User Tools

Site Tools


infra:services:hacker-id

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
infra:services:hacker-id [2025/07/14 18:41] 404dinfra:services:hacker-id [2025/07/14 19:11] (current) 404d
Line 29: Line 29:
 | ''nettlaug-tenants'' | ''nettlaug-operators'' | People renting space/resources within nettlauget's infrastructure | | ''nettlaug-tenants'' | ''nettlaug-operators'' | People renting space/resources within nettlauget's infrastructure |
 | ''nettlaug-operators'' | ''nettlaug-operators'' | Core networking group, for infrastructure, switches, routing etc. | | ''nettlaug-operators'' | ''nettlaug-operators'' | Core networking group, for infrastructure, switches, routing etc. |
 +| ''project-hackradio'' | ''d404d@idp.hackeriet.no'' | SSH + sudo for the AzuraCast test host (which currently does not run AzuraCast) |
 | ''service-idp-sysops'' | ''d404d@idp.hackeriet.no'' | Administrative privileges to Hacker-ID (Kanidm, SSH, and sudo) | | ''service-idp-sysops'' | ''d404d@idp.hackeriet.no'' | Administrative privileges to Hacker-ID (Kanidm, SSH, and sudo) |
  
Line 56: Line 57:
   - [[https://kanidm.github.io/kanidm/stable/integrations/pam_and_nsswitch.html#pam|Register the Kanidm PAM modules]]   - [[https://kanidm.github.io/kanidm/stable/integrations/pam_and_nsswitch.html#pam|Register the Kanidm PAM modules]]
     - Debian/Ubuntu/Raspbian: This step can be skipped, although the bundled ''unix-chkpwd'' AppArmor profile on Ubuntu must be disabled/fixed     - Debian/Ubuntu/Raspbian: This step can be skipped, although the bundled ''unix-chkpwd'' AppArmor profile on Ubuntu must be disabled/fixed
-    - Fedora/CentOS/Rocky: https://kanidm.github.io/kanidm/stable/integrations/pam_and_nsswitch/fedora.html+    - [[https://kanidm.github.io/kanidm/stable/integrations/pam_and_nsswitch/fedora.html|Fedora/CentOS/Rocky]]
       - Note: SELinux profiles are NOT included       - Note: SELinux profiles are NOT included
-    - Others: https://kanidm.github.io/kanidm/stable/integrations/pam_and_nsswitch/suse.html+    - [[https://kanidm.github.io/kanidm/stable/integrations/pam_and_nsswitch/suse.html|Others]]
   - [[https://kanidm.github.io/kanidm/stable/integrations/ssh_key_distribution.html|Set kanidm as a global authorized keys command and apply additional SSH hardening]]   - [[https://kanidm.github.io/kanidm/stable/integrations/ssh_key_distribution.html|Set kanidm as a global authorized keys command and apply additional SSH hardening]]
-  - Restart ''kanidm-unixd'' service, review the unit logs, and attempt login using ''kanidm-unix'': <code>+ 
 +Restart ''kanidm-unixd'' service, review the unit logs, and attempt login using ''kanidm-unix'': 
 +<code>
 # kanidm-unix status # kanidm-unix status
 system: online system: online
Line 70: Line 73:
 account success! account success!
 </code> </code>
-  - Attempt login over SSH towards your Hacker-ID username+Finally, attempt login over SSH towards your Hacker-ID username
  
 ===== Good to know ===== ===== Good to know =====
/srv/hackeriet-wiki/dokuwiki/data/attic/infra/services/hacker-id.1752518470.txt.gz · Last modified: by 404d