Mariusz,
I do not want to hijack your thread, so I am starting another.
I would be very interested to know your FreeIPA/RADIUS configuration.
______________________________________________________________________________________________
Daniel E. White
daniel.e.white@nasa.gov<mailto:daniel.e.white@nasa.gov>
NASCOM Linux Engineer
NASA Goddard Space Flight Center
Science Applications International Corporation (SAIC)
Office: (301) 286-6919
Mobile: (240) 513-5290
From: FreeIPA-Users <freeipa-users(a)lists.fedorahosted.org>
Reply-To: FreeIPA-Users <freeipa-users(a)lists.fedorahosted.org>
Date: Friday, February 19, 2021 at 08:51
To: FreeIPA-Users <freeipa-users(a)lists.fedorahosted.org>
Cc: Mariusz Stysiak <server.is.not.responding(a)gmail.com>
Subject: [EXTERNAL] [Freeipa-users] MFA for AD users
Hello List,
I'd really appreciate some insight here.
I've setup FreeIpa POC (centos7, freeipa 4.7, two freeipa servers as multimaster along
with some clients). Added OTP's for several users and made it work with RADIUS for vpn
access authentication purpose. Next, I've added AD trust and I am able to log in as AD
user. All groovy. Now I'd like to enforce MFA for AD users by adding OTP tokens for
them. Is it possible at all? Since AD user authenticates against AD, shouldn't it be
AD who provides MFA?
FreeIPA behaves strangely when it comes to AD users (mapped via external group and POSIX
group): AD user 'ipatest' is visible with 'id' command (and has it's
own UID GID and so on) but cannot be found via 'ipa user-find' command even with
specific UID provided:
admin@ipa-poc-1 ~ $ id
ipatest@lab.trusteddomain.com<mailto:ipatest@lab.trusteddomain.com>
uid=748801177(ipatest@lab.trusteddomain.com<mailto:ipatest@lab.trusteddomain.com>)
gid=748801177(ipatest@lab.trusteddomain.com<mailto:ipatest@lab.trusteddomain.com>)
groups=748801177(ipatest@lab.trusteddomain.com<mailto:ipatest@lab.trusteddomain.com>),748800513(domain
users@lab.trusteddomain.com<mailto:users@lab.trusteddomain.com>),748801180(linuxusers@lab.trusteddomain.com<mailto:linuxusers@lab.trusteddomain.com>),793600008(ad_users)
admin@ipa-poc-1 ~ $ ipa user-find ipatest
---------------
0 users matched
---------------
----------------------------
Number of entries returned 0
----------------------------
admin@ipa-poc-1 ~ $ ipa user-find
ipatest@lab.trusteddomain.com<mailto:ipatest@lab.trusteddomain.com>
---------------
0 users matched
---------------
----------------------------
Number of entries returned 0
----------------------------
admin@ipa-poc-1 ~ $ ipa user-find ipatest@TRUSTEDOMAIN-LAB
---------------
0 users matched
---------------
----------------------------
Number of entries returned 0
admin@ipa-poc-1 ~ $ ipa user-find uid=748801177
---------------
0 users matched
---------------
----------------------------
Number of entries returned 0
----------------------------
I reckon it is due to the one-way trust with AD domain but not sure here. Since "ipa
otptoken-add' command requires 'owner' parameter (type string and doesn't
work with UID) I cannot add OTP token for this user.
Another approach I've tried (since ipa otptoken-add command by default uses current
user as owner) was to log on as AD user and create OTP token 'for myself', but it
didn't work either:
ipatest@lab.trusteddomain.com<mailto:ipatest@lab.trusteddomain.com>@ipa-poc-1 ~ $
kinit ipatest@lab.trusteddomain.com<mailto:ipatest@lab.trusteddomain.com>
Password for
ipatest@lab.trusteddomain.com<mailto:ipatest@lab.trusteddomain.com>:
ipatest@lab.trusteddomain.com<mailto:ipatest@lab.trusteddomain.com>@ipa-poc-1 ~
$ ipa otptoken-add --type='TOTP'
ipa: ERROR: cannot connect to 'any of the configured servers':
https://gcc02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fipa-poc...,
https://gcc02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fipa-poc...
So, to make it short:
Is it possible to add OTP token to external AD user?
How to do it?
rgrds
M.
_______________________________________________
FreeIPA-users mailing list --
freeipa-users@lists.fedorahosted.org<mailto:freeipa-users@lists.fedorahosted.org>
To unsubscribe send an email to
freeipa-users-leave@lists.fedorahosted.org<mailto:freeipa-users-leave@lists.fedorahosted.org>
Fedora Code of Conduct:
https://gcc02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdocs.fe...
List Guidelines:
https://gcc02.safelinks.protection.outlook.com/?url=https%3A%2F%2Ffedorap...
List Archives:
https://gcc02.safelinks.protection.outlook.com/?url=https%3A%2F%2Flists.f...
Do not reply to spam on the list, report it:
https://gcc02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fpagure....