On 09.05.2013 12:33, David Young wrote:
> Hi all,
>
> My first post to the list - I've been harassing @icinga on ADN and
> Twitter lately,

Better just come here, or the forums as this will allow more people 
read/discuss than the 140 chars limitation. (and I'm sure Amanda will 
redirect you here to the tech guys anyway).

> just replaced 2 standalone Nagios installations with a
> single Icinga instance with a gearman component, monitoring 166 hosts
> and 1315 services, lots of green :)
>
> My first question then.. I want to provide icinga-web to my users, but
> we have fairly stringent security requirements. I'm currently meeting
> these requirements using Classic UI as follows:
>
> * Any /icinga/ URL has to be requested from an approved IP (no user auth)
> * cgi-bin/cmd.cgi has to be requested from an approved IP _AND_ provide
> a username authenticated against our LDAP store (using apache ldapz module)
>
> This enables normal users to browse the GUI without having to
> authenticate (provided they're on our VPN), but requires more
> accountability when taking actions which could impact alarming.
>
> I've stumbled across this post
> (http://comments.gmane.org/gmane.comp.monitoring.icinga.user/434), which
> details how I might provide access to icinga-web using apache ldapz
> again, but I'd want to do the same trick re forcing authentication when
> running commands, but allowing read-only access when browsing.
>
> I'm wondering whether I can do this by applying the same restriction to
> /icinga-web/modules/cronks/commandproc ?
>
> Does anybody else have any experience doing this?

Not sure if I got you correctly, but this is how I would do it:

- do not provide any webpage without authentication before (use an sso 
provider for multiple data locations, like /icinga, /icinga-web, 
/pnp4nagios etc if required)
- alter auth.xml in etc/conf.d to use the ldap provider, but keep the 
root user based on internal (local fallback if ldap gone)
. new users imported from ldap should get the icinga_users role 
assigned. change its privilege do disallow sending of critical commands

If you really want to follow the ip based approach, fiddle with the 
apache config and "allow from" in order to drop access here. Yet better 
- use iptables in the first place.
Putting an authentication popup when sending commands isn't possible 
with Icinga Web as far as I know, but that should be solvable with a 
dedicated user's login required for the session and the sending of 
commands. Not sure if such an additional security question could be 
implemented with the current framework itsself. Limiting access to 
commandproc sounds interesting, never tried that - maybe you'll do and 
report back.

kind regards,
Michael




-- 
DI (FH) Michael Friedrich

mail:     michael.friedr...@gmail.com
twitter:  https://twitter.com/dnsmichi
jabber:   dnsmi...@jabber.ccc.de
irc:      irc.freenode.net/icinga dnsmichi

icinga open source monitoring
position: lead core developer
url:      https://www.icinga.org


------------------------------------------------------------------------------
AlienVault Unified Security Management (USM) platform delivers complete
security visibility with the essential security capabilities. Easily and
efficiently configure, manage, and operate all of your security controls
from a single console and one unified framework. Download a free trial.
http://p.sf.net/sfu/alienvault_d2d
_______________________________________________
icinga-users mailing list
icinga-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/icinga-users

Reply via email to