Project

General

Profile

Actions

tickets #160227

closed

Solution for SSH key management without FreeIPA

Added by crameleon 2 months ago. Updated about 23 hours ago.

Status:
Resolved
Priority:
Normal
Assignee:
Category:
Core services and virtual infrastructure
Target version:
-
Start date:
2024-05-10
Due date:
% Done:

0%

Estimated time:

Description

Currently users manage their SSH keys through the FreeIPA web GUI.

With Kanidm this is not possible, one needs to use the kanidm CLI. This is fine by itself, however we currently enforce public key authentication to all machines, making it impossible for someone to add their first SSH key once the FreeIPA GUI is shut down.
We need to find a process to solve this. One idea is some special VM allowing passphrase authentication (however I think in some remote sense having a VM allowing changing of the SSH keys using the users passphrase is theoretically backdooring all the key-only VMs). Another idea is to make adding the initial SSH key the job of the person equipping a user with their VPN access.

Either way, both should be documented - how users can manage their SSH keys (where to connect to, which commands to run, ..), and if anything changes for onboarding a user.

This task is a blocker for decommissioning FreeIPA.

Actions

Also available in: Atom PDF