 EQUALITY distinguishedNameMatch 164 SYNTAX 1.3.6.1.4.1.1466.115.121.1.12) 165 166 167##### A set of forward references to the Password Service objects. 168##### (FDNs of the krbPwdService objects). 169##### Example: cn=kpasswdd - server 1, ou=uvw, o=xyz 170 171attributetype ( 2.16.840.1.113719.1.301.4.18.1 172 NAME 'krbPwdServers' 173 EQUALITY distinguishedNameMatch 174 SYNTAX 1.3.6.1.4.1.1466.115.121.1.12) 175 176 177##### This attribute holds the Host Name or the ip address, 178##### transport protocol and ports of the kerberos service host 179##### The format is host_name-or-ip_address#protocol#port 180##### Protocol can be 0 or 1. 0 is for UDP. 1 is for TCP. 181 182attributetype ( 2.16.840.1.113719.1.301.4.24.1 183 NAME 'krbHostServer' 184 EQUALITY caseExactIA5Match 185 SYNTAX 1.3.6.1.4.1.1466.115.121.1.26) 186 187 188##### This attribute holds the scope for searching the principals 189##### under krbSubTree attribute of krbRealmContainer 190##### The value can either be 1 (ONE) or 2 (SUB_TREE). 191 192attributetype ( 2.16.840.1.113719.1.301.4.25.1 193 NAME 'krbSearchScope' 194 EQUALITY integerMatch 195 SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 196 SINGLE-VALUE) 197 198 199##### FDNs pointing to Kerberos principals 200 201attributetype ( 2.16.840.1.113719.1.301.4.26.1 202 NAME 'krbPrincipalReferences' 203 EQUALITY distinguishedNameMatch 204 SYNTAX 1.3.6.1.4.1.1466.115.121.1.12) 205 206 207##### This attribute specifies which attribute of the user objects 208##### be used as the principal name component for Kerberos. 209##### The allowed values are cn, sn, uid, givenname, fullname. 210 211attributetype ( 2.16.840.1.113719.1.301.4.28.1 212 NAME 'krbPrincNamingAttr' 213 EQUALITY caseIgnoreMatch 214 SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 215 SINGLE-VALUE) 216 217 218##### A set of forward references to the Administration Service objects. 219##### (FDNs of the krbAdmService objects). 220##### Example: cn=kadmindd - server 1, ou=uvw, o=xyz 221 222attributetype ( 2.16.840.1.113719.1.301.4.29.1 223 NAME 'krbAdmServers' 224 EQUALITY distinguishedNameMatch 225 SYNTAX 1.3.6.1.4.1.1466.115.121.1.12) 226 227 228##### Maximum lifetime of a principal's password 229 230attributetype ( 2.16.840.1.113719.1.301.4.30.1 231 NAME 'krbMaxPwdLife' 232 EQUALITY integerMatch 233 SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 234 SINGLE-VALUE) 235 236 237##### Minimum lifetime of a principal's password 238 239attributetype ( 2.16.840.1.113719.1.301.4.31.1 240 NAME 'krbMinPwdLife' 241 EQUALITY integerMatch 242 SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 243 SINGLE-VALUE) 244 245 246##### Minimum number of character clases allowed in a password 247 248attributetype ( 2.16.840.1.113719.1.301.4.32.1 249 NAME 'krbPwdMinDiffChars' 250 EQUALITY integerMatch 251 SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 252 SINGLE-VALUE) 253 254 255##### Minimum length of the password 256 257attributetype ( 2.16.840.1.113719.1.301.4.33.1 258 NAME 'krbPwdMinLength' 259 EQUALITY integerMatch 260 SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 261 SINGLE-VALUE) 262 263 264##### Number of previous versions of passwords that are stored 265 266attributetype ( 2.16.840.1.113719.1.301.4.34.1 267 NAME 'krbPwdHistoryLength' 268 EQUALITY integerMatch 269 SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 270 SINGLE-VALUE) 271 272 273##### Number of consecutive pre-authentication failures before lockout 274 275attributetype ( 1.3.6.1.4.1.5322.21.2.1 276 NAME 'krbPwdMaxFailure' 277 EQUALITY integerMatch 278 SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 279 SINGLE-VALUE) 280 281 282##### Period