středa 15. února 2017

neděle 15. ledna 2017

Deploying ManageIQ to oVirt with Ansible

In this blog post I will show you how to deploy ManageIQ appliance to oVirt engine using Ansible.
Prerequisites:
- Ansible 2.2 - Ansible modules for oVirt are available since Ansible 2.2.
- oVirt 4.0.4 - ImageIO is avaible since 4.0.4 (used to upload qcow disk).
The playbook here created will assume that you will run the playbook from the oVirt engine machine. So first please ssh to your oVirt machine. Now install the role which will handle the deploying the ManageIQ, it's called machacekondra.ovirt-manageiq and in order to install it run following command:
$ ansible-galaxy install machacekondra.ovirt-manageiq

Now please ensure that oVirt imageio is properly setup and running. As noted here you should check the ovirt-imageio-proxy service is running on your oVirt engine and ovirt-imageio-daemon service on your hosts. The other important thing is to use proper CA of your oVirt engine, the path can be specified using ovirt_ca variable in your playbook, which is by default /etc/pki/ovirt-engine/ca.pem.
That's it, if you did all steps before correctly, you can now create the playbook:
- name: Deploy ManageIQ to oVirt engine
hosts: localhost
gather_facts: no
vars:
ovirt_url: https://CHANGEME/ovirt-engine/api
ovirt_user: admin@internal
ovirt_password: CHANGEME
vm_cluster: Default
vm_memory: 4GiB
vm_cpu: 1
disk_storage_domain: data
disk_size: 50GiB
vm_cloud_init:
user_name: root
root_password: password
roles:
- machacekondra.ovirt-manageiq

