Bug 1206534
| Summary: | [RFE] Offer Kerberos over HTTP (kdcproxy) by default | |||
|---|---|---|---|---|
| Product: | Red Hat Enterprise Linux 7 | Reporter: | Martin Kosek <mkosek> | |
| Component: | ipa | Assignee: | IPA Maintainers <ipa-maint> | |
| Status: | CLOSED ERRATA | QA Contact: | Namita Soman <nsoman> | |
| Severity: | unspecified | Docs Contact: | Aneta Šteflová Petrová <apetrova> | |
| Priority: | medium | |||
| Version: | 7.0 | CC: | cheimes, mnavrati, pvoborni, rbiba, rcritten, xdong | |
| Target Milestone: | rc | Keywords: | FutureFeature | |
| Target Release: | --- | |||
| Hardware: | Unspecified | |||
| OS: | Unspecified | |||
| Whiteboard: | ||||
| Fixed In Version: | ipa-4.2.0-1.el7 | Doc Type: | Release Note | |
| Doc Text: |
Kerberos HTTPS proxy in Identity Management
A Key Distribution Center (KDC) proxy function, interoperable with the Microsoft Kerberos KDC Proxy Protocol (MS-KKDCP) implementation, is now available in Identity Management and allows clients to access the KDC and *kpasswd* services by using HTTPS. System administrators can now expose the proxy at their network edge by a simple HTTPS reverse proxy without the need to set up and manage a dedicated application.
|
Story Points: | --- | |
| Clone Of: | ||||
| : | 1246517 (view as bug list) | Environment: | ||
| Last Closed: | 2015-11-19 12:03:15 UTC | Type: | --- | |
| Regression: | --- | Mount Type: | --- | |
| Documentation: | --- | CRM: | ||
| Verified Versions: | Category: | --- | ||
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | ||
| Cloudforms Team: | --- | Target Upstream Version: | ||
| Embargoed: | ||||
| Bug Depends On: | ||||
| Bug Blocks: | 1181710 | |||
|
Description
Martin Kosek
2015-03-27 11:25:32 UTC
Fixed upstream master: https://fedorahosted.org/freeipa/changeset/495da412f155603c02907187c21dd4511281df2c Verified on ipa-4.2.0-5.el7.x86_64: Test Cases: RHEL7-31718 - IPA-TC: KDCProxy: Configure client krb5.conf,run kinit/kvno/kpasswd Step: 0) destroy existing credential cache 1) login with password 2) acquire a service ticket with kvno 3) Change password with kpasswd and log in with the new password Expected Result: Pass,Kerberos over HTTPS to 443 RHEL7-31719 - IPA-TC: KDCProxy: Server disable KDC Proxy,configure client krb5.conf,run kinit/kvno Step: 0) destroy existing credential cache 1) login with password 2) acquire a service ticket with kvno 3) Change password with kpasswd and log in with the new password Expected Result: Fail,kinit/kvno/kpassword fail with Cannot contact any KDC RHEL7-31720 - IPA-TC: KDCProxy: Server enable firewalld,configure client krb5.conf,run kinit/kvno/kpasswd Step: 0) destroy existing credential cache 1) login with password 2) acquire a service ticket with kvno 3) Change password with kpasswd and log in with the new password Expected Result: Fail,kinit/kvno/kpassword fail with Cannot contact any KDC RHEL7-31721 - IPA-TC: KDCProxy: Configure client krb5.conf with multiple kdc,run kinit/kvno/kpasswd Step: 0) destroy existing credential cache 1) login with password 2) acquire a service ticket with kvno 3) Change password with kpasswd and log in with the new password Expected Result: Pass,Kerberos over HTTPS to 443,sending request/receiving answer via master RHEL7-31722 - IPA-TC: KDCProxy: Stop ipa service(or start firewalld) on master,configure client krb5.conf with multiple kdc,run kinit/kvno/kpasswd Step: 0) destroy existing credential cache 1) login with password 2) acquire a service ticket with kvno 3) Change password with kpasswd and log in with the new password Expected Result: Pass,Kerberos over HTTPS to 443,sending request/receiving answer via replica RHEL7-31723 - IPA-TC: KDCProxy: configure client krb5.conf with no http_anchors, trust anchor in the system store: run kinit/kvno/kpasswd Step: 0) destroy existing credential cache 1) login with password 2) acquire a service ticket with kvno 3) Change password with kpasswd and log in with the new password Expected Result: Pass,Kerberos over HTTPS to 443 RHEL7-31724 - IPA-TC: KDCProxy: configure client krb5.conf with no http_anchors, trust anchor not in the system store: run kinit/kvno/kpasswd Step: 0) destroy existing credential cache 1) login with password 2) acquire a service ticket with kvno 3) Change password with kpasswd and log in with the new password Expected Result: Fail,kinit/kvno/kpassword fail with Cannot contact any KDC RHEL7-31725 - IPA-TC: KDCProxy: configure client krb5.conf with http_anchors points to PEM file, trust anchor in the system store: run kinit/kvno/kpasswd Step: 0) destroy existing credential cache 1) login with password 2) acquire a service ticket with kvno 3) Change password with kpasswd and log in with the new password Expected Result: Pass,Kerberos over HTTPS to 443 RHEL7-31726 - IPA-TC: KDCProxy: configure client krb5.conf with http_anchors points to wrong file, trust anchor in the system store: run kinit/kvno/kpasswd Step: 0) destroy existing credential cache 1) login with password 2) acquire a service ticket with kvno 3) Change password with kpasswd and log in with the new password Expected Result: Fail,kinit/kvno/kpassword fail with Cannot contact any KDC Test ran successfully. Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://rhn.redhat.com/errata/RHBA-2015-2362.html |