Hello, everyone. I am planning to set up Single Sign-On (SSO). I wonder if I can use something like Red Hat SSO with two separate domains. I have one domain for Windows AD and one for Linux IDM. My idea is to use Red Hat SSO so that both domains will be able to access the same services. For example, I have one Nextcloud instance, and I would like users from both domains to use it with SSO.

  • spaghetti_carbananaEnglish
    arrow-up
    7
    arrow-down
    0
    ·
    9 months ago
    link
    fedilink

    Authelia is popular, as is Keycloak. I believe Red Hat develops Keycloak or at least has a hand in it.

    I’m on this journey as well, figuring out what I’m going to use. Currently most of my services just use LDAP back to AD but I’m looking to do something more modern like SAML, oAuth or OpenID Connect so that I can simplify the number of MFA tokens I have.

    Just as an anecdote you may find useful - Personally I used to run an Active Directory for Windows and FreeIPA for my Linux machines and have managed to simplify this to just AD. Linux machines can be joined, you can still use sudo and all the other good stuff while only having one source of truth for identity.

    • kylian0087OPEnglish
      arrow-up
      2
      arrow-down
      0
      ·
      9 months ago
      link
      fedilink

      you can still use sudo and all the other good stuff while only having one source of truth for identity.

      I am aware that linux devices can join the AD domain. The reasons i setup up FreeIPA/IDM is the linux specific rules I can make. Like the Sudo rules for example. As far as i am aware you can not do this with a windows domain controller.

      • spaghetti_carbananaEnglish
        arrow-up
        1
        arrow-down
        0
        ·
        9 months ago
        link
        fedilink

        Depends on your use case, but you can use some Group Policy Objects on Linux (at least with sssd). See: https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/windows_integration_guide/sssd-gpo

        You can also grant sudo to AD group members in the sudoers file, which is how I’ve done it in a corporate setting.

        I believe there are 3rd party ADMX templates you can add to your domain controllers to get more granular as well as additions to the AD schema, but I haven’t gone that deep with it since between sssd and the sudoers file I can achieve what I need to.

        • kylian0087OPEnglish
          arrow-up
          1
          arrow-down
          0
          ·
          9 months ago
          link
          fedilink

          Arnt GPOs on Linux very limited? Anyway to get some form of “policys” working I was thinking of using Ansible and playbooks to manage that portion anyway. (Next project).

    • TCB13English
      arrow-up
      2
      arrow-down
      0
      ·
      9 months ago
      link
      fedilink

      Keycloak = XML pain.

      • LufyCZEnglish
        arrow-up
        2
        arrow-down
        0
        ·
        9 months ago
        link
        fedilink

        Haven’t come across any xml during my deployment so far

    • blessEnglish
      arrow-up
      1
      arrow-down
      0
      ·
      9 months ago
      link
      fedilink

      Looking for a good guide on getting this setup via docker and AD LDAP, any pointers?