Please change the URL of you oVirt engine and the password of your user, you can also change other variables as needed, you can find the explanation of variables here. I am strongly suggesting using Ansible vault for your passwords. Now save your playbook to some yaml file, for example manageiq.yml.
Now run the playbook:
$ omachace ~/workspace $ ansible-playbook -v manageiq.yml
Using /home/omachace/.ansible.cfg as config file
PLAY [Deploy ManageIQ to oVirt engine] *****************************************
TASK [ovirt-manageiq : Download the OVA image of ManageIQ] *********************
changed: [example.com] => {"changed": true, "checksum_dest": null, "checksum_src": "7641fb36babcb85db8348a020bac384d34d99ff2", "dest": "/tmp/manageiq.ova", "gid": 0, "group": "root", "md5sum": "f5bd3388b0fcd0e6b563ee26f2c193fa", "mode": "0644", "msg": "OK (1108479736 bytes)", "owner": "root", "secontext": "unconfined_u:object_r:user_tmp_t:s0", "size": 1108479736, "src": "/tmp/tmpfyCvx5", "state": "file", "uid": 0, "url": "http://releases.manageiq.org/manageiq-ovirt-euwe-1.ova"}
TASK [ovirt-manageiq : Create a directory for extract the OVA image] ***********
changed: [example.com] => {"changed": true, "gid": 0, "group": "root", "mode": "0755", "owner": "root", "path": "/tmp/manageiq/", "secontext": "unconfined_u:object_r:user_tmp_t:s0", "size": 6, "state": "directory", "uid": 0}
TASK [ovirt-manageiq : Extract the qcow image from OVA] ************************
changed: [example.com] => {"changed": true, "dest": "/tmp/manageiq/", "extract_results": {"cmd": ["/usr/bin/gtar", "--extract", "-C", "/tmp/manageiq/", "-z", "-f", "/tmp/ansible_c6VazY/manageiq-ovirt-euwe-1.ova"], "err": "", "out": "", "rc": 0}, "gid": 0, "group": "root", "handler": "TgzArchive", "mode": "0755", "owner": "root", "secontext": "unconfined_u:object_r:user_tmp_t:s0", "size": 34, "src": "/tmp/ansible_c6VazY/manageiq-ovirt-euwe-1.ova", "state": "directory", "uid": 0}
TASK [ovirt-manageiq : Find the name of the qcow image] ************************
ok: [example.com] => {"changed": false, "examined": 3, "failed": false, "failed_when_result": false, "files": [{"atime": 1484484081.7455075, "ctime": 1484484151.4001844, "dev": 64768, "gid": 0, "inode": 16844986, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0755", "mtime": 1482258336.0, "nlink": 1, "path": "/tmp/manageiq/images/28c5e3ae-6937-4621-9128-1be8f0a97e81/04a5f050-3956-4bc0-b953-0e11e068b320", "rgrp": true, "roth": true, "rusr": true, "size": 3412459520, "uid": 0, "wgrp": false, "woth": false, "wusr": true, "xgrp": true, "xoth": true, "xusr": true}], "matched": 1, "msg": ""}
TASK [ovirt-manageiq : Login to oVirt engine] **********************************
ok: [example.com] => {"ansible_facts": {"ovirt_auth": {"ca_file": "/etc/pki/ovirt-engine/ca.pem", "compress": true, "insecure": false, "kerberos": false, "timeout": 0, "token": "KCd..SNIP..WA", "url": "https://example.com/ovirt-engine/api"}}, "changed": false}
TASK [ovirt-manageiq : Deploy the qcow image to oVirt engine] ******************
changed: [example.com] => {"changed": true, "disk": {"actual_size": 0, "alias": "manageiq_disk", "disk_profile": {"href": "/ovirt-engine/api/diskprofiles/d86a2403-8bbf-4080-8f16-fd907f38e5c9", "id": "d86a2403-8bbf-4080-8f16-fd907f38e5c9"}, "format": "cow", "href": "/ovirt-engine/api/disks/fbe63434-8d49-4567-ad08-9360dabf98d6", "id": "fbe63434-8d49-4567-ad08-9360dabf98d6", "image_id": "d09da2f6-edc4-4012-ad0f-3f4e064b7ae8", "name": "manageiq_disk", "permissions": [], "propagate_errors": false, "provisioned_size": 53687091200, "quota": {"id": "23744f08-7b5c-45e2-b0b0-5daa685912e6"}, "shareable": false, "sparse": true, "statistics": [], "status": "locked", "storage_domains": [{"id": "c7b4115e-2b37-46f8-a9ed-33c285a0a810"}], "storage_type": "image", "wipe_after_delete": false}, "id": "fbe63434-8d49-4567-ad08-9360dabf98d6"}
TASK [ovirt-manageiq : Create virtual machine for the ManageIQ] ****************
changed: [example.com] => {"changed": true, "id": "854b817b-b8e4-4f42-b45b-b2ebea8f4d7e", "vm": {"affinity_labels": [], "applications": [], "bios": {"boot_menu": {"enabled": false}}, "cdroms": [], "cluster": {"href": "/ovirt-engine/api/clusters/75faab86-1b23-406c-b675-1eca339ae734", "id": "75faab86-1b23-406c-b675-1eca339ae734"}, "cpu": {"architecture": "x86_64", "topology": {"cores": 2, "sockets": 1, "threads": 1}}, "cpu_profile": {"href": "/ovirt-engine/api/cpuprofiles/40804dbc-d37f-4547-9ded-b7ec998483fc", "id": "40804dbc-d37f-4547-9ded-b7ec998483fc"}, "cpu_shares": 0, "creation_time": "2017-01-15 14:47:01.328000+02:00", "delete_protected": false, "disk_attachments": [], "display": {"allow_override": false, "copy_paste_enabled": true, "disconnect_action": "LOCK_SCREEN", "file_transfer_enabled": true, "monitors": 1, "single_qxl_pci": false, "smartcard_enabled": false, "type": "spice"}, "graphics_consoles": [], "high_availability": {"enabled": false, "priority": 0}, "host_devices": [], "href": "/ovirt-engine/api/vms/854b817b-b8e4-4f42-b45b-b2ebea8f4d7e", "id": "854b817b-b8e4-4f42-b45b-b2ebea8f4d7e", "io": {"threads": 0}, "katello_errata": [], "large_icon": {"href": "/ovirt-engine/api/icons/642e318c-32cf-40db-b9a8-fbf510ca655d", "id": "642e318c-32cf-40db-b9a8-fbf510ca655d"}, "memory": 6442450944, "memory_policy": {"ballooning": true, "guaranteed": 1073741824}, "migration": {"auto_converge": "inherit", "compressed": "inherit"}, "migration_downtime": -1, "name": "manageiq", "next_run_configuration_exists": false, "nics": [], "numa_nodes": [], "numa_tune_mode": "interleave", "origin": "ovirt", "original_template": {"href": "/ovirt-engine/api/templates/00000000-0000-0000-0000-000000000000", "id": "00000000-0000-0000-0000-000000000000"}, "os": {"boot": {"devices": ["hd"]}, "type": "rhel_7x64"}, "permissions": [], "placement_policy": {"affinity": "migratable"}, "quota": {"id": "23744f08-7b5c-45e2-b0b0-5daa685912e6"}, "reported_devices": [], "sessions": [], "small_icon": {"href": "/ovirt-engine/api/icons/b5107cab-7f80-4149-8add-d8c5aa9fa65d", "id": "b5107cab-7f80-4149-8add-d8c5aa9fa65d"}, "snapshots": [], "sso": {"methods": [{"id": "guest_agent"}]}, "start_paused": false, "stateless": false, "statistics": [], "status": "down", "stop_time": "2017-01-15 14:47:01.370000+02:00", "tags": [], "template": {"href": "/ovirt-engine/api/templates/00000000-0000-0000-0000-000000000000", "id": "00000000-0000-0000-0000-000000000000"}, "time_zone": {"name": "Etc/GMT"}, "type": "server", "usb": {"enabled": false}, "watchdogs": []}}
TASK [ovirt-manageiq : Logout from oVirt engine] *******************************
ok: [example.com] => {"ansible_facts": {"ovirt_auth": {}}, "changed": false}
PLAY RECAP *********************************************************************
example.com : ok=7 changed=4 unreachable=0 failed=0
view raw playbook_run.sh hosted with ❤ by GitHub

