-
Notifications
You must be signed in to change notification settings - Fork 112
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Group principal? #74
Comments
Agreed. The ability to control access by a single authorized group will be vastly superior to calling out each user that is authorized to access a location. |
Hi. Are there any news about this issue? |
No trick. To be honest, I don't even have a testbed setup for this project at this point. I'll take pull requests, but the one that would be most valuable would be adding tests :-(. |
Kerberos principals have no concept of groups at all, it's really not sensible to ask about how to make At most you could write a regex that matches multiple different principals, i.e. |
Is it possible to add a group somehow?
I tried
auth_gss_authorized_principal <group>@<realm>
(in several different formats), it gives me an 403,auth_gss_authorized_principal <username>@<realm>
works.The text was updated successfully, but these errors were encountered: