]> git.ipfire.org Git - thirdparty/samba.git/commitdiff
docs-xml: Update krb5_ccache_type documentation in pam_winbind.5 manpage
authorAndreas Schneider <asn@samba.org>
Fri, 5 Dec 2025 10:19:32 +0000 (11:19 +0100)
committerAndreas Schneider <asn@cryptomilk.org>
Thu, 26 Mar 2026 09:56:29 +0000 (09:56 +0000)
Signed-off-by: Andreas Schneider <asn@samba.org>
Reviewed-by: Alexander Bokovoy <ab@samba.org>
docs-xml/manpages/pam_winbind.conf.5.xml

index 3d9cb491505c6d86d70de95448f2602ed4d422d6..b87c210c13c445fb27530ceb1026094eb767f03b 100644 (file)
                by enabling the <parameter>krb5_auth</parameter> option, it can
                store the retrieved Ticket Granting Ticket (TGT) in a
                credential cache. The type of credential cache can be
-               controlled with this option.  The supported values are:
-               <parameter>KCM</parameter> or <parameter>KEYRING</parameter>
-               (when supported by the system's Kerberos library and
-               operating system),
-               <parameter>FILE</parameter> and <parameter>DIR</parameter>
-               (when the DIR type is supported by the system's Kerberos
-               library). In case of FILE a credential cache in the form of
-               /tmp/krb5cc_UID will be created -  in case of DIR you NEED
-               to specify a directory. UID is replaced with the numeric
-               user id. The UID directory is being created. The path up to
-               the directory should already exist. Check the details of the
-               Kerberos implementation.</para>
-
-               <para>When using the KEYRING type, the supported mechanism is
-               <quote>KEYRING:persistent:UID</quote>, which uses the Linux
-               kernel keyring to store credentials on a per-UID basis.
-               The KEYRING has its limitations. As it is secure kernel memory,
-               for example bulk storage of credentials is not possible.</para>
-
-               <para>When using the KCM type, the supported mechanism is
-               <quote>KCM:UID</quote>, which uses a Kerberos credential
-               manager to store credentials on a per-UID basis similar to
-               KEYRING. This is the recommended choice on latest Linux
-               distributions, offering a Kerberos Credential Manager. If not
-               we suggest to use KEYRING as that is the most secure and
-               predictable method.</para>
-
-               <para>It is also possible to define custom filepaths and use the "%u"
-               pattern in order to substitute the numeric user id.
-               Examples:</para>
+               controlled with this option.</para>
+
+               <para>The following simple type names are supported (these will
+               generate default paths with the user's UID):</para>
 
                <variablelist>
+                       <varlistentry>
+                               <term>KCM</term>
+                               <listitem><para>Uses Kerberos Credential Manager
+                               (generates <quote>KCM:&lt;UID&gt;</quote>). This is the
+                               recommended choice on latest Linux distributions
+                               offering a Kerberos Credential Manager.</para></listitem>
+                       </varlistentry>
+                       <varlistentry>
+                               <term>KEYRING</term>
+                               <listitem><para>Uses Linux kernel keyring
+                               (generates <quote>KEYRING:persistent:&lt;UID&gt;</quote>).
+                               The KEYRING has its limitations. As it is secure
+                               kernel memory, for example bulk storage of
+                               credentials is not possible. This is a good
+                               fallback if KCM is not available.</para></listitem>
+                       </varlistentry>
+                       <varlistentry>
+                               <term>FILE</term>
+                               <listitem><para>Uses file-based credential cache
+                               (generates <quote>FILE:/tmp/krb5cc_&lt;UID&gt;</quote>).
+                               </para></listitem>
+                       </varlistentry>
+                       <varlistentry>
+                               <term>WRFILE</term>
+                               <listitem><para>Uses file-based credential cache with
+                               write-only mode (generates <quote>WRFILE:/tmp/krb5cc_&lt;UID&gt;</quote>).
+                               </para></listitem>
+                       </varlistentry>
+               </variablelist>
+
+               <para>It is also possible to specify custom paths with explicit
+               prefixes. The following prefixes are recognized:
+               <parameter>KEYRING:type</parameter>,
+               <parameter>DIR:/path</parameter>,
+               <parameter>FILE:/path</parameter>, and
+               <parameter>WRFILE:/path</parameter>.
+               You can use the <quote>%u</quote> pattern to substitute the
+               numeric user ID. Examples:</para>
+
+               <variablelist>
+                       <varlistentry>
+                               <term>krb5_ccache_type = KEYRING:session:%u</term>
+                                       <listitem><para>This will use a session keyring for the credential cache.</para></listitem>
+                       </varlistentry>
                        <varlistentry>
                                <term>krb5_ccache_type = DIR:/run/user/%u/krb5cc</term>
                                        <listitem><para>This will create a credential cache file in the specified directory.</para></listitem>
                                <term>krb5_ccache_type = FILE:/tmp/krb5cc_%u</term>
                                        <listitem><para>This will create a credential cache file.</para></listitem>
                        </varlistentry>
+                       <varlistentry>
+                               <term>krb5_ccache_type = WRFILE:/var/lib/sss/ccache/ccache_%u</term>
+                                       <listitem><para>This will create a write-only credential cache file.</para></listitem>
+                       </varlistentry>
                </variablelist>
 
-               <para> Leave empty to just do kerberos authentication without
+               <para>Leave empty to just do kerberos authentication without
                        having a ticket cache after the logon has succeeded.
                        This setting is empty by default.