Wait until the playbook exit, then check your oVirt engine VMs, you should find there manageiq VM running.
Note, that there is now new better role under oVirt organization on galaxy.

čtvrtek 18. února 2016

Client certificate authentication with oVirt

This post will show you how to configure authentication using client certificates. FreeIPA 4.2.0 introduced support for multiple certificate profiles, including support for user certificates. So we will use integration with FreeIPA 4.2. Please follow this post to create new profile for issuing user certificates in FreeIPA.

Test user creation

We create our user testing user in IPA, please be carefull specifying email address and login, we will need these later on.
$ ipa user-add --first=Ondra --last=Machacek --email=omachace@example.com omachace
---------------------
Added user "omachace"
---------------------
User login: omachace
First name: Ondra
Last name: Machacek
Full name: Ondra Machacek
Display name: Ondra Machacek
Initials: OM
Home directory: /home/omachace
GECOS: Ondra Machacek
Login shell: /bin/sh
Kerberos principal: omachace@EXAMPLE.COM
Email address: omachace@example.com
UID: 725600015
GID: 725600015
Password: False
Member of groups: ipausers
Kerberos keys available: False
view raw ipa_user_add.sh hosted with ❤ by GitHub

pkcs#12 creation

First, we need to create private key for our user:
$ openssl genrsa -out mykey.pem 2048
Second, we have to create certificate signing request(CSR), using config, where we specify subjectAltName extension, which must match our user's email address in FreeIPA and commonName which must match user's login.
$ cat ~/csr.conf
[ req ]
prompt = no
encrypt_key = no
req_extensions = exts
distinguished_name = dn
[ dn ]
commonName = "omachace"
[ exts ]
subjectAltName=email:omachace@example.com
$ openssl req -new -key mykey.pem -out cert.req -text -config csr.conf
view raw csr.sh hosted with ❤ by GitHub
We can now submit our CSR to IPA to issue certificate for our user. Remember to specify our user's login and profile for user certificates.
$ ipa cert-request cert.req --principal omachace --profile-id clientIdentity
Certificate: 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
Subject: CN=omachace,O=EXAMPLE.COM
Issuer: CN=Certificate Authority,O=EXAMPLE.COM
Not Before: Thu Feb 18 11:05:42 2016 UTC
Not After: Sun Feb 18 11:05:42 2018 UTC
Fingerprint (MD5): 0c:db:6f:ad:ef:52:e4:12:7d:fc:8e:0e:bb:c2:fc:bd
Fingerprint (SHA1): e9:15:78:94:67:25:61:d0:4f:f2:6b:59:8d:2f:2d:09:95:64:27:fe
Serial number: 13
Serial number (hex): 0xD
view raw cert_issue.sh hosted with ❤ by GitHub
Now, we need to extract user's cetificate.
$ ipa user-show omachace --out=cert.pem
----------------------------------------
Certificate(s) stored in file 'cert.pem'
----------------------------------------
User login: omachace
First name: Ondra
Last name: Machacek
Home directory: /home/omachace
Login shell: /bin/sh
Email address: omachace@example.com
UID: 725600015
GID: 725600015
Certificate: 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
Account disabled: False
Password: False
Member of groups: ipausers
Kerberos keys available: False
Now lets finnaly create our pkcs#12. Which you can later use with your browser to login.
$ openssl pkcs12 -export -out my.p12 -inkey mykey.pem -in cert.pem
Enter Export Password:
Verifying - Enter Export Password:
view raw pkcs12.sh hosted with ❤ by GitHub

