Uploaded image for project: 'RHEL'
  1. RHEL
  2. RHEL-151578

Pagure #9948: Extend SELinux policy to allow use of SSSD authentication helpers on non-enrolled hosts

Linking RHIVOS CVEs to...Migration: Automation ...Sync from "Extern...XMLWordPrintable

    • Icon: Bug Bug
    • Resolution: Unresolved
    • Icon: Normal Normal
    • rhel-10.3
    • rhel-10.2
    • ipa
    • None
    • None
    • Moderate
    • rhel-idm-ipa
    • None
    • False
    • False
    • Hide

      None

      Show
      None
    • No
    • None
    • Unspecified Release Note Type - Unknown
    • Unspecified
    • Unspecified
    • Unspecified
    • None

      Cloned from: https://pagure.io/freeipa/issue/9948
      
      Right now SELinux policy provided by FreeIPA only allows to run SSSD helpers `oidc_child` and `passkey_child` within `ipa_otpd_t` context. This assumes that they are launched by `ipa-otpd` daemon as part of the Kerberos TGT processing on IPA domain controller.
      
      SSSD allows to authenticate with `oidc_child` and `passkey_child` on standalone deployments as well. We need to extend the SELinux policy to permit these usages.
      
      Additionally, MIT Kerberos 1.22 in Fedora provides automated FAST channel acquisition on IPA enrolled clients. This requires any application using libkrb5 to get access to publicly available certificate data stored by IPA client. Extend SELinux policy to allow this access.
      

              frenaud@redhat.com Florence Renaud
              frenaud@redhat.com Florence Renaud
              Florence Renaud Florence Renaud
              Sudhir Menon Sudhir Menon
              Votes:
              0 Vote for this issue
              Watchers:
              5 Start watching this issue

                Created:
                Updated: