Enterprise desktop at home with FreeIPA and GNOME Alexander Bokovoy - - PowerPoint PPT Presentation

enterprise desktop at home with freeipa and gnome
SMART_READER_LITE
LIVE PREVIEW

Enterprise desktop at home with FreeIPA and GNOME Alexander Bokovoy - - PowerPoint PPT Presentation

January 30th, 2016 FOSDEM16 Enterprise desktop at home with FreeIPA and GNOME Alexander Bokovoy ( abokovoy@redhat.com ) Enterprise desktop at home with FreeIPA and GNOME 2 Enterprise? Enterprise desktop at home with FreeIPA and GNOME 3 *


slide-1
SLIDE 1

January 30th, 2016 FOSDEM’16

Enterprise desktop at home with FreeIPA and GNOME

Alexander Bokovoy (abokovoy@redhat.com)

slide-2
SLIDE 2

Enterprise desktop at home with FreeIPA and GNOME 2

Enterprise?

slide-3
SLIDE 3

Enterprise desktop at home with FreeIPA and GNOME 3

* almost

local offjce network is not managed by a company’s IT department

slide-4
SLIDE 4

Enterprise desktop at home with FreeIPA and GNOME 4

* almost

company services’ hosting is cloudy there is no one cloud to rule them all

slide-5
SLIDE 5

Enterprise desktop at home with FreeIPA and GNOME 5

* almost

I have FEW identities:

▶ A corporate identity for services sign-on

Home-bound identity to access local resources Cloud-based (social networking) identities Free Software hats to wear Certifjcates and smart cards to present myself legally Private data to protect and share I want them to be usable at the same time

slide-6
SLIDE 6

Enterprise desktop at home with FreeIPA and GNOME 6

* almost

I have FEW identities:

▶ A corporate identity for services sign-on ▶ Home-bound identity to access local resources

Cloud-based (social networking) identities Free Software hats to wear Certifjcates and smart cards to present myself legally Private data to protect and share I want them to be usable at the same time

slide-7
SLIDE 7

Enterprise desktop at home with FreeIPA and GNOME 7

* almost

I have FEW identities:

▶ A corporate identity for services sign-on ▶ Home-bound identity to access local resources ▶ Cloud-based (social networking) identities

Free Software hats to wear Certifjcates and smart cards to present myself legally Private data to protect and share I want them to be usable at the same time

slide-8
SLIDE 8

Enterprise desktop at home with FreeIPA and GNOME 8

* almost

I have FEW identities:

▶ A corporate identity for services sign-on ▶ Home-bound identity to access local resources ▶ Cloud-based (social networking) identities ▶ Free Software hats to wear

Certifjcates and smart cards to present myself legally Private data to protect and share I want them to be usable at the same time

slide-9
SLIDE 9

Enterprise desktop at home with FreeIPA and GNOME 9

* almost

I have FEW identities:

▶ A corporate identity for services sign-on ▶ Home-bound identity to access local resources ▶ Cloud-based (social networking) identities ▶ Free Software hats to wear ▶ Certifjcates and smart cards to present myself legally

Private data to protect and share I want them to be usable at the same time

slide-10
SLIDE 10

Enterprise desktop at home with FreeIPA and GNOME 10

* almost

I have FEW identities:

▶ A corporate identity for services sign-on ▶ Home-bound identity to access local resources ▶ Cloud-based (social networking) identities ▶ Free Software hats to wear ▶ Certifjcates and smart cards to present myself legally ▶ Private data to protect and share

I want them to be usable at the same time

slide-11
SLIDE 11

Enterprise desktop at home with FreeIPA and GNOME 11

I work on FreeIPA, https://www.freeipa.org

Management of identities and policies:

▶ stored centrally ▶ applied locally

And it is available in:

▶ Fedora ▶ Red Hat Enterprise Linux / CentOS ▶ GNU/Linux Debian and Ubuntu ▶ https://account.gnome.org/ runs FreeIPA since october