Apache mod_ssl configuration

Now ssh to your oVirt machine. We need to reconfigure apache mod_ssl module, to require client certificate and since oVirt's AAA works with X-Remote-User header, we need to set it to REMOTE_USER env variable. Please add following lines into /etc/httpd/conf.d/ssl.conf.
SSLVerifyClient require
SSLVerifyDepth 1
SSLUserName SSL_CLIENT_S_DN_CN
RewriteEngine on
RewriteCond %{LA-U:REMOTE_USER} ^(.*)$
RewriteRule ^(.*)$ - [L,P,E=REMOTE_USER:%1,NS]
RequestHeader set X-Remote-User %{REMOTE_USER}s
view raw ssl_conf.sh hosted with ❤ by GitHub
Now add CA certificate of ipa to /etc/pki/ovirt-engine/apache-ca.pem
$ ssh root@ipa.example.com 'cat /etc/ipa/ca.crt' >> /etc/pki/ovirt-engine/apache-ca.pem

oVirt AAA configuration

Authz configuration:
$ cat /etc/ovirt-engine/extensions.d/example-authz.properties
ovirt.engine.extension.name = example-authz
ovirt.engine.extension.bindings.method = jbossmodule
ovirt.engine.extension.binding.jbossmodule.module = org.ovirt.engine-extensions.aaa.ldap
ovirt.engine.extension.binding.jbossmodule.class = org.ovirt.engineextensions.aaa.ldap.AuthzExtension
ovirt.engine.extension.provides = org.ovirt.engine.api.extensions.aaa.Authz
config.profile.file.1 = ../aaa/example.properties
config.globals.bindFormat.simple_bindFormat = realm
Authn configuration:
$ cat /etc/ovirt-engine/extensions.d/profile1-http-authn.properties
ovirt.engine.extension.name = example-http-authn
ovirt.engine.extension.bindings.method = jbossmodule
ovirt.engine.extension.binding.jbossmodule.module = org.ovirt.engine-extensions.aaa.misc
ovirt.engine.extension.binding.jbossmodule.class = org.ovirt.engineextensions.aaa.misc.http.AuthnExtension
ovirt.engine.extension.provides = org.ovirt.engine.api.extensions.aaa.Authn
ovirt.engine.aaa.authn.profile.name = example.com
ovirt.engine.aaa.authn.authz.plugin = example-authz
config.artifact.name = HEADER
config.artifact.arg = X-Remote-User
example.properties - specify your specifc creadentials and values for your IPA server
$ cat /etc/ovirt-engine/aaa/example.properties
include = <ipa.properties>
vars.server = ipa.example.com
vars.user = uid=search_user,cn=users,cn=accounts,dc=example,dc=com
vars.password = securepassword
pool.default.serverset.single.server = ${global:vars.server}
pool.default.auth.simple.bindDN = ${global:vars.user}
pool.default.auth.simple.password = ${global:vars.password}
Restart ovirt-engine and httpd
$ service httpd restart
$ service ovirt-engine restart
view raw restart.sh hosted with ❤ by GitHub

