infra:services:hacker-id
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
infra:services:hacker-id [2025/07/14 00:36] – 404d | infra:services:hacker-id [2025/07/14 19:11] (current) – 404d | ||
---|---|---|---|
Line 22: | Line 22: | ||
===== ACL structure ===== | ===== ACL structure ===== | ||
During the draft phase, the following groups have been configured: | During the draft phase, the following groups have been configured: | ||
- | * '' | + | |
- | | + | ^ Name ^ Entry manager ^ Description ^ |
- | | + | | '' |
- | | + | | '' |
- | | + | | '' |
+ | | '' | ||
+ | | '' | ||
+ | | '' | ||
+ | | '' | ||
IDP admins may always step in to assist, shall any of the groups be orphaned (no active/ | IDP admins may always step in to assist, shall any of the groups be orphaned (no active/ | ||
+ | |||
+ | |||
+ | |||
+ | ===== Using Hacker-ID for SSH/Linux login ===== | ||
+ | Kanidm can be used as a resolve-through locally caching authentication handler, resilient to network failures and transparently allowing existing local credentials to be used as-is. | ||
+ | |||
+ | There' | ||
+ | |||
+ | - [[https:// | ||
+ | - [[https:// | ||
+ | - Edit config file ''/ | ||
+ | - Edit config file ''/ | ||
+ | - Optional: Add group mappings, like sudo or docker rights: < | ||
+ | [[kanidm.map_group]] | ||
+ | local = " | ||
+ | with = " | ||
+ | |||
+ | [[kanidm.map_group]] | ||
+ | local = " | ||
+ | with = " | ||
+ | </ | ||
+ | - [[https:// | ||
+ | - [[https:// | ||
+ | - Debian/ | ||
+ | - [[https:// | ||
+ | - Note: SELinux profiles are NOT included | ||
+ | - [[https:// | ||
+ | - [[https:// | ||
+ | |||
+ | Restart '' | ||
+ | < | ||
+ | # kanidm-unix status | ||
+ | system: online | ||
+ | Kanidm: online | ||
+ | |||
+ | # kanidm-unix auth-test --name d404d | ||
+ | Enter Unix password: [hidden] | ||
+ | auth success! | ||
+ | account success! | ||
+ | </ | ||
+ | Finally, attempt login over SSH towards your Hacker-ID username | ||
+ | |||
+ | ===== Good to know ===== | ||
+ | |||
+ | * Some information is publicly accessible, as required by unix/posix integrations: | ||
+ | * Anonymous access will be removed once this draft is finalized: https:// | ||
+ | * Users are allowed to change all details about their profile! **NEVER** consider anything but the user UUID to be user identifiable (see the '' | ||
+ | * THIS INCLUDES THE USERNAME AND EMAIL | ||
Line 45: | Line 97: | ||
* No mirroring of the backups has been configured yet | * No mirroring of the backups has been configured yet | ||
* Set up kanidm-unixd for idp1.hackeriet.no | * Set up kanidm-unixd for idp1.hackeriet.no | ||
- | * Instructions for OpenSUSE can be followed as-is | + | * Installed daemon |
+ | * Added to SSH config | ||
+ | * Added to nsswitch | ||
+ | * For Debian flavours incl. Ubuntu and Raspbian, installing '' | ||
* AppArmor default profiles blocks access to the service socket used, need to amend the profile with the correct paths then reload & restart | * AppArmor default profiles blocks access to the service socket used, need to amend the profile with the correct paths then reload & restart |
/srv/hackeriet-wiki/dokuwiki/data/attic/infra/services/hacker-id.1752453398.txt.gz · Last modified: by 404d