Bug 570191

Summary: PRD35 - [RFE] [AAA] support Kerberos authentication (for REST API)
Product: Red Hat Enterprise Virtualization Manager Reporter: Mark McLoughlin <markmc>
Component: ovirt-engineAssignee: Alon Bar-Lev <alonbl>
Status: CLOSED ERRATA QA Contact: Ondra Machacek <omachace>
Severity: medium Docs Contact:
Priority: low    
Version: 2.3.0CC: alonbl, bazulay, bsettle, cvantuin, djasa, djuran, gklein, iheim, jfenal, jminter, juan.hernandez, lmiccini, lpeer, oourfali, oramraz, pablo.iranzo, pspacek, pstehlik, rbalakri, Rhev-m-bugs, sherold, yeylon
Target Milestone: ---Keywords: FutureFeature, TechPreview
Target Release: 3.5.0   
Hardware: All   
OS: Linux   
URL: x
Whiteboard: infra
Fixed In Version: vt1.3 Doc Type: Technology Preview
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2015-02-11 17:49:13 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: Infra RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 611306, 875920, 1113937, 1121493, 1142923, 1156165    

Description Mark McLoughlin 2010-03-03 15:19:49 UTC
The AutoLogin command allows users on the same machine as the RHEV-M backend to avoid re-authenticating because RHEV-M can use the ServiceSecurityContext::WindowsIdentity property to check the calling user's identity.

No similar API exists in Java/JBoss, so this functionality has been disabled.

This thread on the mailing list discusses the need for the functionality and some ideas for how it might be implemented:

  http://post-office.corp.redhat.com/archives/rhev-x/2010-March/thread.html#00022

Comment 1 Itamar Heim 2010-03-24 20:13:08 UTC
Two issues here:
1. CLI (and maybe SDK) need to support implicit, persistent login in case of session failure[1].
2. CLI (and maybe SDK) need to support kerberos authentication for currently logged in windows/linux user

[1] pay attention the current implementation in 2.2 windows powershell is actually not correct. consider the following use case:
a. user is logged in to windows with domain\xxx
b. user opens powershell and runs a script which will login-user domain\yyy.
c. after several commands the session breaks, and implicit auto authentication will re-authenticate the user, but with the windows logged in user of domain\xxx, rather than the last user the user logged in with.

fixing #1 is relatively easy, since all we need to do is keep the login-user parameters and re-use them on session failure.
fixing #2 actually requires kerberos support from windows-->jboss-->AD (and later for linux-->jboss>AD/RHDS

Comment 2 Itamar Heim 2010-12-13 17:09:16 UTC
this is basically "support kerberos authentication" by backend

Comment 3 Itamar Heim 2012-03-06 19:33:34 UTC
*** Bug 746706 has been marked as a duplicate of this bug. ***

Comment 4 Itamar Heim 2012-12-06 19:46:28 UTC
related to bug 884653

Comment 5 Alon Bar-Lev 2013-08-31 06:38:57 UTC
Relates to: bug#958874

Comment 6 Alon Bar-Lev 2013-08-31 06:41:48 UTC
Relates to: bug#958861

Comment 7 Juan Hernández 2014-06-16 13:40:35 UTC
Authentication is now external to the RESTAPI.

Comment 8 Alon Bar-Lev 2014-06-22 17:30:22 UTC
Working with mod_auth_kerb, implies that kerberos is enforced, no other method is enabled.

Comment 13 errata-xmlrpc 2015-02-11 17:49:13 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://rhn.redhat.com/errata/RHSA-2015-0158.html