I'm looking for an option - eventually to extend standard ssh - in such a way
that I need (at least) two people/keys out of m possible to authenticate a
session instead of one out of m known once...
e.g:
to authenticate to server X : I need two people A and (B or C) together.
anyone seen this o
w how to do?
[https://media.licdn.com/mpr/mpr/shrinknp_200_200/AAEAAQk9JGYxOTFhYzdjLWIyMTgtNDQ2Yy1iOWI5LWQ2NDgxMWFjMWU5ZQ.jpg]
Oucema Bellagha
DevOps Engineer specialized in Cloud Computing and IT infrastructures
m: +4915781042392
e: oucema.bella...@hotmai
Hi folks,
After establishing the trust between AD and IPA, users from AD can authenticate
to Linux servers using password, but I want to add a another authentication
method using ssh-key.
I can add SSH-key to AD users by adding a new schema attribute but then the
ssh-key can't be managed by IP
Hi,
As of now, we have FreeIPA with OTP working perfectly. Now, I am looking at
possibly integrating Duo security instead of FreeIPA's 2FA. I am concerned
about how it will fit in with FreeIPA... Has anyone else tried this before? If
so, are there any pitfalls or problems you have encountered
Hi Linux folks,
After setting up the one-way trust between IPA - AD, users from AD can
authenticate to Linux resources using their own keys, that's great but now I
want to add a second factor authentication for those AD users which is public
key authentication, is that possible?
I mean we ca
I want to figure out a solution which allow user"a" to authenticate to a host
only when user"b" is accessing the host for security reasons.
Easy explanation: authenticate to hostx needs (user a + user b)
I'm brainstorming some ideas using Yubikey or ssh-keys.. Is there any
application which a
while I'm trying to add an ipa token to freeipa server: ipa
otptoken-add-yubikey --slot=2
I got the following error:
ipa: ERROR: non-public: ValueError: No backend available
Traceback (most recent call last):
File "/usr/lib/python2.7/site-packages/ipalib/backend.py", line 137, in
execute
r