Bug 570191
Summary: | PRD35 - [RFE] [AAA] support Kerberos authentication (for REST API) | ||
---|---|---|---|
Product: | Red Hat Enterprise Virtualization Manager | Reporter: | Mark McLoughlin <markmc> |
Component: | ovirt-engine | Assignee: | Alon Bar-Lev <alonbl> |
Status: | CLOSED ERRATA | QA Contact: | Ondra Machacek <omachace> |
Severity: | medium | Docs Contact: | |
Priority: | low | ||
Version: | 2.3.0 | CC: | alonbl, bazulay, bsettle, cvantuin, djasa, djuran, gklein, iheim, jfenal, jminter, juan.hernandez, lmiccini, lpeer, oourfali, oramraz, pablo.iranzo, pspacek, pstehlik, rbalakri, Rhev-m-bugs, sherold, yeylon |
Target Milestone: | --- | Keywords: | FutureFeature, TechPreview |
Target Release: | 3.5.0 | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | x | ||
Whiteboard: | infra | ||
Fixed In Version: | vt1.3 | Doc Type: | Technology Preview |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2015-02-11 17:49:13 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | Infra | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | |||
Bug Blocks: | 611306, 875920, 1113937, 1121493, 1142923, 1156165 |
Description
Mark McLoughlin
2010-03-03 15:19:49 UTC
Two issues here: 1. CLI (and maybe SDK) need to support implicit, persistent login in case of session failure[1]. 2. CLI (and maybe SDK) need to support kerberos authentication for currently logged in windows/linux user [1] pay attention the current implementation in 2.2 windows powershell is actually not correct. consider the following use case: a. user is logged in to windows with domain\xxx b. user opens powershell and runs a script which will login-user domain\yyy. c. after several commands the session breaks, and implicit auto authentication will re-authenticate the user, but with the windows logged in user of domain\xxx, rather than the last user the user logged in with. fixing #1 is relatively easy, since all we need to do is keep the login-user parameters and re-use them on session failure. fixing #2 actually requires kerberos support from windows-->jboss-->AD (and later for linux-->jboss>AD/RHDS this is basically "support kerberos authentication" by backend *** Bug 746706 has been marked as a duplicate of this bug. *** related to bug 884653 Relates to: bug#958874 Relates to: bug#958861 Authentication is now external to the RESTAPI. Working with mod_auth_kerb, implies that kerberos is enforced, no other method is enabled. Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://rhn.redhat.com/errata/RHSA-2015-0158.html |