infra:services:hacker-id
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
infra:services:hacker-id [2025/07/14 09:44] – [ACL structure] 404d | infra:services:hacker-id [2025/07/14 19:11] (current) – 404d | ||
---|---|---|---|
Line 29: | Line 29: | ||
| '' | | '' | ||
| '' | | '' | ||
+ | | '' | ||
| '' | | '' | ||
IDP admins may always step in to assist, shall any of the groups be orphaned (no active/ | IDP admins may always step in to assist, shall any of the groups be orphaned (no active/ | ||
+ | |||
+ | |||
+ | ===== Using Hacker-ID for SSH/Linux login ===== | ||
+ | Kanidm can be used as a resolve-through locally caching authentication handler, resilient to network failures and transparently allowing existing local credentials to be used as-is. | ||
+ | |||
+ | There' | ||
+ | |||
+ | - [[https:// | ||
+ | - [[https:// | ||
+ | - Edit config file ''/ | ||
+ | - Edit config file ''/ | ||
+ | - Optional: Add group mappings, like sudo or docker rights: < | ||
+ | [[kanidm.map_group]] | ||
+ | local = " | ||
+ | with = " | ||
+ | |||
+ | [[kanidm.map_group]] | ||
+ | local = " | ||
+ | with = " | ||
+ | </ | ||
+ | - [[https:// | ||
+ | - [[https:// | ||
+ | - Debian/ | ||
+ | - [[https:// | ||
+ | - Note: SELinux profiles are NOT included | ||
+ | - [[https:// | ||
+ | - [[https:// | ||
+ | |||
+ | Restart '' | ||
+ | < | ||
+ | # kanidm-unix status | ||
+ | system: online | ||
+ | Kanidm: online | ||
+ | |||
+ | # kanidm-unix auth-test --name d404d | ||
+ | Enter Unix password: [hidden] | ||
+ | auth success! | ||
+ | account success! | ||
+ | </ | ||
+ | Finally, attempt login over SSH towards your Hacker-ID username | ||
===== Good to know ===== | ===== Good to know ===== | ||
Line 59: | Line 100: | ||
* Added to SSH config | * Added to SSH config | ||
* Added to nsswitch | * Added to nsswitch | ||
- | * < | + | * For Debian flavours incl. Ubuntu and Raspbian, installing '' |
* AppArmor default profiles blocks access to the service socket used, need to amend the profile with the correct paths then reload & restart | * AppArmor default profiles blocks access to the service socket used, need to amend the profile with the correct paths then reload & restart |
/srv/hackeriet-wiki/dokuwiki/data/attic/infra/services/hacker-id.1752486271.txt.gz · Last modified: by 404d