[Previous] [Next] [Contents] [Index]
This chapter describes authentication topics and related tasks. It contains the following sections:
4.2 Managing DCE Authentication
4.3 Managing Invalid Login Handling
4.4 Managing Password Format Policies
4.5 Using the Password Strength Server
4.6 Managing Password Expiration
4.7 Integrated Login
4.8 Login Contexts
For a discussion of Entegrity's Co-Authentication Service (CAS) please refer to the Guide to CAS.
4.1 Understanding DCE Authentication
This section provides some general information on DCE authentication useful to those who need to administer DCE cells.
4.1.1 DCE Authentication Process
The following is a very general description of how DCE authentication works.
If the decryption fails, the keys must be different, which means the password supplied by the principal is invalid. Authentication fails and login is denied.
4.1.2 OSF DCE Version 1.1 Authentication Enhancements
OSF DCE Version 1.1 reduces the likelihood of such attacks succeeding by providing for:
The preauthentication protocols are as follows:
Table 4-1 describes how login requests are handled when OSF DCE Version 1.1 clients and servers interoperate with pre-OSF DCE Version 1.1 clients and servers in a single cell.
After a principal is authenticated, the security service obtains the principal's privilege attributes. Privilege attributes include the principal's network identity, the groups in which the principal is a member, and any extended attributes associated with the principal. Privilege attributes determine the principal's rights to any objects that principal attempts to access.
4.1.4 Ticket-Granting Tickets and Service Tickets
If you flag an account as able to renew service tickets, the principal's service tickets are renewed automatically by the authentication service, requiring no action on the principal's part. Note, however, that the lifetime allocated to a service ticket can never exceed the time remaining on the principal's ticket-granting ticket.
4.2 Managing DCE Authentication
This section describes how to manage a principal's pre-authentication protocol settings and tickets.
4.2.1 Managing Preauthentication Protocols
When the authentication service receives a login request for a principal, it always attempts to respond using the same protocol as the request, unless the pre_auth_req ERA value for that principal forbids it to do so.
4.2.1.1 Creating a Principal with the pre_auth_req ERA
dcecp> principal create fillmore -attribute {pre_auth_req 2}
4.2.1.2 Viewing a Principal's ERAs
Use the principal show principal -xattrs command to display a principal's ERAs. For example:
dcecp> principal show fillmore -xattrs
{pre_auth_req 2}
4.2.1.3 Adding the pre_auth_req ERA to an Existing Principal
dcecp> principal modify cell_admin -add {pre_auth_req 2}
4.2.1.4 Modifying a Principal's pre_auth_req ERA Value
dcecp> principal modify fillmore -change {pre_auth_req 2}
4.2.2 Managing Privilege Attributes and Tickets
This section describes how to manage a principal's pre-authentication protocol settings and tickets.
4.2.2.1 Viewing Privilege Attributes and Tickets
dcecp> klist
DCE Identity Information:
Global Principal: /.../longwood/fred
Cell: 004127b0-916c-14bf-a883-00802964ff95 /.../longwood
Principal: 00000064-916c-24bf-a800-00802964ff95 music/fred
Group: 0000000c-916d-24bf-a801-00802964ff95 composers
The Second Part of the klist DisplayExpiration Dates and Times
Identity Info Expires: 2000/02/13:00:56:13
Account Expires: 2000/12/31:12:00:00
Passwd Expires: 2000/06/30:12:00:00
The Third Part of the klist DisplayTickets
Kerberos Ticket Information:
Ticket cache: C:/PCDCE32/opt/dcelocal/var/security/creds/dcecred_00f58600
Default principal: fred@longwood
Server: krbtgt/longwood@longwood
valid 2000/02/12:14:56:13 to 2000/02/13:00:56:13
Server: dce-rgy@longwood
valid 2000/02/12:14:56:13 to 2000/02/13:00:56:13
Server: dce-ptgt@longwood
valid 2000/02/12:14:56:15 to 2000/02/12:16:56:15
Client: dce-ptgt@longwood Server: krbtgt/longwood@longwood
valid 2000/02/12:14:56:15 to 2000/02/12:16:56:15
Client: dce-ptgt@longwood Server: dce-rgy@longwood
valid 2000/02/12:14:56:15 to 2000/02/12:16:56:15
4.2.2.2 Destroying Tickets
Use the kdestroy command to invalidate the tickets that a principal has acquired.
