**+password_changing_service** marks this principal as a password
change service principal.
+{-\|+}\ **ok_to_auth_as_delegate**
+ **+ok_to_auth_as_delegate** allows this principal to acquire
+ forwardable tickets to itself from arbitrary users, for use with
+ constrained delegation.
+
+{-\|+}\ **no_auth_data_required**
+ **+no_auth_data_required** prevents PAC or AD-SIGNEDPATH data from
+ being added to service tickets for the principal.
+
**-randkey**
Sets the key of the principal to a random value.
tickets.
**no-auth-data-required**
- Enabling this flag prevents PAC data from being added to
- service tickets for the principal.
+ Enabling this flag prevents PAC or AD-SIGNEDPATH data from
+ being added to service tickets for the principal.
**ok-as-delegate**
If this flag is enabled, it hints the client that credentials
/* No point in including signedpath authdata for a cross-realm TGT, since
* it will be presented to a different KDC. */
- if (!is_cross_tgs_principal(server->princ) &&
+ if (!isflagset(server->attributes, KRB5_KDB_NO_AUTH_DATA_REQUIRED) &&
+ !is_cross_tgs_principal(server->princ) &&
!only_pac_p(context, enc_tkt_reply->authorization_data)) {
code = make_ad_signedpath(context,
for_user_princ,