after which bad preauthentication count will be reset 283 284attributetype ( 1.3.6.1.4.1.5322.21.2.2 285 NAME 'krbPwdFailureCountInterval' 286 EQUALITY integerMatch 287 SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 288 SINGLE-VALUE) 289 290 291##### Period in which lockout is enforced 292 293attributetype ( 1.3.6.1.4.1.5322.21.2.3 294 NAME 'krbPwdLockoutDuration' 295 EQUALITY integerMatch 296 SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 297 SINGLE-VALUE) 298 299 300##### Policy attribute flags 301 302attributetype ( 1.2.840.113554.1.4.1.6.2 303 NAME 'krbPwdAttributes' 304 EQUALITY integerMatch 305 SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 306 SINGLE-VALUE) 307 308 309##### Policy maximum ticket lifetime 310 311attributetype ( 1.2.840.113554.1.4.1.6.3 312 NAME 'krbPwdMaxLife' 313 EQUALITY integerMatch 314 SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 315 SINGLE-VALUE) 316 317 318##### Policy maximum ticket renewable lifetime 319 320attributetype ( 1.2.840.113554.1.4.1.6.4 321 NAME 'krbPwdMaxRenewableLife' 322 EQUALITY integerMatch 323 SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 324 SINGLE-VALUE) 325 326 327##### Allowed enctype:salttype combinations for key changes 328 329attributetype ( 1.2.840.113554.1.4.1.6.5 330 NAME 'krbPwdAllowedKeysalts' 331 EQUALITY caseIgnoreIA5Match 332 SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 333 SINGLE-VALUE) 334 335 336##### FDN pointing to a Kerberos Password Policy object 337 338attributetype ( 2.16.840.1.113719.1.301.4.36.1 339 NAME 'krbPwdPolicyReference' 340 EQUALITY distinguishedNameMatch 341 SYNTAX 1.3.6.1.4.1.1466.115.121.1.12 342 SINGLE-VALUE) 343 344 345##### The time at which the principal's password expires 346 347attributetype ( 2.16.840.1.113719.1.301.4.37.1 348 NAME 'krbPasswordExpiration' 349 EQUALITY generalizedTimeMatch 350 SYNTAX 1.3.6.1.4.1.1466.115.121.1.24 351 SINGLE-VALUE) 352 353 354##### This attribute holds the principal's key (krbPrincipalKey) that is encrypted with 355##### the master key (krbMKey). 356##### The attribute is ASN.1 encoded. 357##### 358##### The format of the value for this attribute is explained below, 359##### KrbKeySet ::= SEQUENCE { 360##### attribute-major-vno [0] UInt16, 361##### attribute-minor-vno [1] UInt16, 362##### kvno [2] UInt32, 363##### mkvno [3] UInt32 OPTIONAL, 364##### keys [4] SEQUENCE OF KrbKey, 365##### ... 366##### } 367##### 368##### KrbKey ::= SEQUENCE { 369##### salt [0] KrbSalt OPTIONAL, 370##### key [1] EncryptionKey, 371##### s2kparams [2] OCTET STRING OPTIONAL, 372##### ... 373##### } 374##### 375##### KrbSalt ::= SEQUENCE { 376##### type [0] Int32, 377##### salt [1] OCTET STRING OPTIONAL 378##### } 379##### 380##### EncryptionKey ::= SEQUENCE { 381##### keytype [0] Int32, 382##### keyvalue [1] OCTET STRING 383##### } 384 385attributetype ( 2.16.840.1.113719.1.301.4.39.1 386 NAME 'krbPrincipalKey' 387 EQUALITY octetStringMatch 388 SYNTAX 1.3.6.1.4.1.1466.115.121.1.40) 389 390 391##### FDN pointing to a Kerberos Ticket Policy object. 392 393attributetype ( 2.16.840.1.113719.1.301.4.40.1 394 NAME 'krbTicketPolicyReference' 395 EQUALITY distinguishedNameMatch 396 SYNTAX 1.3.6.1.4.1.1466.115.121.1.12 397 SINGLE-VALUE) 398 399 400##### Forward reference to an entry that starts sub-trees 401##### where principals and other kerberos objects in the realm are configured. 402##### Example: ou=acme, ou=pq, o=xyz 403 404attributetype ( 2.16.840.1.113719.1.301.4.41.1 405 NAME 'krbSubTrees' 406 EQUALITY distinguishedNameMatch 407 SYNTAX 1.3.6.1.4.1.1466.115.121.1.12) 408 409 410##### Holds the default encryption/salt type combinations of principals for 411##### the Realm. Stores in the form of key:salt strings. This will be 412##### subset of the supported encryption/salt types. 413##### Example: aes256-cts-hmac-sha384-192:normal 414 415attributetype ( 2.16.840.1.113719.1.301.4.42.1 416 NAME 'krbDefaultEncSaltTypes' 417 EQUALITY caseIgnoreMatch 418 SYNTAX 1.3.6.1.4.1.1466.115.121.1.15) 419 420 421##### Holds the supported encryption/salt type combinations of principals for 422##### the Realm. Stores in the form of key:salt strings. 423##### The supported encryption types are mentioned in RFC 3961 424##### The supported salt types are, 425##### NORMAL 426##### V4 427##### NOREALM 428##### ONLYREALM 429##### SPECIAL 430##### AFS3 431##### Example: aes256-cts-hmac-sha384-192:normal 432 433attributetype ( 2.16.840.1.113719.1.301.4.43.1 434 NAME 'krbSupportedEncSaltTypes' 435 EQUALITY caseIgnoreMatch 436 SYNTAX 1.3.6.1.4.1.1466.115.121.1.15) 437 438 439##### This attribute holds the principal's old keys (krbPwdHistory) that is encrypted with 440##### the kadmin/history key. 441##### The attribute is ASN.1 encoded. 442##### 443##### The format of the value for this attribute is explained below, 444##### KrbKeySet ::= SEQUENCE { 445##### attribute-major-vno [0] UInt16, 446##### attribute-minor-vno [1] UInt16, 447##### kvno [2] UInt32, 448##### mkvno [3] UInt32 OPTIONAL -- actually kadmin/history key, 449##### keys [4] SEQUENCE OF KrbKey, 450##### ... 451##### } 452##### 453##### KrbKey ::= SEQUENCE { 454##### salt [0] KrbSalt OPTIONAL, 455##### key [1] EncryptionKey, 456##### s2kparams [2] OCTET STRING OPTIONAL, 457##### ... 458##### } 459##### 460##### KrbSalt ::= SEQUENCE { 461##### type [0] Int32, 462##### salt [1] OCTET STRING OPTIONAL 463##### } 464##### 465##### EncryptionKey ::= SEQUENCE { 466##### keytype [0] Int32, 467##### keyvalue [1] OCTET STRING 468##### } 469 470attributetype ( 2.16.840.1.113719.1.301.4.44.1 471 NAME 'krbPwdHistory' 472 EQUALITY octetStringMatch 473 SYNTAX 1.3.6.1.4.1.1466.115.121.1.40) 474 475 476##### The time at which the principal's password last password change happened. 477 478attributetype ( 2.16.840.1.113719.1.301.4.45.1 479 NAME 'krbLastPwdChange' 480 EQUALITY generalizedTimeMatch 481 SYNTAX 1.3.6.1.4.1.1466.115.121.1.24 482 SINGLE-VALUE) 483 484##### The time at which the principal was last administratively unlocked. 485 486attributetype ( 1.3.6.1.4.1.5322.21.2.5 487 NAME 'krbLastAdminUnlock' 488 EQUALITY generalizedTimeMatch 489 SYNTAX 1.3.6.1.4.1.1466.115.121.1.24 490 SINGLE-VALUE) 491 492##### This attribute holds the kerberos master key. 493##### This can be used to encrypt principal keys. 494##### This attribute has to be secured in directory. 495##### 496##### This attribute is ASN.1 encoded. 497##### The format of the value for this attribute is explained below, 498##### KrbMKey ::= SEQUENCE { 499##### kvno [0] UInt32, 500##### key [1] MasterKey 501##### } 502##### 503##### MasterKey ::= SEQUENCE { 504##### keytype [0] Int32, 505##### keyvalue [1] OCTET STRING 506##### } 507 508 509attributetype ( 2.16.840.1.113719.1.301.4.46.1 510 NAME 'krbMKey' 511 EQUALITY octetStringMatch 512 SYNTAX 1.3.6.1.4.1.1466.115.121.1.40) 513 514 515##### This stores the alternate principal names for the principal in the RFC 1964 specified format 516 517attributetype ( 2.16.840.1.113719.1.301.4.47.1 518 NAME 'krbPrincipalAliases' 519 EQUALITY caseExactIA5Match 520 SYNTAX 1.3.6.1.4.1.1466.115.121.1.26) 521 522 523##### The time at which the principal's last successful authentication happened. 524 525attributetype ( 2.16.840.1.113719.1.301.4.48.1 526 NAME 'krbLastSuccessfulAuth' 527 EQUALITY generalizedTimeMatch 528 SYNTAX 1.3.6.1.4.1.1466.115.121.1.24 529 SINGLE-VALUE) 530 531 532##### The time at which the principal's last failed authentication happened. 