When the principal logs out, the principal's tickets are not destroyed; they remain valid until they expire. Users may want to use kdestroy just before they log out to ensure that no valid tickets remain.
4.3 Managing Invalid Login Handling
If the user's account is disabled due to exceeding the limit set by max_invalid_attempts, the login response the user sees is identical to the response for an invalid password.
4.3.1 Creating a Principal with Attached Invalid Login ERAs
dcecp> principal create fillmore -attribute {{pre_auth_req 2}
{max_invalid_attempts 3} {disable_time_interval 60}}
4.3.2 Viewing a Principal's ERAs
Use the principal show principal -xattrs command to display a principal's ERAs. For example:
dcecp> principal show fillmore -xattrs
{pre_auth_req 2}
{max_invalid_attempts 3}
{disable_time_interval 60}
4.3.3 Adding Invalid Login ERAs to an Existing Principal
dcecp> principal modify taylor -add {{pre_auth_req 2}
{max_invalid_attempts 3} {disable_time_interval 60}}
4.3.4 Modifying a Principal's Invalid Login ERA Values
dcecp> principal modify cell_admin -change {disable_time_interval 300}
4.3.5 OSF DCE Version 1.1 Limitation
You can also use the password strength server to enforce formats for selected accounts. For information on the password strength server, refer to Section 4.5.
4.4.1 Viewing Password Format Settings
dcecp> org show zephyr -policies
{acctlife unlimited}
{pwdalpha no}
{pwdexpdate none}
{pwdlife unlimited}
{pwdminlen 0}
{pwdspaces yes}
4.4.2 Changing Password Format Settings
dcecp> registry modify /.:/subsys/dce/sec/master -change {pwdminlen 6}
dcecp> org modify zephyr -change {pwdspaces no}
4.5 Using the Password Strength Server
The password strength server performs the following functions for specified principals:
You specify which principals are subject to the password strength server by attaching ERAs to the principals specifying the service required of the password strength server and a binding to the server.
4.5.1 Configuring the Password Strength Server
Once you configure the password strength server, it runs automatically as part of the PC-DCE service. You can control it using the PC-DCE Service Panel along with the rest of the DCE processes. You can also run it from the command line as described in Section 4.5.3 on page 59.
If you want to modify the password strength server default behavior, the password strength server source code is available from The Open Group. For information, visit http://www.opengroup.org/tech/dce/mall/free_dce.htm.
4.5.2 Configuring Principals to Use the Password Strength Server
dcecp> principal create fillmore -attribute {{pwd_val_type 2} \
{pwd_mgmt_binding \
{{dce /.:/pwd_strength pktprivacy secret name} \
{/.:/subsys/dce/pwd_mgmt/pwd_strength}}}}
4.5.2.2 Viewing a Principal's ERAs
Use the principal show principal -xattrs command to display a principal's ERAs. For example:
dcecp> principal show fillmore -xattrs
{pwd_val_type 2}
{pwd_mgmt_binding {{dce /.:/pwd_strength pktprivacy secret name}
{/.:/subsys/dce/pwd_mgmt/pwd_strength}}}
4.5.2.3 Adding Password Management ERAs to a Principal
dcecp> principal modify buchanan -add {{pwd_val_type 2} \
{pwd_mgmt_binding \
{{dce /.:/pwd_strength pktprivacy secret name} \
{/.:/subsys/dce/pwd_mgmt/pwd_strength}}}}
4.5.2.4 Modifying a Principal's Password Management ERA Values
dcecp> principal modify buchanan -change {pwd_val_type 3}
4.5.2.5 Using The Binding Encoding Type
The pwd_mgmt_binding ERA uses the binding encoding type:
{{auth_serv_type name prot_level authentication_service authorization_service} {binding_info}}
Table 4-2 defines the parameters.
