Create a custom configuration for your ZeroTrustKerberosLink deployment
Optimized for banking, investment, and financial institutions with PCI-DSS compliance.
Designed for hospitals, clinics, and healthcare providers with HIPAA compliance.
Configured for federal, state, and local government agencies with FedRAMP compliance.
Your custom ZeroTrustKerberosLink configuration based on selected options:
# ZeroTrustKerberosLink Configuration
# Generated for: Example Corp
# High Availability Settings
ha_mode: active-active
min_nodes: 2
failover_timeout: 30s
# Kerberos Settings
kerberos:
realm: EXAMPLE.COM
service_principal: ztk/service@EXAMPLE.COM
keytab_path: /etc/ztk/service.keytab
ticket_lifetime: 8h
renewable_lifetime: 24h
# AWS Integration
aws:
region: us-east-1
session_duration: 3600
credential_rotation: enabled
# Security Settings
security:
encryption:
transit: tls1.3
at_rest: aes256
key_rotation: 7d
authentication:
mfa_enabled: true
failed_login_lockout: 5
password_policy: strong
session:
idle_timeout: 15m
max_duration: 8h
# Audit Logging
logging:
level: verbose
destinations:
- local
- syslog
- cloudwatch
retention: 2y
# Compliance
compliance:
audit_logging: verbose
log_retention: 2y