Let's try login

Please assign your user some permissions, in our case we assign user omachace SuperUser permission on system. Then we are able login as follows:
$ wget http://ovirt.example.com/ca.crt
$ curl --cacert ca.crt -E cert.pem --key mykey.pem https://ovirt.example.com/ovirt-engine/api/users/8483b0d6-29b2-44ea-b8a1-53b77af8be69
<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<user href="/ovirt-engine/api/users/8483b0d6-29b2-44ea-b8a1-53b77af8be69" id="8483b0d6-29b2-44ea-b8a1-53b77af8be69">
<name>Ondra</name>
<link href="/ovirt-engine/api/users/8483b0d6-29b2-44ea-b8a1-53b77af8be69/permissions" rel="permissions"/>
<link href="/ovirt-engine/api/users/8483b0d6-29b2-44ea-b8a1-53b77af8be69/roles" rel="roles"/>
<link href="/ovirt-engine/api/users/8483b0d6-29b2-44ea-b8a1-53b77af8be69/tags" rel="tags"/>
<domain href="/ovirt-engine/api/domains/6578616D706C652D617574687A" id="6578616D706C652D617574687A">
<name>example-authz</name>
</domain>
<domain_entry_id>35386132666338302D643632652D313165352D623962362D303031613461303133663630</domain_entry_id>
<namespace>dc=example,dc=com</namespace>
<last_name>Machacek</last_name>
<user_name>omachace@example-authz</user_name>
<principal>omachace</principal>
<email>omachace@example.com</email>
</user>
view raw login.sh hosted with ❤ by GitHub
In order to try it with our browser, please find relevant documentation how to import your pkcs#12 into browser, then you will be able to connect to oVirt via browser using client certificate.

CN to username mapping

In some setups you can met with situation, that your CN and username don't equal, in that moment you can use mapping extension. Imagine situation that in your CN is 'Ondra.Machacek' instead of 'omachace'. Then you would create a new mapping properties file as follows:
ovirt.engine.extension.name = example-http-mapping
ovirt.engine.extension.bindings.method = jbossmodule
ovirt.engine.extension.binding.jbossmodule.module = org.ovirt.engine-extensions.aaa.misc
ovirt.engine.extension.binding.jbossmodule.class = org.ovirt.engineextensions.aaa.misc.mapping.MappingExtension
ovirt.engine.extension.provides = org.ovirt.engine.api.extensions.aaa.Mapping
config.mapAuthRecord.type = regex
config.mapAuthRecord.regex.mustMatch = true
config.mapAuthRecord.regex.pattern = ^(?<firstchar>[A-Z])[A-Z]*\\.(?<lastname>[A-Z]{1,7}).*?$
config.mapAuthRecord.regex.replacement = ${firstchar}${lastname}
And then don't forget to link this mapping to authn extension.
ovirt.engine.extension.name = example-http-authn
ovirt.engine.extension.bindings.method = jbossmodule
ovirt.engine.extension.binding.jbossmodule.module = org.ovirt.engine-extensions.aaa.misc
ovirt.engine.extension.binding.jbossmodule.class = org.ovirt.engineextensions.aaa.misc.http.AuthnExtension
ovirt.engine.extension.provides = org.ovirt.engine.api.extensions.aaa.Authn
ovirt.engine.aaa.authn.mapping.plugin = example-http-mapping
ovirt.engine.aaa.authn.profile.name = example.com
ovirt.engine.aaa.authn.authz.plugin = example-authz
config.artifact.name = HEADER
config.artifact.arg = X-Remote-User

pátek 2. října 2015

ovirt-engine-extension-aaa-jdbc introduction & settings customization

oVirt 3.6 introduced new extension called  ovirt-engine-extension-aaa-jdbc. If you upgrade from older version or if you install fresh new 3.6 you will have this extension installed and configured. With this extension you can store you users/group in database. Very good for people who don't need much users and don't want to deploy LDAP. Note that your admin@internal will now be part of this extension, this migration is done transparently by engine-setup.