2014

slide-12
SLIDE 12

Enterprise desktop at home with FreeIPA and GNOME 12

How enterprisey are we?

slide-13
SLIDE 13

Enterprise desktop at home with FreeIPA and GNOME 13

Let’s score by a password

slide-14
SLIDE 14

Enterprise desktop at home with FreeIPA and GNOME 14

Let’s score by a password

A typical workfmow for every laptop reboot

  • 1. Sign into a local system account (enter a password)
  • 2. Jump onto virtual private network (enter a password or more)
  • 3. Obtain initial Kerberos credentials (enter a password)
  • 4. Use corporate applications (enter a password?)
slide-15
SLIDE 15

Enterprise desktop at home with FreeIPA and GNOME 15

Let’s score by a password

A typical workfmow for every laptop reboot

  • 1. Sign into a local system account (enter a password)
  • 2. Jump onto virtual private network (enter a password or more)
  • 3. Obtain initial Kerberos credentials (enter a password)
  • 4. Use corporate applications (enter a password?)
slide-16
SLIDE 16

Enterprise desktop at home with FreeIPA and GNOME 16

Let’s score by a password

A typical workfmow for every laptop reboot

  • 1. Sign into a local system account (enter a password)
  • 2. Jump onto virtual private network (enter a password or more)
  • 3. Obtain initial Kerberos credentials (enter a password)
  • 4. Use corporate applications (enter a password?)
slide-17
SLIDE 17

Enterprise desktop at home with FreeIPA and GNOME 17

Let’s score by a password

A typical workfmow for every laptop reboot

  • 1. Sign into a local system account (enter a password)
  • 2. Jump onto virtual private network (enter a password or more)
  • 3. Obtain initial Kerberos credentials (enter a password)
  • 4. Use corporate applications (enter a password?)
slide-18
SLIDE 18

Enterprise desktop at home with FreeIPA and GNOME 18

Can we do better than this?

how far are we from

▶ Sign into a corporate environment ▶ Use corporate applications

?

slide-19
SLIDE 19

Enterprise desktop at home with FreeIPA and GNOME 19

Let’s try to login!

Demo of interactive logon

slide-20
SLIDE 20

Enterprise desktop at home with FreeIPA and GNOME 20

What was that?

▶ The system is confjgured to be a client for FreeIPA

SSSD handles login and Kerberos keys Login to the system is verifjed over public network using a proxy for Kerberos protocol Established VPN connection based on Kerberos ticket Credentials were entered only once

slide-21
SLIDE 21

Enterprise desktop at home with FreeIPA and GNOME 21

What was that?

▶ The system is confjgured to be a client for FreeIPA ▶ SSSD handles login and Kerberos keys

Login to the system is verifjed over public network using a proxy for Kerberos protocol Established VPN connection based on Kerberos ticket Credentials were entered only once

slide-22
SLIDE 22

Enterprise desktop at home with FreeIPA and GNOME 22

What was that?

▶ The system is confjgured to be a client for FreeIPA ▶ SSSD handles login and Kerberos keys ▶ Login to the system is verifjed over public network using a

proxy for Kerberos protocol Established VPN connection based on Kerberos ticket Credentials were entered only once

slide-23
SLIDE 23

Enterprise desktop at home with FreeIPA and GNOME 23

What was that?

▶ The system is confjgured to be a client for FreeIPA ▶ SSSD handles login and Kerberos keys ▶ Login to the system is verifjed over public network using a

proxy for Kerberos protocol

▶ Established VPN connection based on Kerberos ticket

Credentials were entered only once

slide-24
SLIDE 24

Enterprise desktop at home with FreeIPA and GNOME 24

What was that?

