[Freeipa-users] Fwd: 2-Factor and services

Matt Wells matt.wells at mosaic451.com
Mon Mar 2 05:49:28 UTC 2015


Is Kerberos the only mechanism in IDM using OTP?

On Sun, Mar 1, 2015 at 6:40 PM, Dmitri Pal <dpal at redhat.com> wrote:

> On 02/27/2015 11:37 AM, Matt Wells wrote:
>
>> I see how that would work but as you mentioned, I no longer have SSO.
>>
>> My desktops are all 3.  Linux, Mac and Windows however the Windows
>> systems talk with AD and a trust exists to facilitate those
>> communications and SSO between the systems.
>>
>> It doesn't sound like this is really possible without the heavy loss
>> of functionality.  This would be an amazing option to add though.  The
>> ability to define a service and prioritize an authentication
>> mechanism.
>>
>
> On Mac and Windows you would not get SSO anyways because Kerberos on thos
> platforms does not support latest RFCs related to 2FA at least yet and
> since they are proprietary it is unclear what their plans are.
>
> The problem we also have is that there is no way to be selective on the
> KDC/DS side - there is no way to determine what the client is and associate
> some policies to it.
> It would have to be the client that would have to have capability to
> enforce or not enforce 2FA if the server supports both. But again that
> means that Mac and Windows would have to keep up with this capability.
>
> Bottom line it is a popular request but it is unclear how we can satisfy
> it.
>
>
>
>>
>> On Thu, Feb 26, 2015 at 2:09 PM, Dmitri Pal <dpal at redhat.com> wrote:
>>
>>> On 02/26/2015 12:40 PM, Matt Wells wrote:
>>>
>>>> Had an error on my options for the list and the replies failed to get
>>>> to me. We'll see if this reply works.  :)
>>>>
>>>> @Dmitri - Anyone coming through this service/host (OpenVPN with pam)
>>>> will be required to use 2-Factor.  Their normal logins at their desk
>>>> are not required for 2-factor, it's ok if they use it but it's not
>>>> required at all.
>>>> This VPN service is as assumed, exposed to the internet.  We're
>>>> wanting to protect ourselves as best we can with AAA.
>>>>
>>>
>>> If we just talking about managing users in IdM and having tokens for them
>>> managed in IdM too then the recommendation is:
>>>
>>> - Set users to use OTP or password (set both check boxes)
>>> - Configure VPN to use Kerberos authentication against IPA - that will
>>> force
>>> use of 2FA with the policy above
>>> - Configure computers at the desk to use LDAP (you loose Kerberos SSO) -
>>> that would allow single factor with the policy above
>>>
>>> What are your desktops? Lunux? Mac?
>>> Is there any AD involved?
>>>
>>>
>>>
>>>
>>>
>>>> -------------------------------
>>>> I've got many of users setup with 2-Factor and I'd like to enforce it
>>>> with some services.
>>>> For example.
>>>> Server vpn.example.com is an openvpn servers setup to use PAM.
>>>> Since he's tied to my 4.X IDM servers I can use 2-Factor with him.
>>>> However I want to enforce that users from this system/service require
>>>> 2-Factor.
>>>> Can anyone point me in the right direction?  My Google Foo is showing
>>>> to be poor on this one and any guidance would be appreciated.
>>>>
>>>> As always thanks for taking the time to read over this.
>>>>
>>>>
>>>> So do you want to use 2FA for some users and 1FA for others or do you
>>>> want to have flexibility to use 2FA for the same user on one system
>>>> and not another?
>>>> Do you plan to use external tokens like RSA or you plan to use native
>>>> OTP support in IPA?
>>>>
>>>>
>>>>
>>>>
>>>> --
>>>> Thank you,
>>>> Dmitri Pal
>>>>
>>>> Sr. Engineering Manager IdM portfolio
>>>> Red Hat, Inc.
>>>>
>>>>
>>>>
>>> --
>>> Thank you,
>>> Dmitri Pal
>>>
>>> Sr. Engineering Manager IdM portfolio
>>> Red Hat, Inc.
>>>
>>> --
>>> Manage your subscription for the Freeipa-users mailing list:
>>> https://www.redhat.com/mailman/listinfo/freeipa-users
>>> Go To http://freeipa.org for more info on the project
>>>
>>
>>
>>
>
> --
> Thank you,
> Dmitri Pal
>
> Sr. Engineering Manager IdM portfolio
> Red Hat, Inc.
>
>


-- 

 [image: Mosaic451] <http://www.mosaic451.com>Matt WellsChief Systems
Architect
RHCVA, RHCA #110-000-353
(702) 8 <7028080424>08-0424
matt.wells at mosaic451.com <matt.wells at mosaic451.com> Las Vegas | Phoenix |
Portland Mosaic451.com <http://www.mosaic451.com> [image: Facebook]
<https://www.facebook.com/Mosaic451>[image: Twitter]
<https://twitter.com/mosaic451>[image: Google Plus]
<https://www.google.com/+Mosaic451>[image: LinkedIn]
<https://www.linkedin.com/company/mosaic451>CONFIDENTIALITY NOTICE: This
transmittal is a confidential communication or may otherwise be privileged.
If you are not intended recipient, you are hereby notified that you have
received this transmittal in error and that any review, dissemination,
distribution or copying of this transmittal is strictly prohibited. If you
have received this communication in error, please notify this office, and
immediately delete this message and all its attachments, if any.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://listman.redhat.com/archives/freeipa-users/attachments/20150301/87c48997/attachment.htm>


More information about the Freeipa-users mailing list