533 534attributetype ( 2.16.840.1.113719.1.301.4.49.1 535 NAME 'krbLastFailedAuth' 536 EQUALITY generalizedTimeMatch 537 SYNTAX 1.3.6.1.4.1.1466.115.121.1.24 538 SINGLE-VALUE) 539 540 541##### This attribute stores the number of failed authentication attempts 542##### happened for the principal since the last successful authentication. 543 544attributetype ( 2.16.840.1.113719.1.301.4.50.1 545 NAME 'krbLoginFailedCount' 546 EQUALITY integerMatch 547 SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 548 SINGLE-VALUE) 549 550 551 552##### This attribute holds the application specific data. 553 554attributetype ( 2.16.840.1.113719.1.301.4.51.1 555 NAME 'krbExtraData' 556 EQUALITY octetStringMatch 557 SYNTAX 1.3.6.1.4.1.1466.115.121.1.40) 558 559 560##### This attributes holds references to the set of directory objects. 561##### This stores the DNs of the directory objects to which the 562##### principal object belongs to. 563 564attributetype ( 2.16.840.1.113719.1.301.4.52.1 565 NAME 'krbObjectReferences' 566 EQUALITY distinguishedNameMatch 567 SYNTAX 1.3.6.1.4.1.1466.115.121.1.12) 568 569 570##### This attribute holds references to a Container object where 571##### the additional principal objects and stand alone principal 572##### objects (krbPrincipal) can be created. 573 574attributetype ( 2.16.840.1.113719.1.301.4.53.1 575 NAME 'krbPrincContainerRef' 576 EQUALITY distinguishedNameMatch 577 SYNTAX 1.3.6.1.4.1.1466.115.121.1.12) 578 579 580##### A list of authentication indicator strings, one of which must be satisfied 581##### to authenticate to the principal as a service. 582##### FreeIPA OID: 583##### joint-iso-ccitt(3) country(16) us(840) organization(1) netscape(113730) 584##### ldap(3) freeipa(8) krb5(15) attributes(2) 585attributetype ( 2.16.840.1.113730.3.8.15.2.1 586 NAME 'krbPrincipalAuthInd' 587 EQUALITY caseExactMatch 588 SYNTAX 1.3.6.1.4.1.1466.115.121.1.15) 589 590 591##### A list of services to which a service principal can delegate. 592attributetype ( 1.3.6.1.4.1.5322.21.2.4 593 NAME 'krbAllowedToDelegateTo' 594 EQUALITY caseExactIA5Match 595 SUBSTR caseExactSubstringsMatch 596 SYNTAX 1.3.6.1.4.1.1466.115.121.1.26) 597 598######################################################################## 599######################################################################## 600# Object Class Definitions # 601######################################################################## 602 603#### This is a kerberos container for all the realms in a tree. 604 605objectclass ( 2.16.840.1.113719.1.301.6.1.1 606 NAME 'krbContainer' 607 SUP top 608 STRUCTURAL 609 MUST ( cn ) ) 610 611 612##### The krbRealmContainer is created per realm and holds realm specific data. 613 614objectclass ( 2.16.840.1.113719.1.301.6.2.1 615 NAME 'krbRealmContainer' 616 SUP top 617 STRUCTURAL 618 MUST ( cn ) 619 MAY ( krbMKey $ krbUPEnabled $ krbSubTrees $ krbSearchScope $ krbLdapServers $ krbSupportedEncSaltTypes $ krbDefaultEncSaltTypes $ krbTicketPolicyReference $ krbKdcServers $ krbPwdServers $ krbAdmServers $ krbPrincNamingAttr $ krbPwdPolicyReference $ krbPrincContainerRef ) ) 620 621 622##### An instance of a class derived from krbService is created per 623##### kerberos authentication or administration server in an realm and holds 624##### references to the realm objects. These references is used to further read 625##### realm specific data to service AS/TGS requests. Additionally this object 626##### contains some server specific data like pathnames and ports that the 627##### server uses. This is the identity the kerberos server logs in with. A key 628##### pair for the same is created and the kerberos server logs in with the same. 629##### 630##### krbKdcService, krbAdmService and krbPwdService derive from this class. 