▶ The system is confjgured to be a client for FreeIPA ▶ SSSD handles login and Kerberos keys ▶ Login to the system is verifjed over public network using a

proxy for Kerberos protocol

▶ Established VPN connection based on Kerberos ticket ▶ Credentials were entered only once

slide-25
SLIDE 25

Enterprise desktop at home with FreeIPA and GNOME 25

Kerberos proxy

Available on the client side with Microsoft Active Directory and MIT Kerberos 1.13

▶ protocol is called MS-KKDCP ▶ transparent for Kerberos library users

Kerberos proxy is implemented by FreeIPA 4.2, OpenConnect Server 7.05, and as a standalone server

▶ Requires HTTPS connection, set up by default in FreeIPA 4.2,

very easy to use (one line change on the client)

▶ Allows to obtain tickets from anywhere ▶ SSSD 1.12+ ▶ GNOME project has enabled KDC proxy support in

https://account.gnome.org to allow use of Kerberos credentials for SSH accounts for GNOME developers

slide-26
SLIDE 26

Enterprise desktop at home with FreeIPA and GNOME 26

VPN and Kerberos

OpenConnect client supports GSSAPI negotiation

▶ Fedora 22+ works out of the box

OpenVPN does not support GSSAPI negotiation

▶ to do since 2005

Could we enforce stronger authentication at a VPN edge?

▶ yes, we are be able to do so with Kerberos 1.14

▶ no practical implementation in FreeIPA yet

slide-27
SLIDE 27

Enterprise desktop at home with FreeIPA and GNOME 27

Two-factor authentication

FreeIPA 4.x supports 2FA natively

▶ Yubikey, FreeOTP client for Android and iOS, any

HOTP/TOTP compatible software and hardware

▶ Two-factor authentication is enforced on Kerberos level ▶ Performs pre-authentication before issuing a ticket ▶ Authentication Indicators are in Kerberos 1.14 ▶ Pre-authentication modules can say how tickets were issued

slide-28
SLIDE 28

Enterprise desktop at home with FreeIPA and GNOME 28

FreeOTP client for Android and iOS

Figure 1:

slide-29
SLIDE 29

Enterprise desktop at home with FreeIPA and GNOME 29

Demo of interactive logon with 2FA

Let’s create a token for a user and logon with 2FA via Yubikey

slide-30
SLIDE 30

Enterprise desktop at home with FreeIPA and GNOME 30

What was that?

  • 1. One time password token was programmed to Yubikey and

added for the user in FreeIPA

  • 2. SSSD handles login and notices OTP pre-authentication

support in Kerberos conversation

  • 3. Login to the system is verifjed over public network using a

proxy for Kerberos protocol

  • 4. Kerberos ticket is obtained, fjrst factor is provided by SSSD to

GDM for unlocking GNOME passwords and keys storage (SeaHorse)

  • 5. Credentials were entered only once
slide-31
SLIDE 31

Enterprise desktop at home with FreeIPA and GNOME 31

What was that?

  • 1. One time password token was programmed to Yubikey and

added for the user in FreeIPA

  • 2. SSSD handles login and notices OTP pre-authentication

support in Kerberos conversation

  • 3. Login to the system is verifjed over public network using a

proxy for Kerberos protocol

  • 4. Kerberos ticket is obtained, fjrst factor is provided by SSSD to

GDM for unlocking GNOME passwords and keys storage (SeaHorse)

  • 5. Credentials were entered only once
slide-32
SLIDE 32

Enterprise desktop at home with FreeIPA and GNOME 32

What was that?

  • 1. One time password token was programmed to Yubikey and

added for the user in FreeIPA

  • 2. SSSD handles login and notices OTP pre-authentication

support in Kerberos conversation

  • 3. Login to the system is verifjed over public network using a

proxy for Kerberos protocol

  • 4. Kerberos ticket is obtained, fjrst factor is provided by SSSD to

GDM for unlocking GNOME passwords and keys storage (SeaHorse)

  • 5. Credentials were entered only once
slide-33
SLIDE 33

Enterprise desktop at home with FreeIPA and GNOME 33

What was that?

