tree: 81ebce1284cc826269fc84996e74e62d6530f2cc [path history] [tgz]
  1. dbus/
  2. dbus_bindings/
  3. init/
  4. proto/
  5. seccomp/
  6. setuid_restrictions/
  7. account_manager.cc
  8. account_manager.h
  9. account_manager_test.cc
  10. BUILD.gn
  11. config_parser.cc
  12. config_parser.h
  13. config_parser_fuzzer.cc
  14. config_parser_fuzzer.dict
  15. config_parser_test.cc
  16. DIR_METADATA
  17. error_strings.cc
  18. error_strings.h
  19. fake_krb5_interface.cc
  20. fake_krb5_interface.h
  21. kerberos_adaptor.cc
  22. kerberos_adaptor.h
  23. kerberos_adaptor_test.cc
  24. kerberos_daemon.cc
  25. kerberos_daemon.h
  26. kerberos_metrics.cc
  27. kerberos_metrics.h
  28. kerberos_metrics_test.cc
  29. kerberosd_main.cc
  30. krb5_interface.h
  31. krb5_interface_impl.cc
  32. krb5_interface_impl.h
  33. krb5_interface_impl_test.cc
  34. krb5_jail_wrapper.cc
  35. krb5_jail_wrapper.h
  36. krb5_jail_wrapper_test.cc
  37. OWNERS
  38. platform_helper.cc
  39. platform_helper.h
  40. README.md
  41. tgt_renewal_scheduler.cc
  42. tgt_renewal_scheduler.h
  43. tgt_renewal_scheduler_test.cc
kerberos/README.md

Kerberos

This directory contains the Kerberos service, which provides functionality for getting and managing Kerberos tickets (including auto-renewing tickets). It is used by Chrome to provide Kerberos Single-SignOn (SSO). Think of it as a fancy wrapper around kinit, kpasswd and klist.

The service is started by Chrome on demand, e.g. when the user navigates to the Kerberos Accounts settings page or when accounts are added by the KerberosAccounts user policy. Therefore, the service runs within a user session only.

Note that Chrome only uses this service if the kerberos.enabled pref is enabled. The KerberosEnabled policy maps to that pref. As a consequence, Kerberos Service is restricted to managed devices, for the time being.