data:
krb5.conf: |-
# To opt out of the system crypto-policies configuration of krb5, remove the
# symlink at /etc/krb5.conf.d/crypto-policies which will not be recreated.
# includedir /etc/krb5.conf.d/
# my myorg krb5.conf file
includedir /etc/krb5.conf.d/
[libdefaults]
default_realm = MYORG.DOM
# The follodomg krb5.conf variables are only for MIT Kerberos.
kdc_timesync = 1
ccache_type = 4
forwardable = true
proxiable = true
# The follodomg encryption type specification will be used by MIT Kerberos
# if uncommented. In general, the defaults in the MIT Kerberos code are
# correct and overriding these specifications only serves to disable new
# encryption types as they are added, creating interoperability problems.
#
# The only time when you might need to uncomment these lines and change
# the enctypes is if you have local software that will break on ticket
# caches containing ticket encryption types it doesn't know about (such as
# old versions of Sun Java).
# default_tgs_enctypes = des3-hmac-sha1
# default_tkt_enctypes = des3-hmac-sha1
# permitted_enctypes = des3-hmac-sha1
# The follodomg libdefaults parameters are only for Heimdal Kerberos.
fcc-mit-ticketflags = true
[realms]
MYORG.DOM = {
kdc = dc1.myorg.dom
kdc = dc2.myorg.dom
admin_server = dc1.myorg.dom
default_domain = MYORG.DOM
}
[domain_realm]
.myorg.dom = MYORG.DOM
Is there a kind soul out there that cloud integrate those krb5.conf settings with these extra mounts into my deployment ? Thanks.