Closed pki-bot closed 4 years ago
Comment from cfu (@cfu) at 2015-02-24 04:46:21
plugin for rhcs8.1 UseridPwdDirAuthentication.java
Comment from cfu (@cfu) at 2015-02-24 04:46:41
base plugin for rhcs8.1 DirBasedAuthentication.java
Comment from cfu (@cfu) at 2015-02-24 04:46:59
build script for rhcs8.1 build.sh
Comment from cfu (@cfu) at 2015-02-24 05:01:57
The above plugin code and build script are for rhcs8.1. They are attached here for conversion to Dogtag. The code is rough and needs cleaning and review.
Here is how I build on rhcs8.1: Say, the attached files are downloaded into a directory called plugins,
Here is how to make cs run with these plugins:
Comment from mharmsen (@mharmsen) at 2015-02-24 23:20:58
Per 10.2.2 Triage meeting of 02/24/2015: 10.2.2 (need to determine who can work on this)
Comment from ftweedal (@frasertweedale) at 2015-03-16 08:27:08
merged patch pki-frasertweedale-0027-5-Store-groups-on-AuthToken-and-update-group-evaluator.patch
Comment from ftweedal (@frasertweedale) at 2015-03-16 08:27:53
pushed to master (f98e599)
Comment from ftweedal (@frasertweedale) at 2015-03-25 09:08:12
Configuration options:
boolean
, enable retrieval of groups (default = false
)ou=groups
)groupofuniquenames
, groupofnames
} (default = groupofuniquenames
)cn
)uid
)boolean
, whether to search group object member attribute for userdn or ${groupUserIdName}=${uid}
(default: true
)Example configuration.
Add to conf/ca/CS.cfg
:
auths.instance.UserDirEnrollment.pluginName=UidPwdDirAuth
auths.instance.UserDirEnrollment.ldap.basedn=cn=users,cn=accounts,dc=ipa,dc=local
auths.instance.UserDirEnrollment.ldap.groupObjectClass=groupofnames
auths.instance.UserDirEnrollment.ldap.groups=cn=groups
auths.instance.UserDirEnrollment.ldap.groupsBasedn=cn=accounts,dc=ipa,dc=local
auths.instance.UserDirEnrollment.ldap.groupsEnable=true
auths.instance.UserDirEnrollment.ldap.ldapconn.host=ipa-2.ipa.local
auths.instance.UserDirEnrollment.ldap.ldapconn.port=636
auths.instance.UserDirEnrollment.ldap.ldapconn.secureConn=true
Finally you must tell a profile to use the UserDirEnrollment
auth instance defined in CS.cfg
, and (if appropriate in your case) provide an ACL for authorization based on groups, in ca/profiles/ca/<profile_id>.cfg
. The following is an example only; see also general ACL documentation:
auth.instance_id=UserDirEnrollment
authz.acl=group="cn=devlab-access,ou=engineering,dc=example,dc=com"
Comment from cfu (@cfu) at 2017-02-27 14:11:58
Metadata Update from @cfu:
This issue was migrated from Pagure Issue #1174. Originally filed by cfu (@cfu) on 2014-10-06 20:44:45:
Currently the existing directory-based authentication does not provide group information in the returned AuthToken, and the existing authorization evaluation does not evaluate such group membership if it is not in the internaldb. We should