freeipa | Mirror of FreeIPA , an integrated security information | Identity Management library

 by   freeipa Python Version: release-4-10-2 License: GPL-3.0

kandi X-RAY | freeipa Summary

kandi X-RAY | freeipa Summary

freeipa is a Python library typically used in Security, Identity Management applications. freeipa has no bugs, it has a Strong Copyleft License and it has high support. However freeipa has 16 vulnerabilities and it build file is not available. You can download it from GitHub.

FreeIPA allows Linux administrators to centrally manage identity, authentication and access control aspects of Linux and UNIX systems by providing simple to install and use command line and web based management tools. FreeIPA is built on top of well known Open Source components and standard protocols with a very strong focus on ease of management and automation of installation and configuration tasks. FreeIPA can seamlessly integrate into an Active Directory environment via cross-realm Kerberos trust or user synchronization.
Support
    Quality
      Security
        License
          Reuse

            kandi-support Support

              freeipa has a highly active ecosystem.
              It has 802 star(s) with 315 fork(s). There are 51 watchers for this library.
              OutlinedDot
              It had no major release in the last 6 months.
              freeipa has no issues reported. There are 31 open pull requests and 0 closed requests.
              It has a positive sentiment in the developer community.
              The latest version of freeipa is release-4-10-2

            kandi-Quality Quality

              freeipa has 0 bugs and 0 code smells.

            kandi-Security Security

              OutlinedDot
              freeipa has 16 vulnerability issues reported (1 critical, 6 high, 8 medium, 1 low).
              freeipa code analysis shows 0 unresolved vulnerabilities.
              There are 0 security hotspots that need review.

            kandi-License License

              freeipa is licensed under the GPL-3.0 License. This license is Strong Copyleft.
              Strong Copyleft licenses enforce sharing, and you can use them when creating open source projects.

            kandi-Reuse Reuse

              freeipa releases are not available. You will need to build from source code and install.
              freeipa has no build file. You will be need to create the build yourself to build the component from source.
              Installation instructions are available. Examples and code snippets are not available.
              freeipa saves you 617233 person hours of effort in developing the same functionality from scratch.
              It has 309406 lines of code, 9498 functions and 1147 files.
              It has medium code complexity. Code complexity directly impacts maintainability of the code.

            Top functions reviewed by kandi - BETA

            kandi has reviewed freeipa and discovered the below as its top functions. This is intended to give you an instant insight into freeipa implemented functionality, and help decide if they suit your requirements.
            • Promotes the check .
            • Upgrade configuration .
            • Imports the specified files .
            • Checks if DNS instance is enabled .
            • Return a list of entries that conflict with other trusted domains .
            • Perform the DNS discovery using the specified domain .
            • Parse revocation certificate XML .
            • Parse an update file .
            • Get CA certificates from fstore .
            • Configure SSSD configuration .
            Get all kandi verified functions for this library.

            freeipa Key Features

            No Key Features are available at this moment for freeipa.

            freeipa Examples and Code Snippets

            No Code Snippets are available at this moment for freeipa.

            Community Discussions

            QUESTION

            Kerberos PKINIT - No matching entry found preauth (pkinit) verify failure: Certificate mismatch
            Asked 2021-May-21 at 11:33

            I have installed a FreeIPA master server including Kerberos. Furthermore I have one client server, enrolled in FreeIPA, to test the PKINIT feature of Kerberos. All servers run on CentOS7. A testuser exists in FreeIPA and this user is also listed in the one and only existing realm, when using list_principals in kadmin as testuser@REALMNAME.

            getprinc testuser also gives Attributes: REQUIRES_PRE_AUTH.

            I have created kdc and client certificates strictly following the documentation: https://web.mit.edu/kerberos/www/krb5-latest/doc/admin/pkinit.html. They have been signed by my own CA, whose certificate is also present on the client and the master.

            The [realm] config on the master is as follows:

            ...

            ANSWER

            Answered 2021-May-21 at 11:33

            Here is a blog post I put together that should give you an idea how to setup Kerberos PKINIT preauthentication mechanism to authenticate an IPA user with a X.509 certificate:

            PKINIT with IPA and user certificates

            Source https://stackoverflow.com/questions/66457379

            QUESTION

            How to add host to ansible group when the host is running a certain role?
            Asked 2020-May-06 at 06:06

            Imagine, you have a role that adds a NFSv4 mount point with Kerberos authentication. This rule directly depends on the host being in the ansible-freeipa/ipaclient group s.t. the host can request Kerberos tickets.