  • 1. One time password token was programmed to Yubikey and

added for the user in FreeIPA

  • 2. SSSD handles login and notices OTP pre-authentication

support in Kerberos conversation

  • 3. Login to the system is verifjed over public network using a

proxy for Kerberos protocol

  • 4. Kerberos ticket is obtained, fjrst factor is provided by SSSD to

GDM for unlocking GNOME passwords and keys storage (SeaHorse)

  • 5. Credentials were entered only once
slide-34
SLIDE 34

Enterprise desktop at home with FreeIPA and GNOME 34

What was that?

  • 1. One time password token was programmed to Yubikey and

added for the user in FreeIPA

  • 2. SSSD handles login and notices OTP pre-authentication

support in Kerberos conversation

  • 3. Login to the system is verifjed over public network using a

proxy for Kerberos protocol

  • 4. Kerberos ticket is obtained, fjrst factor is provided by SSSD to

GDM for unlocking GNOME passwords and keys storage (SeaHorse)

  • 5. Credentials were entered only once
slide-35
SLIDE 35

Enterprise desktop at home with FreeIPA and GNOME 35

If Kerberos credentials are available, what can we do with them?

▶ Authenticate with GSSAPI against almost anything

Obtain SAML assertion for other web services (and more) Use to access networking fjle systems Display properties of the available tickets Renew the ticket granting ticket (TGT) Choose which Kerberos principal is in use

slide-36
SLIDE 36

Enterprise desktop at home with FreeIPA and GNOME 36

If Kerberos credentials are available, what can we do with them?

▶ Authenticate with GSSAPI against almost anything ▶ Obtain SAML assertion for other web services (and more)

Use to access networking fjle systems Display properties of the available tickets Renew the ticket granting ticket (TGT) Choose which Kerberos principal is in use

slide-37
SLIDE 37

Enterprise desktop at home with FreeIPA and GNOME 37

If Kerberos credentials are available, what can we do with them?

▶ Authenticate with GSSAPI against almost anything ▶ Obtain SAML assertion for other web services (and more) ▶ Use to access networking fjle systems

Display properties of the available tickets Renew the ticket granting ticket (TGT) Choose which Kerberos principal is in use

slide-38
SLIDE 38

Enterprise desktop at home with FreeIPA and GNOME 38

If Kerberos credentials are available, what can we do with them?

▶ Authenticate with GSSAPI against almost anything ▶ Obtain SAML assertion for other web services (and more) ▶ Use to access networking fjle systems ▶ Display properties of the available tickets

Renew the ticket granting ticket (TGT) Choose which Kerberos principal is in use

slide-39
SLIDE 39

Enterprise desktop at home with FreeIPA and GNOME 39

If Kerberos credentials are available, what can we do with them?

▶ Authenticate with GSSAPI against almost anything ▶ Obtain SAML assertion for other web services (and more) ▶ Use to access networking fjle systems ▶ Display properties of the available tickets ▶ Renew the ticket granting ticket (TGT)

Choose which Kerberos principal is in use

slide-40
SLIDE 40

Enterprise desktop at home with FreeIPA and GNOME 40

If Kerberos credentials are available, what can we do with them?

▶ Authenticate with GSSAPI against almost anything ▶ Obtain SAML assertion for other web services (and more) ▶ Use to access networking fjle systems ▶ Display properties of the available tickets ▶ Renew the ticket granting ticket (TGT) ▶ Choose which Kerberos principal is in use

slide-41
SLIDE 41

Enterprise desktop at home with FreeIPA and GNOME 41

Authenticate with GSSAPI

Epiphany, the GNOME Web Browser, in GNOME 18:

▶ GSSAPI support is no more, depends on libsoup support

libsoup has been dragging since 2009, bug #587145 WebkitGtk is unusable for SAML/OAuth2 interactions involving Kerberos One cannot use Google apps with GSSAPI in Gnome Online Accounts No single sign-on with GSSAPI from GNOME applications using WebkitGtk to authenticate

slide-42
SLIDE 42

Enterprise desktop at home with FreeIPA and GNOME 42

Authenticate with GSSAPI

Epiphany, the GNOME Web Browser, in GNOME 18:

