Security server environment variables
| Environment Variable | Explanation |
|---|---|
| SKDC_CONSOLE_LEVEL | Specifies the message level for console logging. Kerberos security server messages are logged on the system console if the message severity is greater than or equal to the specified severity level. The valid severity levels are I, W, E, and A. The default is E if this environment variable is not defined. |
| SKDC_CREDS_SIZE | Specifies the credentials data space size in kilobytes, with a minimum value of 1024, a maximum value of 2097148, and a default value of 20480. The Kerberos security server stores cross-memory credentials in this data space. |
| SKDC_DATABASE | Specifies the type of registry database that
is used by the security server:
|
| SKDC_FIPSLEVEL | Specifies the FIPS level which the KDC will conform. The values can
be one of the following in the envar file:
Note: The SKDC_FIPSLEVEL should match the fipslevel setting in the Kerberos configuration file
used by the KDC(/etc/skrb/krb5.conf or file specified by KRB5_CONFIG environment
variable).
|
| SKDC_KADMIN_PORT | Specifies the administration service port number. If this environment variable is not defined, the administration service port is obtained from the kerberos-adm entry in the TCP/IP services files. If this entry is not defined, the administration service port defaults to 749. The administration service uses just the TCP protocol. |
| SKDC_KPASSWD_PORT | Specifies the password change service port number. If this environment variable is not defined, the password change service port is obtained from the kpasswd entry in the TCP/IP services file. If this entry is not defined, the password change service port defaults to 464. The password change service uses both the UDP and TCP protocols. |
| SKDC_KPROP_INTERVAL | Specifies the database propagation interval in minutes and defaults to 15. The security server sends the current registry database to each secondary security server that is using the full replacement protocol. This propagation occurs at the end of each propagation interval. No propagation is done if the database is not changed since the last propagation. Secondary security servers that are using the update protocol receive database updates immediately and do not wait for the end of a propagation interval. |
| SKDC_KPROP_PORT | Specifies the database propagation port number. If this environment variable is not defined, the database propagation port is obtained from the krb5_prop entry in the TCP/IP services file. If this entry is not defined, the database propagation service port defaults to 754. Database propagation uses just the TCP protocol. |
| SKDC_LOCAL_THREADS | Specifies the number of threads to be used for local requests that use the S/390® Program Call instruction to communicate with the security server. The default value is 10 and the minimum value is 2. |
| SKDC_LOGIN_AUDIT | Specifies the wanted auditing level for login attempts (that is, granting a
Kerberos initial ticket). The following values are allowed:
|
| SKDC_NETWORK_POLL | Specifies the network interface poll interval in minutes and defaults to 5. The security server queries the network configuration at the end of each poll interval to detect new network interfaces or the activation of a failed network interface. |
| SKDC_NETWORK_THREADS | Specifies the number of threads to be used for remote requests that use TCP/IP to communicate with the security server. The default value is 10 and the minimum value is 2. |
| SKDC_PORT | Specifies the KDC port number. If this environment variable is not defined, the KDC port is obtained from the kerberos entry in the TCP/IP services file. If this entry is not defined, the KDC port defaults to 88. The KDC uses both the UDP and the TCP protocols. |
| SKDC_PKINIT_REQUIRED | Specifies whether the Public Key authentication
method (PKINIT) in the Authentication Service (AS) exchange is required.
The following are valid values:
|
| SKDC_PKINIT_KEYRING | Specifies the key store to be used for PKINIT. The value is in the format of <owner id>/<ring name> or token name in the format of *TOKEN*/token name, or key database name in the format of full path key database name. For key database, a stash file also needs to be specified for the following SKDC_PKINIT_KEYRING_STASH keyword. |
| SKDC_PKINIT_KEYRING_STASH | Specifies the full path name of the key database stash file that contains the password of the key database. If the value of SKDC_PKINIT_KEYRING is a key database file, this entry is required. |
| SKDC_PKINIT_REQUIRE_EKU | Specifies whether the KDC requires the client certificate
used for PKINIT to have the extended keyusage extension. The following
are valid values:
|
| SKDC_PKINIT_REQUIRE_ REVOCATION_CHECKING | Specifies whether revocation checking is needed
and what checking methods to use in PKINIT during the verification
of the client certificate. Multiple checking methods can be specified
separated by a comma or blanks. The valid values are as follows. The order of checking is the order that they are specified. If 'none' or any invalid value is specified in the list, no revocation is checked.
|
| SKDC_PKINIT_LDAP_SERVER | Specifies the LDAP server location where the LDAP directory entry containing the certificate revocation list (CRL) is stored. The LDAP server is specified as: hostname[:port-number], port-number is assumed to be 389 if not specified. This is required when SKDC_PKINIT_REQUIRE_ REVOCATION_CHECKING specifies ldap. |
| SKDC_PKINIT_DH_MIN_BITS | Specifies the KDC policy for the minimum Diffie-Hellman key size (in bits) to be allowed on inbound AS requests by using PKINIT. A request that uses a DH key size smaller than this value is rejected by the KDC and the KDC returns a list of supported sizes. Valid key sizes are 1024 and 2048, and defaults to 2048 if not specified or if an unsupported value is specified. |
| SKDC_TKT_ENCTYPES | Specifies the encryption types to be used for ticket-granting tickets and for service tickets. This is a list of one or more encryption types that are separated by commas, which are specified from most-preferred to least-preferred. When generating a ticket, the KDC selects the first entry in the list that is available for the server that is specified in the ticket. The KDC uses des-cbc-crc if this environment variable is not defined. Refer to Security runtime configuration profilefor a list of available encryption types. The encryption types that are specified by the SKDC_TKT_ENCTYPES environment variable are also used by the Kerberos administration server when it generates new keys for a principal and no encryption types are specified by the administration request. |