4.5.3 Running the Password Strength Server from the Command Line
If you wish, once the password strength server is configured (Section 4.5.1 on page 56), you can run the password strength server from the command line. You might wish to do this to override password policy for those principals that are configured to bind to the password strength server.
pwd_strengthd.exe is located in install_directory\bin. For command line arguments, refer to Section 4.5.3.1.
4.5.3.1 Overriding Policy from the Command Line
By default, the password strength server enforces standard password policy (Section 4.4 on page 54). However, if you run the password strength server from the command line, you can use command line arguments to specify a separate password policy to be used for principals configured to use this server. In addition you can control a few other server options. For descriptions of all command line options, refer to Table 4-3.
C:\>dce_login cell_admin mxydkwl
C:\>pwd_strengthd -all -m 6 -v -d
pwd_strengthd 05/06/2000 09:18:29 - Registering rsec_pwd_mgmt interface
pwd_strengthd 05/06/2000 09:18:31 - Setting up server context
pwd_strengthd 05/06/2000 09:18:33 - Listening on rsec_pwd_mgmt interface
4.5.4 Generating Randomized Passwords
dcecp> set p [account generate delilah]
newgenpwd
dcecp> account modify delilah -password $p -mycurrentpwd -dce-
dcecp> acct mod delilah -password [acct gen delilah] -mycurrentpwd -dce-
4.5.4.1 Password Generation Restriction
The password strength server generates passwords according to registry policy only. It ignores the organization policy and any policy you specify using command line switches. For example, if a principal's organization's policy requires passwords to use non-alphanumeric characters, but registry policy does not, the password strength server will generate passwords that use alphanumeric characters only. To work around this restriction, you may need to temporarily change registry policy (Section 4.4 on page 54) when creating or modifying passwords.
4.5.5 Viewing Password Strength Server Log Messages
If you run the password strength server from the command line (Section 4.5.3), you can supply the -d command line argument to run the process in the foreground, which causes log messages to be directed to standard output.
4.6 Managing Password Expiration
dcecp> org show zephyr -policies
{acctlife unlimited}
{pwdalpha no}
{pwdexpdate none}
{pwdlife unlimited}
{pwdminlen 0}
{pwdspaces yes}
4.6.2 Changing Password Expiration Settings
dcecp> registry modify /.:/subsys/dce/sec/master -change {pwdlife 7862400}
dcecp> org modify zephyr -change {pwdexpdate 2001-06-30-00:00:00}
4.6.3 Overriding Password Expiration
NOTE:
In OSF DCE Version 1.2.1, the DCE privilege server removes ERAs
from credentials requested by foreign cells. As a result, the passwd_override
ERA has no effect for logins from foreign cells.
4.6.3.1 Creating a Principal with the passwd_override ERA
dcecp> principal create fillmore -attribute {passwd_override 1}
4.6.3.2 Viewing a Principal's passwd_override ERA
Use the principal show principal -xattrs command to display a principal's ERAs. For example:
dcecp> principal show fillmore -xattrs
{passwd_override 1}
4.6.3.3 Adding the passwd_override ERA to a Principal
dcecp> principal modify cell_admin -add {passwd_override 1}
4.6.3.4 Modifying a Principal's passwd_override ERA Value
dcecp> principal modify fillmore -change {passwd_override 0}
4.7 Integrated Login
The integrated login function creates a global login context for the user. For more information on login contexts, refer to Section 4.8.
PC-DCE includes a feature called the default login context that provides behavior similar to that seen on UNIX. When a user logs into DCE using either integrated login (Section 4.7) or the dce_login command, PC-DCE creates a default login context and stores it in the registry. Any new processes created by the user inherit the default login context.
[Previous] [Next] [Contents] [Index]
To make comments or ask for help, contact support@entegrity.com.
Portions of this document were derived from materials provided by Compaq Computer Corporation. Copyright © 1998-2003 Compaq Computer Corporation.