▶ GSSAPI support is no more, depends on libsoup support ▶ libsoup has been dragging since 2009, bug #587145

WebkitGtk is unusable for SAML/OAuth2 interactions involving Kerberos One cannot use Google apps with GSSAPI in Gnome Online Accounts No single sign-on with GSSAPI from GNOME applications using WebkitGtk to authenticate

slide-43
SLIDE 43

Enterprise desktop at home with FreeIPA and GNOME 43

Authenticate with GSSAPI

Epiphany, the GNOME Web Browser, in GNOME 18:

▶ GSSAPI support is no more, depends on libsoup support ▶ libsoup has been dragging since 2009, bug #587145 ▶ WebkitGtk is unusable for SAML/OAuth2 interactions

involving Kerberos One cannot use Google apps with GSSAPI in Gnome Online Accounts No single sign-on with GSSAPI from GNOME applications using WebkitGtk to authenticate

slide-44
SLIDE 44

Enterprise desktop at home with FreeIPA and GNOME 44

Authenticate with GSSAPI

Epiphany, the GNOME Web Browser, in GNOME 18:

▶ GSSAPI support is no more, depends on libsoup support ▶ libsoup has been dragging since 2009, bug #587145 ▶ WebkitGtk is unusable for SAML/OAuth2 interactions

involving Kerberos

▶ One cannot use Google apps with GSSAPI in Gnome Online

Accounts No single sign-on with GSSAPI from GNOME applications using WebkitGtk to authenticate

slide-45
SLIDE 45

Enterprise desktop at home with FreeIPA and GNOME 45

Authenticate with GSSAPI

Epiphany, the GNOME Web Browser, in GNOME 18:

▶ GSSAPI support is no more, depends on libsoup support ▶ libsoup has been dragging since 2009, bug #587145 ▶ WebkitGtk is unusable for SAML/OAuth2 interactions

involving Kerberos

▶ One cannot use Google apps with GSSAPI in Gnome Online

Accounts

▶ No single sign-on with GSSAPI from GNOME applications

using WebkitGtk to authenticate

slide-46
SLIDE 46

Enterprise desktop at home with FreeIPA and GNOME 46

Can we do better than this?

slide-47
SLIDE 47

Enterprise desktop at home with FreeIPA and GNOME 47

What was that?

Tomáš Popela (Red Hat) and David Woodhouse (Intel) worked to fjx libsoup and WebkitGtk This laptop is running an experimental build of them We logged into my FreeIPA server’s Web UI Hopefully, the code will be in the next GNOME release

slide-48
SLIDE 48

Enterprise desktop at home with FreeIPA and GNOME 48

What does GSSAPI support open for use in GNOME Online Accounts?

▶ Single sign-on is the primary feature

Automated credentials renewal Automated token/assertion renewal for SAML/OpenID No need to store passwords locally (secure kiosks?)

slide-49
SLIDE 49

Enterprise desktop at home with FreeIPA and GNOME 49

What does GSSAPI support open for use in GNOME Online Accounts?

▶ Single sign-on is the primary feature ▶ Automated credentials renewal

Automated token/assertion renewal for SAML/OpenID No need to store passwords locally (secure kiosks?)

slide-50
SLIDE 50

Enterprise desktop at home with FreeIPA and GNOME 50

What does GSSAPI support open for use in GNOME Online Accounts?

▶ Single sign-on is the primary feature ▶ Automated credentials renewal ▶ Automated token/assertion renewal for SAML/OpenID

No need to store passwords locally (secure kiosks?)

slide-51
SLIDE 51

Enterprise desktop at home with FreeIPA and GNOME 51

What does GSSAPI support open for use in GNOME Online Accounts?

▶ Single sign-on is the primary feature ▶ Automated credentials renewal ▶ Automated token/assertion renewal for SAML/OpenID ▶ No need to store passwords locally (secure kiosks?)

slide-52
SLIDE 52

Enterprise desktop at home with FreeIPA and GNOME 52

Visualize

GNOME Online Accounts could show Kerberos ticket properties

▶ Ticket time validity, fmags (forward, renewal) ▶ Authentication indicators ▶ Existing service tickets in the credentials cache and allow to

remove them selectively

▶ Allow automatic ticket renewal if KDC permits it

slide-53
SLIDE 53

Enterprise desktop at home with FreeIPA and GNOME 53

Visualize

And choose between difgerent Kerberos principals

▶ MIT Kerberos supports kernel keyring (1.12+) and

directory-based (1.11+) storage of credentials

▶ Multiple Kerberos principals can be stored and used at the

same time

▶ Only a single principal can be defjned as “primary” for each

Kerberos realm in the collection of credentials

slide-54
SLIDE 54

Enterprise desktop at home with FreeIPA and GNOME 54

Kerberos ticket renewal

▶ SSSD supports automatic Kerberos ticket renewal for single

factor cases

▶ Renewing 2FA tickets requires UI interaction triggered by

expiry time

▶ Automatic ticket renewal requires permission from KDC,

visible as a ticket fmag

▶ GNOME Online Accounts could integrate with SSSD in

prompting for credentials (multiple factors) in 2FA case needed information could be provided via SSSD InfoPipe/AuthPipe

slide-55
SLIDE 55

Enterprise desktop at home with FreeIPA and GNOME 55

Better Kerberos in browsers

▶ Firefox Kerberos setup isn’t nice

▶ needs about:confjg manipulation ▶ DNS domains associated with Kerberos realm could be

discovered via DNS SRV records, prompted for confjrmation

  • nce

▶ FreeIPA used to provide an extension to automate Firefox

setup

▶ Extension was generated locally for for each FreeIPA

deployment to provide confjguration details

▶ not anymore: Firefox removed ability to provide non-publicly

available extensions since version 43

slide-56
SLIDE 56

Enterprise desktop at home with FreeIPA and GNOME 56

Better Kerberos in browsers

▶ Chromium/Chrome

▶ Have bugs for processing of WWW-Authenticate: Negotiate

when Kerberos credentials are not available

▶ On Linux only allows to confjgure Kerberos use through

command line, poor user experience

▶ A fjxed libsoup/WebkitGtk allows to always use GSSAPI if

server advertises WWW-Authenticate: Negotiate over HTTPS

▶ no need to confjgure anything in Epiphany ▶ could be further confjned with a user confjrmation similar to

how passwords are managed on fjrst use

slide-57
SLIDE 57

Enterprise desktop at home with FreeIPA and GNOME 57

Better Kerberos in browsers

▶ GSSAPI fmow is synchronous, needs better UI interaction to

avoid hogging down other tabs

▶ still major issue for many browsers

slide-58
SLIDE 58

Enterprise desktop at home with FreeIPA and GNOME 58

Any practical use of it?

slide-59
SLIDE 59

Enterprise desktop at home with FreeIPA and GNOME 59

What was that?

Ipsilon is an Identity provider that supports GSSAPI, SAML, OpenID, and other methods of authentication

▶ I set up Ipsilon to authenticate against my FreeIPA server

I set up Owncloud instance and created a simple application to do login via Ipsilon SAML Successfully logged-in users get created in Owncloud if they belong to a certain group in FreeIPA No need to enter password if Kerberos credentials are available Credentials were entered only once

slide-60
SLIDE 60

Enterprise desktop at home with FreeIPA and GNOME 60

What was that?

Ipsilon is an Identity provider that supports GSSAPI, SAML, OpenID, and other methods of authentication

▶ I set up Ipsilon to authenticate against my FreeIPA server ▶ I set up Owncloud instance and created a simple application

to do login via Ipsilon SAML Successfully logged-in users get created in Owncloud if they belong to a certain group in FreeIPA No need to enter password if Kerberos credentials are available Credentials were entered only once

slide-61
SLIDE 61

Enterprise desktop at home with FreeIPA and GNOME 61

What was that?