631 632objectclass ( 2.16.840.1.113719.1.301.6.3.1 633 NAME 'krbService' 634 SUP top 635 ABSTRACT 636 MUST ( cn ) 637 MAY ( krbHostServer $ krbRealmReferences ) ) 638 639 640##### Representative object for the KDC server to bind into a LDAP directory 641##### and have a connection to access Kerberos data with the required 642##### access rights. 643 644objectclass ( 2.16.840.1.113719.1.301.6.4.1 645 NAME 'krbKdcService' 646 SUP krbService 647 STRUCTURAL ) 648 649 650##### Representative object for the Kerberos Password server to bind into a LDAP directory 651##### and have a connection to access Kerberos data with the required 652##### access rights. 653 654objectclass ( 2.16.840.1.113719.1.301.6.5.1 655 NAME 'krbPwdService' 656 SUP krbService 657 STRUCTURAL ) 658 659 660###### The principal data auxiliary class. Holds principal information 661###### and is used to store principal information for Person, Service objects. 662 663objectclass ( 2.16.840.1.113719.1.301.6.8.1 664 NAME 'krbPrincipalAux' 665 SUP top 666 AUXILIARY 667 MAY ( krbPrincipalName $ krbCanonicalName $ krbUPEnabled $ krbPrincipalKey $ krbTicketPolicyReference $ krbPrincipalExpiration $ krbPasswordExpiration $ krbPwdPolicyReference $ krbPrincipalType $ krbPwdHistory $ krbLastPwdChange $ krbLastAdminUnlock $ krbPrincipalAliases $ krbLastSuccessfulAuth $ krbLastFailedAuth $ krbLoginFailedCount $ krbExtraData $ krbAllowedToDelegateTo $ krbPrincipalAuthInd ) ) 668 669 670###### This class is used to create additional principals and stand alone principals. 671 672objectclass ( 2.16.840.1.113719.1.301.6.9.1 673 NAME 'krbPrincipal' 674 SUP top 675 MUST ( krbPrincipalName ) 676 MAY ( krbObjectReferences ) ) 677 678 679###### The principal references auxiliary class. Holds all principals referred 680###### from a service 681 682objectclass ( 2.16.840.1.113719.1.301.6.11.1 683 NAME 'krbPrincRefAux' 684 SUP top 685 AUXILIARY 686 MAY krbPrincipalReferences ) 687 688 689##### Representative object for the Kerberos Administration server to bind into a LDAP directory 690##### and have a connection Id to access Kerberos data with the required access rights. 691 692objectclass ( 2.16.840.1.113719.1.301.6.13.1 693 NAME 'krbAdmService' 694 SUP krbService 695 STRUCTURAL ) 696 697 698##### The krbPwdPolicy object is a template password policy that 699##### can be applied to principals when they are created. 700##### These policy attributes will be in effect, when the Kerberos 701##### passwords are different from users' passwords (UP). 702 703objectclass ( 2.16.840.1.113719.1.301.6.14.1 704 NAME 'krbPwdPolicy' 705 SUP top 706 MUST ( cn ) 707 MAY ( krbMaxPwdLife $ krbMinPwdLife $ krbPwdMinDiffChars $ krbPwdMinLength $ krbPwdHistoryLength $ krbPwdMaxFailure $ krbPwdFailureCountInterval $ krbPwdLockoutDuration $ krbPwdAttributes $ krbPwdMaxLife $ krbPwdMaxRenewableLife $ krbPwdAllowedKeysalts ) ) 708 709 710##### The krbTicketPolicyAux holds Kerberos ticket policy attributes. 711##### This class can be attached to a principal object or realm object. 712 713objectclass ( 2.16.840.1.113719.1.301.6.16.1 714 NAME 'krbTicketPolicyAux' 715 SUP top 716 AUXILIARY 717 MAY ( krbTicketFlags $ krbMaxTicketLife $ krbMaxRenewableAge ) ) 718 719 720##### The krbTicketPolicy object is an effective ticket policy that is associated with a realm or a principal 721 722objectclass ( 2.16.840.1.113719.1.301.6.17.1 723 NAME 'krbTicketPolicy' 724 SUP top 725 MUST ( cn ) ) 726 727