4 security IDL structures
7 import
"misc.idl", "security.idl", "lsa.idl", "krb5pac.idl";
11 typedef [public] enum {
12 SEC_AUTH_METHOD_UNAUTHENTICATED
= 0,
13 SEC_AUTH_METHOD_NTLM
= 1,
14 SEC_AUTH_METHOD_KERBEROS
= 2
17 /* This is the parts of the session_info that don't change
18 * during local privilage and group manipulations */
19 typedef [public] struct {
20 utf8string account_name
;
21 utf8string domain_name
;
24 utf8string logon_script
;
25 utf8string profile_path
;
26 utf8string home_directory
;
27 utf8string home_drive
;
28 utf8string logon_server
;
33 NTTIME last_password_change
;
34 NTTIME allow_password_change
;
35 NTTIME force_password_change
;
38 uint16 bad_password_count
;
45 /* This information is preserved only to assist torture tests */
46 typedef [public] struct {
47 /* Number SIDs from the DC netlogon validation info */
49 [size_is(num_dc_sids
)] dom_sid dc_sids
[*];
50 PAC_SIGNATURE_DATA
*pac_srv_sig
;
51 PAC_SIGNATURE_DATA
*pac_kdc_sig
;
52 } auth_user_info_torture
;
54 typedef [public] struct {
58 * For performance reasons we keep an alpha_strcpy-sanitized version
59 * of the username around as long as the global variable current_user
60 * still exists. If we did not do keep this, we'd have to call
61 * alpha_strcpy whenever we do a become_user(), potentially on every
62 * smb request. See set_current_user_info in source3.
64 utf8string sanitized_username
;
65 } auth_user_info_unix
;
67 /* This is the interim product of the auth subsystem, before
68 * privileges and local groups are handled */
69 typedef [public] struct {
71 [size_is(num_sids
)] dom_sid sids
[*];
73 DATA_BLOB user_session_key
;
74 DATA_BLOB lm_session_key
;
77 typedef [public] struct {
78 security_token
*security_token
;
79 security_unix_token
*unix_token
;
81 auth_user_info_unix
*unix_info
;
82 DATA_BLOB session_key
;
83 DATA_BLOB exported_gssapi_credentials
;
84 } auth_session_info_transport
;