1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111
|
Developing the realmd component
-------------------------------
This adds functionality to Cockpit to join an AD or IPA domain.
Some features of Cockpit require a domain to test. Cockpit should work
with either Active Directory or IPA.
### Running a test domain
To contribute to this component, run a test domain which ends
up being rather easy. Install the stuff in [test/README.md](../../test/README.md)
near the top. And then do the following:
$ bots/vm-run --network services
In that VM, start `/root/run-freeipa` to start an IPA domain controller, or
`/root/run-samba-domain` for a Samba AD domain controller. Now in
another terminal do the following:
$ sudo /bin/sh -c "echo -e 'domain cockpit.lan\nsearch cockpit.lan\nnameserver 10.111.112.100\n' > /etc/resolv.conf"
Make sure this works:
$ realm discover cockpit.lan
And now you're ready to use the feature. For IPA there's an account called
"admin" with the password "foobarfoo", for Samba AD it is user "Administrator"
with password "foobarFoo123".
To test your DNS, the following should succeed without any error messages
on your server with cockpit:
$ host cockpit.lan
Now verify that you can authenticate against the IPA server. See password
above.
$ kinit admin@COCKPIT.LAN
Password for admin@COCKPIT.LAN:
## Running a Microsoft AD server in AWS
If you want to test against Microsoft Active Directory instead of Samba or FreeIPA, the
simplest way is to start a temporary
[managed AD in AWS](https://docs.aws.amazon.com/directoryservice/latest/admin-guide/directory_microsoft_ad.html)
(or another cloud provider). Just follow the few
[setup steps](https://docs.aws.amazon.com/directoryservice/latest/admin-guide/ms_ad_getting_started.html#ms_ad_getting_started_create_directory):
Select the smallest edition, specify a directory DNS name (e. g. `ad.cockpit.lan`) and a password for the `Admin` user,
and about 20 minutes later the domain server should be set up. The details page
of the created domain shows the DNS server's IP; put that into `/etc/resolv.conf`.
From then on, joining that domain with `realm` or Cockpit works in the same way.
## Setting up Single Sign on
Cockpit can perform single sign on authentication via Kerberos. To test and
work on this feature, you must have a domain on your network. See section
above if you do not.
Use the following guide to configure things, with more troubleshooting advice
below:
https://cockpit-project.org/guide/latest/sso.html
**BUG:** The host name of the computer Cockpit is running on should end with
the domain name. If it does not, then rename the computer Cockpit is running on:
[realmd bug](https://bugzilla.redhat.com/show_bug.cgi?id=1144343)
$ sudo hostnamectl set-hostname my-server.domain.com
**BUG:** If your domain is an IPA domain, then you need to explicitly add a service
before Cockpit can be used with Single Sign on. The following must be done on
the computer running Cockpit.
[realmd bug](https://bugzilla.redhat.com/show_bug.cgi?id=1144292)
$ sudo -s
# kinit admin@COCKPIT.LAN
# ipa service-add --ok-as-delegate=true --ok-to-auth-as-delegate=true --force HTTP/my-server.cockpit.lan@COCKPIT.LAN
# ipa-getkeytab -q -s services.cockpit.lan -p HTTP/my-server.cockpit.lan -k /etc/krb5.keytab
Now when you go to your cockpit instance you should be able to log in without
authenticating. Make sure to use the full hostname that you set above, the one
that includes the domain name.
If you want to use Cockpit to connect to a second server make sure that second
server is joined to a domain, and that you can ssh into it using GSSAPI authentication
with the domain user:
$ ssh -o PreferredAuthentications=gssapi-with-mic admin@my-server2.domain.com
If you thought that was nasty and tiresome, it's because it is at present :S
## Using delegated credentials
Cockpit can delegate forwardable credentials. Make sure to specify you want them
during kinit:
$ kinit -f admin@COCKPIT.LAN
$ klist -f
Default principal: admin@COCKPIT.LAN
...
Flags: FIA
Use the IPA GUI to setup "Trusted for delegation" for the host and service that
Cockpit is running on. Make sure to tell the browser to delegate credentials
as seen in the guide:
https://cockpit-project.org/guide/latest/sso.html
Ze goggles, zey do nothing!
|