Tracker #5031
Updated by Jan Pazdziora over 10 years ago
This feature is being opened as an overview tracker of using Foreman with external authentication and identity providers like FreeIPA. The general setup is described at http://www.freeipa.org/page/Web_App_Authentication. We've identified the following places where external authentication and/or identity provider can be used: * Kerberos SSO using ticket * Using FreeIPA host based access control to drive access to the Kerberized application * Making use of the external authentication provider to authenticate the normal logon form, using PAM * Populating user attributes based on the external identity provider * Populating user group membership based on the external identity provider * Keeping user's attributes and group membership up-to-date even during subsequent logons * Using the authentication in non WebUI situations -- using API, CLI h2. Kerberos SSO using ticket This feature was fully implemented via http://projects.theforeman.org/issues/3312 and is available in Foreman 1.4 and documented at http://projects.theforeman.org/projects/foreman/wiki/Foreman_and_mod_auth_kerb and in Foreman manual http://theforeman.org/manuals/1.4/index.html#5.7SPNEGOauthentication. Since Foreman needs to maintain even externally-authenticated users in its internal database (for foreign keys to work), if the user authenticated via Kerberos was never seen by Foreman before, the record is created in new External auth source. h2. Using FreeIPA host based access control to drive access to the Kerberized application This feature can be used by configuring the @mod_authnz_pam@ Apache module and @require pam-account foreman-prod@ together with PAM service and HBAC service in FreeIPA, as described at http://www.freeipa.org/page/Web_App_Authentication. No change was needed in Foreman. h2. Making use of the external authentication provider to authenticate the normal logon form, using PAM Using Apache module @mod_intercept_form_submit@, it is possible to run PAM authentication based on the credentials entered by user on the standard logon form, and signal the application when the authentication passed. Similar to the Kerberos ticket-based authentication, the externally authenticated user record needs to be created in Foreman's database. The feature is tracked and documented as http://projects.theforeman.org/issues/4462 and was merged to be available in Foreman 1.5. h2. Populating user attributes based on the external identity provider When user record is populated based on external authentication, traditionally only the login (username) is available to the application. Foreman will then redirect the user to a page asking to provide at least their email address to proceed. Using @mod_lookup_identity@ Apache module, it is possible to retrieve this information together with user's name from central identity provider like FreeIPA, and populate record in Foreman's database with it. This feature was implemented via http://projects.theforeman.org/issues/3528 and is available in Foreman 1.4 and documented at http://projects.theforeman.org/projects/foreman/wiki/Foreman_and_mod_auth_kerb and in Foreman manual http://theforeman.org/manuals/1.4/index.html#5.7SPNEGOauthentication. h2. Populating user group membership based on the external identity provider Besides user attributes, Foreman can use user group membership information from external identity provider to drive role assignment. Currently tracked as http://projects.theforeman.org/issues/3892, group memebership of externally authenticated user whose record is being populated in Foreman's internal database will be set to match the group membership of the user in the central identity provider, using environment variables REMOTE_USER_GROUP_N, REMOTE_USER_GROUP_1, REMOTE_USER_GROUP_2, etc. The feature is enabled by using Apache module @mod_lookup_identity@ (the same one used for user attribute population) and configuration <pre> LookupUserGroupsIter REMOTE_USER_GROUP </pre> h2. Keeping user's attributes and group membership up-to-date even during subsequent logons h3. Keeping the attributes up-to-date When populating attributes based on external identity provider, the code change was modelled after the current implementation of the similar feature for Foreman's internal LDAP auth sources. In those cases, the user attributes only get set during initial population of the user record. Improvement to this feature would include making the attributes of the user update upon every authentication, based on external identity provider. However, this change should be coordinated with the same behaviour change for the LDAP auth sources. Currently, this is not tracked in separate issue. h3. Keeping the group membership up-to-date When populating group membership based on external identity provider, the code change was modelled after the population of user attributes. In those cases, the user attributes only get set during initial population of the user record. h3. Tracking Currently tracked as http://projects.theforeman.org/issues/5242, user's attributes and Improvement to this feature would include making the group memberships get updated membership of the user update upon every successful authentication using authentication, based on external identity provider. However, this change should be coordinated with the External auth source. behaviour change for user attributes. Currently, this is not tracked in separate issue. h2. Using the authentication in non WebUI situations -- using API, CLI It should be possible to use the external authentication and identity providers and their features including Kerberos ticket-based SSO not just in WebUI but for API and CLI as well. Currently, this is not tracked in separate issue.