Very timely!

Folks, if you could comment on the ticket with any thoughts/comments, that
would be welcome.

I'm not sure if the user change above would require any changes in Ansible,
seems like no?




On Wed, Jul 30, 2014 at 1:22 PM, benno joy <[email protected]> wrote:

> Hi Ian,
>
> I just submitted a PR for this functionality "
> https://github.com/ansible/ansible/pull/8345"; , maybe you can have a look
> and provide some feedbacks. or maybe you have a better way of
> implementation if so please feel free to replace it.
>
> Thanks,
> Benno
>
>
>
>
>
> On Wed, Jul 30, 2014 at 10:30 PM, Ian Clegg <[email protected]>
> wrote:
>
>> Michael,
>>
>> We have tested kerberos authentication over SSL with pywinrm. The domain
>> controllers (acting KDCs) in the test configuration were 2008r2 and 2012r2,
>> at 2003 functional level. Clients were 2008r2 and 2012r2. All worked fine
>> with the latest MIT krb5 and python kerberos and pywinrm modules.
>>
>> It's something we are starting to spike at the moment, but wanted to see
>> if the feature is already being worked on/planned - don't want to mess with
>> the product strategy
>>
>> At the moment the user passes in a Windows username through
>> 'ansible_ssh_user'. It would be possible to determine whether to use basic
>> or kerberos by checking if this value is a UPN. This approach is used by
>> the Win32 API's, see LogonUser (
>> http://msdn.microsoft.com/en-gb/library/windows/desktop/aa378184(v=vs.85).aspx
>> )
>>
>> As an example:
>>
>> ansible_ssh_user: iclegg  << implicitly uses basic auth since no kerberos
>> realm is specified
>> ansible_ssh_pass: password123
>> ansible_ssh_port: 5986
>> ansible_connection: winrm
>>
>> ansible_ssh_user: iclegg@realm << implicity uses Kerberos since this not
>> a valid Windows username, but is a valid UPN ( '@' is reserved)
>> ansible_ssh_pass: password123
>> ansible_ssh_port: 5986
>> ansible_connection: winrm
>>
>> I have not looked into how kerb is done with SSH, so this suggestion may
>> not be consistent with it
>>
>> Ian
>>
>>
>> On Wednesday, 30 July 2014 17:21:11 UTC+1, Michael DeHaan wrote:
>>
>>> Hi Ian,
>>>
>>> Yeah it was recently mentioned I think that Domain auth wasn't
>>> functional - and maybe pywinrm maybe needed tweaks to enable Kerb (not
>>> true?).
>>>
>>> I'm VERY interested.
>>>
>>> Is this something you might be interested in working on?
>>>
>>>
>>>
>>> On Wed, Jul 30, 2014 at 11:53 AM, Ian Clegg <[email protected]>
>>> wrote:
>>>
>>>> Hi All,
>>>>
>>>> I think its great ansible is leveraging powershell and avoids
>>>> unnecessary agents, but using basic authentication which forces local admin
>>>> accounts on Windows wont cut it. Local Admin accounts are generally viewed
>>>> as a security risk and a nightmare to manage. We've got 50K+ hosts
>>>> deployed. As we know, Microsoft's WS-Man implementation, WinRM only
>>>> supports domain credentials when using Negotiate, CredSSP and Kerberos.
>>>> CredSSP enables 'double hop', but it will probably be the most work -
>>>> pywinrm (already used by ansible) has working support for Kerberos (we've
>>>> tested it)
>>>>
>>>> Is anyone looking into plugging kerberos support into ansible for
>>>> authenticating to Windows hosts?
>>>>
>>>> Ian
>>>>
>>>>  --
>>>> You received this message because you are subscribed to the Google
>>>> Groups "Ansible Project" group.
>>>> To unsubscribe from this group and stop receiving emails from it, send
>>>> an email to [email protected].
>>>> To post to this group, send email to [email protected].
>>>>
>>>> To view this discussion on the web visit https://groups.google.com/d/
>>>> msgid/ansible-project/df22cd58-359c-4342-8e21-
>>>> fc278a65b954%40googlegroups.com
>>>> <https://groups.google.com/d/msgid/ansible-project/df22cd58-359c-4342-8e21-fc278a65b954%40googlegroups.com?utm_medium=email&utm_source=footer>
>>>> .
>>>> For more options, visit https://groups.google.com/d/optout.
>>>>
>>>
>>>  --
>> You received this message because you are subscribed to the Google Groups
>> "Ansible Project" group.
>> To unsubscribe from this group and stop receiving emails from it, send an
>> email to [email protected].
>> To post to this group, send email to [email protected].
>> To view this discussion on the web visit
>> https://groups.google.com/d/msgid/ansible-project/cd39b936-03a6-499f-a930-5c39d632781e%40googlegroups.com
>> <https://groups.google.com/d/msgid/ansible-project/cd39b936-03a6-499f-a930-5c39d632781e%40googlegroups.com?utm_medium=email&utm_source=footer>
>> .
>>
>> For more options, visit https://groups.google.com/d/optout.
>>
>
>  --
> You received this message because you are subscribed to the Google Groups
> "Ansible Project" group.
> To unsubscribe from this group and stop receiving emails from it, send an
> email to [email protected].
> To post to this group, send email to [email protected].
> To view this discussion on the web visit
> https://groups.google.com/d/msgid/ansible-project/CAFUV_d4L%3DaRKWUqrk1bkymu5GNB%2BgtP32q2HnfKWBwQXzFbH7Q%40mail.gmail.com
> <https://groups.google.com/d/msgid/ansible-project/CAFUV_d4L%3DaRKWUqrk1bkymu5GNB%2BgtP32q2HnfKWBwQXzFbH7Q%40mail.gmail.com?utm_medium=email&utm_source=footer>
> .
>
> For more options, visit https://groups.google.com/d/optout.
>

-- 
You received this message because you are subscribed to the Google Groups 
"Ansible Project" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To post to this group, send email to [email protected].
To view this discussion on the web visit 
https://groups.google.com/d/msgid/ansible-project/CA%2BnsWgzFS1ETxwbye_X7z2%3DSJDCZucku5aYMS-_PMG3Q1GrwpQ%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.

Reply via email to