2.2.2 Kerberos Policy
This section defines settings that enable an administrator to configure user logon restrictions, as specified in [RFC1510].
The ABNF for this section MUST be as follows.
-
Header = "[" HeaderValue "]" LineBreak HeaderValue = "Kerberos Policy" Settings = Setting / Setting Settings Setting = Key Wsp "=" Wsp Value LineBreak Key = "MaxTicketAge" / "MaxRenewAge" / "MaxServiceAge" / "MaxClockSkew" / "TicketValidateClient" Value = 1*5DIGIT
The following table provides an explanation for each of the valid key values.
Note All numerical values are decimal unless explicitly specified otherwise or preceded by 0x. Group Policy: Security Protocol Extension implementations SHOULD use the specified default values.
Setting key |
Explanation |
---|---|
MaxServiceAge |
Maximum amount of time (in minutes) that a granted session ticket MUST be valid to access a service or resource by using Kerberos before it expires. An expired ticket MUST NOT be accepted as a valid ticket for service or resource access. Details about Kerberos ticket authentication are as specified in [RFC1510]. The value MUST be greater than or equal to 10 and less than or equal to the setting for MaxTicketAge. The default is 600 minutes (10 hours). |
MaxTicketAge |
Maximum amount of time (in hours) that a user's ticket-granting ticket (TGT) MAY be used before it expires. An expired TGT MUST NOT be accepted as a valid TGT. The default is 10 hours. The value MUST be between zero and 99,999. |
MaxRenewAge |
Period of time (in days) during which a user's TGT can be renewed. A TGT MUST NOT be renewed if it is more than MaxRenewAge days old. The default is 7 days. The value MUST be between zero and 99,999. |
MaxClockSkew |
MUST be the maximum time difference (in minutes) between the client clock time and the clock time of the server that provides Kerberos v5 authentication, as specified in [RFC1510]. The default is 5 minutes. The value MUST be between zero and 99,999. |
TicketValidateClient |
A flag that determines whether the Kerberos v5 Key Distribution Center (KDC) MUST validate every request for a session ticket against the user rights policy of the user account. Validation of each request for a session ticket is optional because the extra step takes time and can slow network access to services. The default is enabled. A nonzero value indicates the policy is enabled; otherwise, the policy is disabled. |