summaryrefslogtreecommitdiff
path: root/source3/winbindd
diff options
context:
space:
mode:
authorDan Sledz <dsledz@isilon.com>2009-01-15 17:02:41 -0800
committerSteven Danneman <steven.danneman@isilon.com>2009-02-01 20:23:31 -0800
commitd96248a9b46559552f53b0ecd3861387ea7ff050 (patch)
treee7d5f3d00f0831d1cb2c4315cd2fa7e1de6abaf6 /source3/winbindd
parentd75b3913c9e03ff97336aa7a6e1cbac2eb03f230 (diff)
downloadsamba-d96248a9b46559552f53b0ecd3861387ea7ff050.tar.gz
samba-d96248a9b46559552f53b0ecd3861387ea7ff050.tar.bz2
samba-d96248a9b46559552f53b0ecd3861387ea7ff050.zip
Add two new parameters to control how we verify kerberos tickets. Removes lp_use_kerberos_keytab parameter.
The first is "kerberos method" and replaces the "use kerberos keytab" with an enum. Valid options are: secrets only - use only the secrets for ticket verification (default) system keytab - use only the system keytab for ticket verification dedicated keytab - use a dedicated keytab for ticket verification. secrets and keytab - use the secrets.tdb first, then the system keytab For existing installs: "use kerberos keytab = yes" corresponds to secrets and keytab "use kerberos keytab = no" corresponds to secrets only The major difference between "system keytab" and "dedicated keytab" is that the latter method relies on kerberos to find the correct keytab entry instead of filtering based on expected principals. The second parameter is "dedicated keytab file", which is the keytab to use when in "dedicated keytab" mode. This keytab is only used in ads_verify_ticket.
Diffstat (limited to 'source3/winbindd')
-rw-r--r--source3/winbindd/winbindd_dual.c2
1 files changed, 1 insertions, 1 deletions
diff --git a/source3/winbindd/winbindd_dual.c b/source3/winbindd/winbindd_dual.c
index 1385c76bae..d40bab94ef 100644
--- a/source3/winbindd/winbindd_dual.c
+++ b/source3/winbindd/winbindd_dual.c
@@ -1360,7 +1360,7 @@ static bool fork_domain_child(struct winbindd_child *child)
}
if (child->domain && child->domain->primary &&
- !lp_use_kerberos_keytab() &&
+ !USE_KERBEROS_KEYTAB &&
lp_server_role() == ROLE_DOMAIN_MEMBER) {
struct timeval next_change;