            Is there a way to automatically make all hosts that execute this role also member in the ipaclient group?

            Or do you know a better solution to this problem?

            ...

            ANSWER

            Answered 2020-May-06 at 06:06

            Q: "Automatically make all hosts that execute this role a member of the ipaclient group."

            A: Put this task into the role

            Source https://stackoverflow.com/questions/61624671

            QUESTION

            How to find .crt file installed by default of FreeIPA?
            Asked 2020-Apr-27 at 07:40

            Use this guide installed FreeIPA with SSL: https://www.howtoforge.com/how-to-install-freeipa-server-on-centos-7/

            ...

            ANSWER

            Answered 2020-Apr-27 at 07:40

            I don't see how this question is related to programming, maybe move it to ServerFault.

            And it's not clear what you want to do exactly. You don't want to install an embedded CA within the IPA Server, but it's unclear if you're going to use an external CA or no CA at all. In the first case this means the IPA Server would still automatically update the certificates, while the second case means you would update yourself when it is necessary.

            The best entry point is the Linux Domain Identity, Authentication, and Policy Guide

            If you're not going to use any CA at all, see section 2.3.6 :

            Source https://stackoverflow.com/questions/61450178

            QUESTION

            How can I make FreeIPA & FreeRadius work with PEAP authentication
            Asked 2020-Apr-20 at 21:46

            I want to force our office users to enter their LDAP credentials when connecting to the WiFi in our office. So I installed FreeRadius as instructed at: Using FreeIPA and FreeRadius .

            Using radtest, I can successfully authenticate against our FreeIPA server using PAP. Moving on I configured a WiFi connection on my Windows 10 laptop to use EAP-TTLS as the authentication method along with selecting PAP as the non-EAP method. Again I can successfully authenticate against our FreeIPA server when connecting to the WiFi AP. But I realize that is not safe since passwords are sent as clear-text.

            So next I configured a WiFi connection on my Windows 10 laptop to use PEAP as the authentication method with EAP method of EAP-MSCHAP v2. But now authentication fails. An excerpt from the FreeRadius debug log shows:

            ...

            ANSWER

            Answered 2020-Apr-20 at 21:46

            It turns out mschapv2 is a challenge response protocol, and that does not work with an LDAP bind in the basic configuration of FreeRadius.

            However I did find a solution where FreeRadius looks up a user by their LDAP DN, then reads (not bind) the NTHash of the user. From there, FreeRADIUS is able to process the challenge response.

            First permissions have to be given to service accounts: https://fy.blackhats.net.au/blog/html/2015/07/06/FreeIPA:_Giving_permissions_to_service_accounts..html

            After performing these steps users will need to change their password in order to generate an ipaNTHash.

            Then configure FreeRadius to use mschapv2 with FreeIPA: https://fy.blackhats.net.au/blog/html/2016/01/13/FreeRADIUS:_Using_mschapv2_with_freeipa.html

            After completing all the steps described in both links, this radtest cli command should return an Access-Accept response.

            Source https://stackoverflow.com/questions/61282728

            QUESTION

            Error starting FreeIPA server as docker container
            Asked 2020-Apr-16 at 21:58

            I am getting error when I run the following command:

            ...

            ANSWER

            Answered 2020-Apr-16 at 21:58

            I was able to resolve the same issue following this other answer, basically by adding --sysctl net.ipv6.conf.lo.disable_ipv6=0 into my docker run ... command. I don't actually know why it needs to be there but my symptoms were the same as yours and this did the trick. Here is my full command for testing:

            Source https://stackoverflow.com/questions/60802236

            QUESTION

            unable to login in laravel using LDAP package Adldap2-Laravel
            Asked 2020-Mar-19 at 07:19

            I am using the Adldap2-Laravel package for authentication. I am testing using the LDAP test forum. I followed this tutorial https://jotaelesalinas.github.io/laravel-simple-ldap-auth/ But I am unable to login. I am not getting any errors. In the below code always else block is executing.

            I think I have made mistake in configuration Please help me

            Thank You

            login controller

            ...

            ANSWER

            Answered 2020-Mar-19 at 07:19

            finally, I have completed with LDAP connection in laravel App. If anyone is facing difficulty in connecting LDAP go through with this package https://ldaprecord.com/docs/laravel/. very clear explanation about Integrating LDAP in laravel.

