Chapter 29. Configuring Single Sign-On for the RHEL 9 web console in the IdM domain
Learn how to use Single Sign-on (SSO) authentication provided by Identity Management (IdM) in the RHEL 9 web console.
Advantages:
- IdM domain administrators can use the RHEL 9 web console to manage local machines.
- Users with a Kerberos ticket in the IdM domain do not need to provide login credentials to access the web console.
- All hosts known to the IdM domain are accessible via SSH from the local instance of the RHEL 9 web console.
- Certificate configuration is not necessary. The console’s web server automatically switches to a certificate issued by the IdM certificate authority and accepted by browsers.
This chapter covers the following steps to configure SSO for logging into the RHEL web console:
Add machines to the IdM domain using the RHEL 9 web console.
For details, see Joining a RHEL 9 system to an IdM domain using the web console.
If you want to use Kerberos for authentication, you need to obtain a Kerberos ticket on your machine.
For details, see Logging in to the web console using Kerberos authentication.
Allow administrators on the IdM server to run any command on any host.
For details, see Enabling admin sudo access to domain administrators on the IdM server
Prerequisites
The RHEL web console installed on RHEL 9 systems.
For details, see Installing the web console.
IdM client installed on systems with the RHEL web console.
For details, see IdM client installation.
29.1. Joining a RHEL 9 system to an IdM domain using the web console
You can use the web console to join the Red Hat Enterprise Linux 9 system to the Identity Management (IdM) domain.
Prerequisites
- The IdM domain is running and reachable from the client you want to join.
- You have the IdM domain administrator credentials.
Procedure
Log into the RHEL web console.
For details, see Logging in to the web console.
- In the Configuration field of the Overview tab click Join Domain.
- In the Join a Domain dialog box, enter the host name of the IdM server in the Domain Address field.
- In the Domain administrator name field, enter the user name of the IdM administration account.
- In the Domain administrator password, add a password.
- Click Join.
Verification steps
- If the RHEL 9 web console did not display an error, the system has been joined to the IdM domain and you can see the domain name in the System screen.
To verify that the user is a member of the domain, click the Terminal page and type the
id
command:$ id euid=548800004(example_user) gid=548800004(example_user) groups=548800004(example_user) context=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023
29.2. Logging in to the web console using Kerberos authentication
The following procedure describes steps on how to set up the RHEL 9 system to use Kerberos authentication.
With SSO you usually do not have any administrative privileges in the web console. This only works if you configured passwordless sudo. The web console does not interactively ask for a sudo password.
Prerequisites
IdM domain running and reachable in your company environment.
For details, see Joining a RHEL 9 system to an IdM domain using the web console.
Enable the
cockpit.socket
service on remote systems to which you want to connect and manage them with the RHEL web console.For details, see Installing the web console.
-
If the system does not use a Kerberos ticket managed by the SSSD client, try to request the ticket with the
kinit
utility manually.
Procedure
Log in to the RHEL web console with the following address: https://dns_name:9090
.
At this point, you are successfully connected to the RHEL web console and you can start with configuration.
29.3. Enabling admin sudo access to domain administrators on the IdM server
The following procedure describes steps on how to allow domain administrators to run any command on any host in the Identity Management (IdM) domain.
To accomplish this, enable sudo access to the admins user group created automatically during the IdM server installation.
All users added to the admins group will have sudo access if you run ipa-advise
script on the group.
Prerequisites
- The server runs IdM 4.7.1 or later.
Procedure
- Connect to the IdM server.
Run the ipa-advise script:
$ ipa-advise enable-admins-sudo | sh -ex
If the console did not display an error, the admins group have admin permissions on all machines in the IdM domain.