Skip to content

Commit b752f34

Browse files
committed
Update procedure on resetting external auth
Move reset to its own module Update ext auth reset with additional details
1 parent 71abfd8 commit b752f34

File tree

4 files changed

+61
-18
lines changed

4 files changed

+61
-18
lines changed

guides/common/modules/proc_configuring-the-active-directory-authentication-source-on-projectserver.adoc

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -161,7 +161,8 @@ ifdef::foreman-el,katello[]
161161
For information on configuring system-wide cryptographic policies, see link:https://docs.redhat.com/en/documentation/red_hat_enterprise_linux/9/html/security_hardening/using-the-system-wide-cryptographic-policies_security-hardening[Using system-wide cryptographic policies] in _{RHEL}{nbsp}9 Security hardening_.
162162
endif::[]
163163

164-
ifndef::orcharhino[]
165164
.Additional resources
165+
ifndef::orcharhino[]
166166
* https://docs.redhat.com/en/documentation/red_hat_enterprise_linux/9/html/configuring_authentication_and_authorization_in_rhel/configuring_applications_for_sso#Configuring_Firefox_to_use_Kerberos_for_SSO[Configuring Firefox to use Kerberos for single sign-on in _{RHEL}{nbsp}9 Configuring authentication and authorization in RHEL_]
167167
endif::[]
168+
* xref:resetting-external-authentication-configuration-for-kerberos-sso[]

guides/common/modules/proc_configuring-the-freeipa-authentication-source-on-projectserver.adoc

Lines changed: 3 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -43,23 +43,6 @@ Enabling access to both the {ProjectWebUI} and the {Project} API poses a securit
4343
After the {FreeIPA} user enters `kinit` to receive a Kerberos ticket-granting ticket (TGT), an attacker might obtain an API session.
4444
The attack is possible even if the user did not previously enter the {Project} login credentials anywhere, for example in the browser.
4545
====
46-
ifdef::foremanctl[]
47-
* To disable external authentication with {FreeIPA}, reset external authentication:
48-
+
49-
[options="nowrap", subs="+quotes,verbatim,attributes"]
50-
----
51-
# foremanctl deploy --reset-external-authentication
52-
----
53-
endif::[]
54-
ifndef::foremanctl[]
55-
* To disable external authentication with {FreeIPA}, reset the options.
56-
For example, to disable access to the {Project} API and Hammer CLI:
57-
+
58-
[options="nowrap", subs="+quotes,verbatim,attributes"]
59-
----
60-
# {foreman-installer} --reset-foreman-ipa-authentication-api
61-
----
62-
endif::[]
6346
. If your {ProjectServer} runs in an IPv6-only network and also runs on {EL}{nbsp}9.6 and earlier or {EL}{nbsp}10.0, set the `lookup_family_order` option in the `[domain/_{freeipaserver-example-com}_]` section of the `/etc/sssd/sssd.conf` file:
6447
+
6548
[source, ini, options="nowrap", subs="+quotes,verbatim,attributes"]
@@ -74,3 +57,6 @@ Without the option, IdM users are unable to use `kinit` to authenticate to {Proj
7457

7558
.Verification
7659
* Log in to {ProjectWebUI} by entering the credentials of a user defined in {FreeIPA}.
60+
61+
.Additional resources
62+
* xref:resetting-external-authentication-configuration-for-kerberos-sso[]
Lines changed: 54 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,54 @@
1+
:_mod-docs-content-type: PROCEDURE
2+
3+
[id="resetting-external-authentication-configuration-for-kerberos-sso"]
4+
= Resetting external authentication configuration for Kerberos SSO
5+
6+
[role="_abstract"]
7+
You can disable external authentication with {FreeIPA} by resetting the external authentication configuration.
8+
This prevents user accounts defined in the external authentication source from accessing {Project}.
9+
10+
[IMPORTANT]
11+
====
12+
Resetting external authentication prevents users from accessing {Project} as described in xref:configuring-kerberos-sso-with-{FreeIPA-context}-in-{project-context}[] and xref:configuring-kerberos-sso-for-active-directory-users-in-project_{context}[].
13+
However, some configuration files, such as configuration files for the System Security Services Daemon (SSSD), will remain modified because {Project} does not have access to the previous state of these files.
14+
====
15+
16+
.Procedure
17+
ifdef::foremanctl[]
18+
* Reset {FreeIPA} authentication configuration to the default state:
19+
+
20+
[options="nowrap", subs="+quotes,verbatim,attributes"]
21+
----
22+
# foremanctl deploy --reset-external-authentication
23+
----
24+
endif::[]
25+
ifndef::foremanctl[]
26+
* Reset {FreeIPA} authentication configuration to the default state:
27+
** To disable access to {ProjectWebUI}:
28+
+
29+
[options="nowrap", subs="+quotes,verbatim,attributes"]
30+
----
31+
# {foreman-installer} --reset-foreman-ipa-authentication
32+
----
33+
** To disable access to {ProjectWebUI}, {Project} API, and Hammer CLI:
34+
+
35+
[options="nowrap", subs="+quotes,verbatim,attributes"]
36+
----
37+
# {foreman-installer} --reset-foreman-ipa-authentication-api
38+
----
39+
endif::[]
40+
41+
.Verification
42+
ifdef::foremanctl[]
43+
#How can users verify this?#
44+
endif::[]
45+
ifndef::foremanctl[]
46+
* Display the value for the `foreman-ipa-authentication` and `foreman-ipa-authentication-api` configuration options:
47+
+
48+
[options="nowrap", subs="+quotes,verbatim,attributes"]
49+
----
50+
# {foreman-installer} --help | grep foreman-ipa-authentication
51+
----
52+
+
53+
The expected value for disabled external authentication is `false`.
54+
endif::[]

guides/doc-Configuring_User_Authentication/master.adoc

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -63,6 +63,8 @@ endif::[]
6363

6464
include::common/modules/con_refreshing-external-user-groups-for-freeipa-or-ad.adoc[leveloffset=+1]
6565

66+
include::common/modules/proc_resetting-external-authentication-configuration-for-kerberos-sso.adoc[leveloffset=+1]
67+
6668
ifndef::orcharhino,satellite[]
6769
include::common/ribbons.adoc[]
6870
endif::[]

0 commit comments

Comments
 (0)