Managing Kerberos and Other Authentication Services in Oracle® Solaris 11.2

Exit Print View

Updated: August 2014

SASL Options

The behavior of libsasl and the plugins can be modified on the server side by using options that can be set in the /etc/sasl/app.conf file. The variable app is the server-defined name for the application. The documentation for the server app should specify the application name.

The following options are supported:


Automatically transitions the user to other mechanisms when the user does a successful plain text authentication.


Lists the name of auxiliary property plugins to use.


Selects the canon_user plugin to use.


Lists the mechanisms that are allowed to be used by the server application.


Lists the mechanisms used to verify passwords. Currently, auxprop is the only allowed value.


Sets the length of time, in minutes, that authentication information is cached for a fast reauthentication. This option is used by the DIGEST-MD5 plugin. Setting this option to 0 disables reauthentication.

The following options are not supported:


Lists available mechanisms. Not used because the option changes the behavior of the dynamic loading of plugins.


Defines the location of the saslauthd door, which is used for communicating with the saslauthd daemon. The saslauthd daemon is not included in the Oracle Solaris release. So, this option is also not included.


Defines the location of the keytab file used by the GSSAPI plugin. Use the KRB5_KTNAME environment variable instead to set the default keytab location.

The following options are options not found in Cyrus SASL. However, they have been added for the Oracle Solaris release:


Acquires the client credentials rather than use the default credentials when creating the GSS client security context. By default, the default client Kerberos identity is used.


Sets the desired level of logging for a server.