            Source https://stackoverflow.com/questions/59749013

            QUESTION

            Can't connect to GitLab via ssh
            Asked 2020-Jan-28 at 09:30

            Firstly, i created the ssh key pair with the command:

            ...

            ANSWER

            Answered 2020-Jan-28 at 09:30
            shell request accepted on channel 0
            

            Source https://stackoverflow.com/questions/59923066

            QUESTION

            Can we use Windows Active Directory to authenticate Linux/Unix servers and manage users/groups from AD itself
            Asked 2020-Jan-09 at 20:07

            We have tried sssd utility which does LDAP auth to windows AD however we have to manage individual servers for user/group permissions, there is no central management with sssd.

            Also, we are trying to use FREEIPA but seems like it's another directory service and we need to create another domain and then establish trust between windows domain & IPA domain however we don't want to choose that route.

            Is there a way to just integrate the FreeIPA with windows AD without creating FREEIPA domain.

            ...

            ANSWER

            Answered 2020-Jan-09 at 20:07

            No, there is no such way. FreeIPA is not a tool, it is full functioning identity management system, similar to Active Directory but for POSIX environments. You aren't deploying it on a single machine as a separate application.

            There are plenty other tools that utilise existing Active Directory deployment to store own information and handle Linux machines but most of them are commercially available.

            However, I wonder why you are claiming there is no central management with SSSD for direct AD integration. SSSD with id_provider = ad supports group policies in AD, so you can apply those rules centrally. Technically you also can store SUDO rules in AD LDAP, though it wouldn't be easily manageable compared to FreeIPA.

            Source https://stackoverflow.com/questions/59666220

            QUESTION

            OpenVPN + FreeIPA: memberOf Additional Requirement not working
            Asked 2019-Nov-26 at 12:03

            My user authenticates fine through OpenVPN AS, using LDAP authentication over FreeIPA.

            Now I want to restrict OpenVPN to enforce that they belong to a certain group.

            I've created a User Group in FreeIPA, and changed OpenVPN to have an "Additional LDAP Requirement" of "memberOf=CN=myGroup,CN=groups,CN=accounts,DC=mgmt,DC=company,DC=uk"

            But when I try to authenticate now, I get access denied, with this error in openvpn logs:

            ...

            ANSWER

            Answered 2019-Nov-26 at 12:03

            Ah found it.

            OpenVPNAS was using anonymous binding to connect to FreeIPA in order to authenticate people. With anonymous binding, it isn't permitted to see group membership!

            Fix was to change OpenVPNAS to bind as an admin user. Now it works fine.

            Source https://stackoverflow.com/questions/59048665

            QUESTION

            where's the CA's private key in FreeIPA?
            Asked 2019-Aug-28 at 07:17

            I'm running FreeIPA and would like to use it as an internal certificate authority.

            I notice that the ipa cert-request command will sign a CSR (certificate signing request), which is great except that it creates a principal too, and I don't want that. I'd prefer to use an openssl x509 -req ... command.

            I understand that the openssl x509 -req ... command signs the CSR with the CA's certificate and private key. I found the CA's certificate in FreeIPA (in /etc/ipa/ca.crt), but can't find the private key. Does anyone know where I might find this?

            ...

            ANSWER

            Answered 2019-Aug-28 at 07:17

            Certificate requests submitted for FreeIPA for signing pass through the internal set of checks that validate your rights to issue those certificates. One decision we made early enough is that Kerberos principal SAN in the certificate is one thing we can enforce and thus it is enforced.

            Certificate Authority is much more than just self-signing with openssl. It includes revocation lists maintenance as well and without knowing what was issued and how, it is harder to maintain that.

            Do you have any specific reason for issuing certs without Kerberos principals in them? Note that you can generate a certificate signing request any way you want, then submit it through 'ipa cert-request' or IPA Web UI directly, not using certmonger's tools. This CSR would still need to pass validation, though.

