<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
<head>
<meta content="text/html; charset=ISO-8859-1"
http-equiv="Content-Type">
</head>
<body bgcolor="#ffffff" text="#000000">
In order to authenticate through the firewall you have to allow
kinit and kerberos web traffic through, which means opening port
88. If you are unwilling to do that, you need to come up with an
authentication solution that will pass through firewalls, which
means either basic auth, digest, or certificates. IPA has an
embeded CA in it (Dogtag) but does not yet manage user certificates.<br>
<br>
<a class="moz-txt-link-freetext" href="http://pki.fedoraproject.org/wiki/PKI_Main_Page">http://pki.fedoraproject.org/wiki/PKI_Main_Page</a><br>
<br>
The approaches for web only single sign on (OpenID, OAuth, SAML and
so forth) still require the initial authentication. Since IPA
doesn't currently have a solution for that piece, we do not yet
support one of hte HTTP SSO mechanisms, but it is under discussion.<br>
<br>
<br>
On 07/29/2011 02:30 AM, Rapid Noreapeat wrote:
<blockquote
cite="mid:CAGaEt6wcRbUNSSk7dz6O+nBynkq3OW2vbe_zd4xNaWcrhsfjqg@mail.gmail.com"
type="cite">Thank you for your quick reply Rob,<br>
<br>
I'll try it.<br>
<br>
<div class="gmail_quote">On Fri, Jul 29, 2011 at 11:50 AM, Rob
Crittenden <span dir="ltr"><<a moz-do-not-send="true"
href="mailto:rcritten@redhat.com">rcritten@redhat.com</a>></span>
wrote:<br>
<blockquote class="gmail_quote" style="margin: 0pt 0pt 0pt
0.8ex; border-left: 1px solid rgb(204, 204, 204);
padding-left: 1ex;">
<div>
<div class="h5">Rapid Noreapeat wrote:<br>
<blockquote class="gmail_quote" style="margin: 0pt 0pt 0pt
0.8ex; border-left: 1px solid rgb(204, 204, 204);
padding-left: 1ex;">
Is it possible to integrate my web applications like
portal website,<br>
helpdesk website, and other web apps login using
FreeIPA's login<br>
accounts (SSO) like CAS?<br>
</blockquote>
<br>
</div>
</div>
It depends. The FreeIPA SSO is Kerberos-based so you'd need to
provide access to your KDC for this to work. If we're talking
external portal then you may not want to expose your KDC.<br>
<br>
It also requires some configuration. Your browser has to be
configured to do Negotiate auth against a given domain. It
will also need to trust the IPA CA (and since CAS seems at
least partially SSL-based you already handle this).<br>
<br>
I don't know much about CAS other than what I just read on
their web site but it looks like they handle redirecting when
you aren't authenticated, seemingly allowing a nice way to mix
protected and unprotected data. I think you'd have to do much
of this configuration yourself in Apache. Probably not a huge
amount of work though.<br>
<br>
So it is basically whatever mod_auth_kerb provides.<br>
<font color="#888888">
<br>
rob<br>
</font></blockquote>
</div>
<br>
<pre wrap="">
<fieldset class="mimeAttachmentHeader"></fieldset>
_______________________________________________
Freeipa-users mailing list
<a class="moz-txt-link-abbreviated" href="mailto:Freeipa-users@redhat.com">Freeipa-users@redhat.com</a>
<a class="moz-txt-link-freetext" href="https://www.redhat.com/mailman/listinfo/freeipa-users">https://www.redhat.com/mailman/listinfo/freeipa-users</a></pre>
</blockquote>
<br>
</body>
</html>