sources/kerberos: add kadmin type setting, provide additional context to property mappings (#12286)
This commit is contained in:

committed by
GitHub

parent
96b3e2b3d9
commit
deacc17832
@ -130,6 +130,18 @@ The following variable is available to Kerberos source property mappings:
|
||||
|
||||
- `principal`: a Python string containing the Kerberos principal. For example `alice@REALM.COMPANY` or `HTTP/authentik.company@REALM.COMPANY`.
|
||||
|
||||
When the property mapping is invoked from a SPNEGO context, the following variable is also available:
|
||||
|
||||
- `spnego_info`: a Python dictionary with the following keys:
|
||||
- `initiator_name`: the name of the initiator of the GSSAPI security context
|
||||
- `target_name`: the name of the target of the GSSAPI security context
|
||||
- `mech`: the GSSAPI mechanism used. Should always be Kerberos
|
||||
- `actual_flags`: the flags set on the GSSAPI security context
|
||||
|
||||
When the property mapping is invoked from a synchronization context, the following variable is also available:
|
||||
|
||||
- `principal_obj`: a [`Principal`](https://kadmin-rs.readthedocs.io/latest/kadmin.html#kadmin.Principal) object retrieved from the KAdmin API
|
||||
|
||||
## Troubleshooting
|
||||
|
||||
You can start authentik with the `KRB5_TRACE=/dev/stderr` environment variable for Kerberos to print errors in the logs.
|
||||
|
Reference in New Issue
Block a user