Skip to content

uubk/auth-server

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

42 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Auth-Server

CircleCI status License

Set up 389ds and MIT Kerberos to authenticate users. Tested on Debian 11.

Warning: This role only supports Debian 11 - for 9/10, you'll want to use the old code on the buster branch.

Description

This role sets up 389ds in multi-master mode.

Configuration

Name Default value Description
auth_ldap_domain False Which base domain should be used for this role?
auth_ldap_domain_ldap False auth_ldap_domain in LDAP format (dc=...)
auth_ldap_domain_suffix False The first domain part of auth_ldap_domain)
auth_ldap_admin_pwd False The LDAP administrator password
auth_ldap_sync_pwd False The LDAP syncrepl user password
auth_ldap_group core The group of hosts this role is applied to
auth_ldap_init_source False The name of the host that should be used as a LDAP data source when adding new hosts.
auth_kerberos_ldap_password False The kerberos LDAP service account password
auth_kerberos_database_master_key False The initial kerberos database master key
auth_kerberos_enctypes aes256-cts-hmac-sha384-192 aes128-cts-hmac-sha256-128 Which encryption modes to enable? The default is for recent versions of Kerberos and no Windows clients only.
auth_ldap_have_tls True Whether to enable SSL/TLS support in openLDAP
auth_ldap_ssl_cert_path /etc/ldap/server.pem Path to openLDAP's certificate
auth_ldap_ssl_key_path /etc/ldap/server.key Path to openLDAP's certificate's key
auth_ldap_ssl_ca_path /etc/ldap/ca.pem Path to the CA certificate of openLDAP's certificate
auth_ldap_users [] User accounts to create, see below
auth_ldap_allow_read [] DNs of users that should be granted read permissions on users and groups
auth_ldap_services [dns, ldap, host] Service account containers to create
auth_ldap_service_bases (see defaults/main.yml) LDAP containers to create for services
auth_ldap_service_accounts (see defaults/main.yml) Kerberos services to generate. This will also write out a keytab for each service.
auth_ldap_permissions (see defaults/main.yml) ACIs to set on the directory
auth_kerberos_admin_privs [] Kerberos principals to grant administrative permissions to (see defaults/main.yml for format)
auth_ldap_store_pam True Whether to actually store the generated 389ds PAM config. Useful if you want to customize it using another role
auth_kerberos_curves edwards25519 Curves to use for kerberos SPAKE

Users can be created by putting them into auth_ldap_users as a dict with the following format:

auth_ldap_users:
  - name: Foo Bar
    id: foobar
    givenName: Foo
    sn: Bar
    uid: 10000
    gid: 1000
    mail: "[email protected]"

After running the playbook, use kadmin.local on one of the servers and do cpw foobar to set a password.

License

Apache 2.0, except for the included LDAP schemas:

  • files/kerberos.ldif is CoPyRiGhT=(c) Copyright 2006, Novell, Inc. All rights reserved and has been extracted from the freely available openLDAP source.
  • files/dns.ldif has been extracted from the Bind Dyndb LDAP Backend (GPLv2) and rewritten to ldapmodify format

About

No description or website provided.

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages