What I am looking for is the
configuration of the MacOSX client. When I monitor with
wireshark the only time I can see a pkinit AS_REQ is using the
commandline:
kinit -C KEYCHAIN:
But only after I have already unlocked the PIV keychain.
The MacOSX 10.9.5 or 10.10 systems have an /etc/krb5.conf that has
the following pkinit configuration, under the realms stanza for
both an MIT KDC and Windows KDC who are enabled for pkinit. Note
you don't need the "krbtgt/realm@realm" in the KDC cert SAN if you
set pkinit_require_krbtgt_otherName to false:
pkinit_identities = KEYCHAIN:
pkinit_anchors=
FILE:/usr/local/kerberos/config/etc/pkinit/certificates/trusted-ca
pkinit_require_crl_checking = false
pkinit_kdc_hostname = Hostname_of_KDC
pkinit_cert_match =
&&<EKU>msScLogin,<KU>digitalSignature
pkinit_cert_match = <SAN>.*@FEDIDCARD.GOV
pkinit_require_krbtgt_otherName = false
The problem is I never see pam_opendirectory or pam_krb5 make a
Kerberos authentication call (AS_REQ) using the PKINIT preauth
data (image below).
After installing the smartcard services and doing the steps below,
I can use the PIV for login and for screenlock, but no Kerberos
calls take place.
- security authorizationdb smartcard enable
- Insert smartcard for USER
- sc_auth accept -u USER –k PIV
An Apple document talked about configuring
/etc/cacloginconfig.plist, which I did, but no change.
So I am curious if anyone has it working outside of using the
kinit commandline?
Thanks
Glenn
Kerberos AS_REQ using pkinit preauth data (padata):
On 8/30/15 9:12 PM, Burgin, Thomas (NIH/NIMH) [C] wrote: