
The auth event details audit key (formerly, parameter to auth_status) contained, variously, an encryption type name; a PKINIT client certificate name; or, a GSS initiator name. Audit these instead using individual keys that reflect the values' contents.
39 lines
722 B
Plaintext
39 lines
722 B
Plaintext
# $Id$
|
|
|
|
HEIMDAL_KDC_1.0 {
|
|
global:
|
|
kdc_authorize_csr;
|
|
kdc_get_instance;
|
|
kdc_issue_certificate;
|
|
kdc_log;
|
|
kdc_log_msg;
|
|
kdc_log_msg_va;
|
|
kdc_openlog;
|
|
kdc_check_flags;
|
|
kdc_validate_token;
|
|
krb5_kdc_windc_init;
|
|
krb5_kdc_get_config;
|
|
krb5_kdc_pkinit_config;
|
|
krb5_kdc_set_dbinfo;
|
|
krb5_kdc_process_krb5_request;
|
|
krb5_kdc_process_request;
|
|
krb5_kdc_save_request;
|
|
krb5_kdc_update_time;
|
|
krb5_kdc_pk_initialize;
|
|
_kdc_audit_addkv;
|
|
_kdc_audit_addkv_bool;
|
|
_kdc_audit_addkv_number;
|
|
_kdc_audit_addkv_object;
|
|
_kdc_audit_getkv;
|
|
_kdc_audit_addreason;
|
|
_kdc_audit_vaddkv;
|
|
_kdc_audit_vaddreason;
|
|
_kdc_audit_trail;
|
|
|
|
# needed for digest-service
|
|
_kdc_db_fetch;
|
|
_kdc_free_ent;
|
|
local:
|
|
*;
|
|
};
|