            Source https://stackoverflow.com/questions/57650198

            Community Discussions, Code Snippets contain sources that include Stack Exchange Network

            Vulnerabilities

            A flaw was found in IPA, all 4.6.x versions before 4.6.7, all 4.7.x versions before 4.7.4 and all 4.8.x versions before 4.8.3, in the way the internal function ber_scanf() was used in some components of the IPA server, which parsed kerberos key data. An unauthenticated attacker who could trigger parsing of the krb principal key could cause the IPA server to crash or in some conditions, cause arbitrary code to be executed on the server hosting the IPA server.
            A flaw was found in IPA, all 4.6.x versions before 4.6.7, all 4.7.x versions before 4.7.4 and all 4.8.x versions before 4.8.3, in the way that FreeIPA's batch processing API logged operations. This included passing user passwords in clear text on FreeIPA masters. Batch processing of commands with passwords as arguments or options is not performed by default in FreeIPA but is possible by third-party components. An attacker having access to system logs on FreeIPA masters could use this flaw to produce log file content with passwords exposed.
            A flaw was found in FreeIPA versions 4.5.0 and later. Session cookies were retained in the cache after logout. An attacker could abuse this flaw if they obtain previously valid session cookies and can use this to gain access to the session.
            It was found that FreeIPA 4.2.0 and later could disclose password hashes to users having the 'System: Read Stage Users' permission. A remote, authenticated attacker could potentially use this flaw to disclose the password hashes belonging to Stage Users. This security issue does not result in disclosure of password hashes belonging to active standard users. NOTE: some developers feel that this report is a suggestion for a design change to Stage User activation, not a statement of a vulnerability.
            FreeIPA uses a default password policy that locks an account after 5 unsuccessful authentication attempts, which allows remote attackers to cause a denial of service by locking out the account in which system services run on.
            ** DISPUTED ** FreeIPA 4.x with API version 2.213 allows a remote authenticated users to bypass intended account-locking restrictions via an unlock action with an old session ID (for the same user account) that had been created for an earlier session. NOTE: Vendor states that issue does not exist in product and does not recognize this report as a valid security concern.
            CVE-2015-5284 CRITICAL
            ipa-kra-install in FreeIPA before 4.2.2 puts the CA agent certificate and private key in /etc/httpd/alias/kra-agent.pem, which is world readable.
            FreeIPA might display user data improperly via vectors involving non-printable characters.
            The ipapwd_chpwop function in daemons/ipa-slapi-plugins/ipa-pwd-extop/ipa_pwd_extop.c in the directory server (dirsrv) in FreeIPA before 3.2.0 allows remote attackers to cause a denial of service (crash) via a connection request without a username/dn, related to the 389 directory server.
            The default LDAP ACIs in FreeIPA 3.0 before 3.1.2 do not restrict access to the (1) ipaNTTrustAuthIncoming and (2) ipaNTTrustAuthOutgoing attributes, which allow remote attackers to obtain the Cross-Realm Kerberos Trust key via unspecified vectors.
            FreeIPA 4.4.0 allows remote attackers to request an arbitrary SAN name for services.
            The get_user_grouplist function in the extdom plug-in in FreeIPA before 4.1.4 does not properly reallocate memory when processing user accounts, which allows remote attackers to cause a denial of service (crash) via a group list request for a user that belongs to a large number of groups.
            Cross-site scripting (XSS) vulnerability in the Web UI in FreeIPA 4.x before 4.1.2 allows remote attackers to inject arbitrary web script or HTML via vectors related to breadcrumb navigation.

            Install freeipa

            To get started quickly, start here: http://www.freeipa.org/page/Quick_Start_Guide.

            Support

            The most up-to-date documentation can be found at http://freeipa.org/page/Documentation .
            Find more information at:

            Find, review, and download reusable Libraries, Code Snippets, Cloud APIs from over 650 million Knowledge Items

            Find more libraries
            CLONE
          • HTTPS

            https://github.com/freeipa/freeipa.git

          • CLI

            gh repo clone freeipa/freeipa

          • sshUrl

            git@github.com:freeipa/freeipa.git

          • Stay Updated

            Subscribe to our newsletter for trending solutions and developer bootcamps

            Agree to Sign up and Terms & Conditions

            Share this Page

            share link

            Explore Related Topics

            Consider Popular Identity Management Libraries

            vault

            by hashicorp

            k9s

            by derailed

            keepassxc

            by keepassxreboot

            keycloak

            by keycloak

            uuid

            by uuidjs

            Try Top Libraries by freeipa

            freeipa-container

            by freeipaShell

            ansible-freeipa

            by freeipaPython

            freeipa-letsencrypt

            by freeipaShell

            freeipa-healthcheck

            by freeipaPython

            freeipa-tools

            by freeipaPython