Ipsilon is an Identity provider that supports GSSAPI, SAML, OpenID, and other methods of authentication

▶ I set up Ipsilon to authenticate against my FreeIPA server ▶ I set up Owncloud instance and created a simple application

to do login via Ipsilon SAML

▶ Successfully logged-in users get created in Owncloud if they

belong to a certain group in FreeIPA No need to enter password if Kerberos credentials are available Credentials were entered only once

slide-62
SLIDE 62

Enterprise desktop at home with FreeIPA and GNOME 62

What was that?

Ipsilon is an Identity provider that supports GSSAPI, SAML, OpenID, and other methods of authentication

▶ I set up Ipsilon to authenticate against my FreeIPA server ▶ I set up Owncloud instance and created a simple application

to do login via Ipsilon SAML

▶ Successfully logged-in users get created in Owncloud if they

belong to a certain group in FreeIPA

▶ No need to enter password if Kerberos credentials are available

Credentials were entered only once

slide-63
SLIDE 63

Enterprise desktop at home with FreeIPA and GNOME 63

What was that?

Ipsilon is an Identity provider that supports GSSAPI, SAML, OpenID, and other methods of authentication

▶ I set up Ipsilon to authenticate against my FreeIPA server ▶ I set up Owncloud instance and created a simple application

to do login via Ipsilon SAML

▶ Successfully logged-in users get created in Owncloud if they

belong to a certain group in FreeIPA

▶ No need to enter password if Kerberos credentials are available ▶ Credentials were entered only once

slide-64
SLIDE 64

Enterprise desktop at home with FreeIPA and GNOME 64

Oops, I “invented” Owncloud Enteprise Edition?

slide-65
SLIDE 65

Enterprise desktop at home with FreeIPA and GNOME 65

Better support for SAML in GNOME Online Accounts

GNOME Online Accounts doesn’t support SAML for arbitrary provider

▶ One cannot setup own Owncloud account in GNOME without

entering passwords

▶ Have to use separate Owncloud end-point for non-SAML

logon

slide-66
SLIDE 66

Enterprise desktop at home with FreeIPA and GNOME 66

Certifjcates

FreeIPA 4.2 supports issuing x.509 certifjcates to users FreeIPA 4.2 adds per-user vault to store keys and credentials wrapped into an encrypted blob

▶ authentication to password vaults is GSSAPI-based ▶ multiple clients can use unique public/private key pairs to

derive their access to user’s vault

▶ SSSD 1.13 allows to authenticate with certifjcates ▶ Certifjcates can come from any OpenSC and coolkey

compatible devices

slide-67
SLIDE 67

Enterprise desktop at home with FreeIPA and GNOME 67

How enterprisey our home could become?

slide-68
SLIDE 68

Enterprise desktop at home with FreeIPA and GNOME 68

What benefjts do we get by becoming enterprisey with FreeIPA and GNOME?

  • 1. Control your own infrastructure
  • 2. Improve user experience by reducing number of

password/logon interactions

  • 3. Profjt?
slide-69
SLIDE 69

Enterprise desktop at home with FreeIPA and GNOME 69

What benefjts do we get by becoming enterprisey with FreeIPA and GNOME?

  • 1. Control your own infrastructure
  • 2. Improve user experience by reducing number of

password/logon interactions

  • 3. Profjt?
slide-70
SLIDE 70

Enterprise desktop at home with FreeIPA and GNOME 70

What benefjts do we get by becoming enterprisey with FreeIPA and GNOME?

  • 1. Control your own infrastructure
  • 2. Improve user experience by reducing number of

password/logon interactions

  • 3. Profjt?
slide-71
SLIDE 71

Enterprise desktop at home with FreeIPA and GNOME 71

Questions?