On 25/08/2023 14.20, Ole Froslie via FreeIPA-users wrote:
Hi all,
I do acknowledge that this topic has been discussed in various threads, but I 
am struggling to get it working and to understand the concepts.
My use cases are to use OTP 2FA with for example Google Authenticator as 
additional security measure for
1. access to the freeipa server itself for selected users (typically admins)
2. access to selected linux servers enrolled in FreeIPA . All users with  any 
access to these ,should always use OTP on these servers. No requirement for OTP 
for access to other servers.
3. access to applications using LDAP integrations to FreeIPA

The first use case works right out of the box. I have managed to configure 
individual users for OTP in the User Auth settings, assign tokens and get it 
working using Google Authenticated.

I am struggling with the second use case for server access.
Instead of diving into all the detailed configs and logs and to understand why 
it is not working  I would rather start with how it is supposed to work at the 
high level, to ensure I have gotten the basics correct first.

Is the use case supported at all?
How should I configure the selected users  FreeIPA  ?
How should I configure the selected hosts in FreeIPA  ?
How should I configure on the selected hosts, i.e with respect to  SSSD, PAM 
etc.

You are looking for a feature called "Kerberos authentication indicators". FreeIPA's Kerberos KDC annotates Kerberos tickets with auth indicators, e.g. user with 2FA login have an "otp" indicator in their TGT.

A host or service can require authentication indicators in two different ways:

1. The KDC can require and enforce authentication indicators when a user requests a ticket for a host or service principal. 2. SSSD can require authentication indicators for a PAM service (e.g. sudo requires 2FA).


These documents explain the feature in more details:

- https://freeipa.readthedocs.io/en/latest/workshop/11-kerberos-ticket-policy.html#enforcing-authentication-indicators
- https://www.freeipa.org/page/V4/Authentication_Indicators
- https://access.redhat.com/documentation/de-de/red_hat_enterprise_linux/7/html/linux_domain_identity_authentication_and_policy_guide/auth-indicators

--
Christian Heimes
Principal Software Engineer, Identity Management and Platform Security

Red Hat GmbH, https://de.redhat.com/ , Registered seat: Grasbrunn,
Commercial register: Amtsgericht Muenchen, HRB 153243,
Managing Directors: Charles Cachera, Brian Klemm, Laurie Krebs, Michael O'Neill
_______________________________________________
FreeIPA-users mailing list -- [email protected]
To unsubscribe send an email to [email protected]
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedorahosted.org/archives/list/[email protected]
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue

Reply via email to