Auth[zn] files for internal extension can be found in etc/ovirt-engine/extensions.d/internal-authz.properties and etc/ovirt-engine/extensions.d/internal-authn.properties. Nothing interesting can be found those two files. In common configuration of auth[zn] you can then find database connection settings, which you will find in etc/ovirt-engine/aaa/internal.properties. Content of the file looks like:
config.datasource.jdbcurl=jdbc:postgresql://localhost:5432/engine?sslfactory=org.postgresql.ssl.NonValidatingFactory
config.datasource.dbuser=engine
config.datasource.dbpassword=*****
config.datasource.jdbcdriver=org.postgresql.Driver
config.datasource.schemaname=aaa_jdbc
As you can see only there are db connection details specified, so very easy configuration. Please note there is specified name of postgresql schema, which is in this case aaa_jdbc.

Exploring tables

Wanna check the data aaa-jdbc extension store? You can do as follows:
$ su postgres
bash-4.3$ psql -d engine
engine=# \dt aaa_jdbc.*;
List of relations
Schema | Name | Type | Owner
----------+-----------------------+-------+--------
aaa_jdbc | failed_logins | table | engine
aaa_jdbc | group_attributes | table | engine
aaa_jdbc | group_groups | table | engine
aaa_jdbc | groups | table | engine
aaa_jdbc | schema_version | table | engine
aaa_jdbc | settings | table | engine
aaa_jdbc | user_attributes | table | engine
aaa_jdbc | user_groups | table | engine
aaa_jdbc | user_password_history | table | engine
aaa_jdbc | users | table | engine
(10 rows)
engine=# select name, valid_from, valid_to from aaa_jdbc.users;
name | valid_from | valid_to
-------+----------------------------+----------------------------
admin | 2015-10-01 10:38:32.361+02 | 2215-10-01 10:38:32.361+02
(1 row)
As you can see your admin account is now part of this extension as said above.
Well, this is not too comfortable to work with your users. The extension provide CLI tool to manage the users more comfortable way.

CLI tool 

Cli too name is ovirt-aaa-jdbc-tool. Not much I can say about this tool, since it has good documentation in help.
So whenever you are in doubt what to use just append --help to your args. Please note that by default use the command user @internal extension. If you want to use different one just pass --db-config=/path/to/db/settings.properties of your configuration.

Adding user via CLI tool

If you explored help of this tool you can see there is user module, which you can use to manage users. So we will add  some users, which we will use later in this blog post. Please note that by default freshly added users don't have set password, so you need to set it.
$ ovirt-aaa-jdbc-tool user add user1
$ ovirt-aaa-jdbc-tool user password-reset user1 --password=pass:123456 --password-valid-to="2100-01-01 00:00:00Z"
view raw add_user.sh hosted with ❤ by GitHub

Changing settings via CLI tool

As there is user module there is also settings module to change settings of aaa-jdbc extension. To see what you can change simply run 'ovirt-aaa-jdbc-tool settings show'. There are lot of stuff you can change, the most important/interesting I will show you later.

Policies

Password history limit

You can use setting option PASSWORD_HISTORY_LIMIT  to prohibit user to set same password as he used before. Limit can be integer value, by default it's 3. That means user can't change password to last three passwords he used before.

To change it, use command below(set it to 5):
$ ovirt-aaa-jdbc-tool settings set --name PASSWORD_HISTORY_LIMIT --value 5

Password complexity 


Minimal lenght
To set minimal lenght of password you have to change MIN_LENGTH option. By default it's 6.
$ ovirt-aaa-jdbc-tool settings set --name MIN_LENGTH --value 8
Password complexity
To set complexity of password you have to change PASSWORD_COMPLEXITY option. You can create different complexity groups. By default there is no restriction.  So if you want to for example your user force to have at least one upper case letter, lower case letter and number in his password run the command below:
$ ovirt-aaa-jdbc-tool settings set --name PASSWORD_COMPLEXITY --value "UPPERCASE:chars=ABCDEFGHIJKLMNOPQRSTUVWXYZ::min=1::LOWERCASE:chars=abcdefghijklmnopqrstuvwxyz::min=1::NUMBERS:chars=0123456789::min=1::"

Account & login policy

 

Non locking policy after failed login
To prevent brute force attacks to your account and at the same time prevent denial of your account you can set non locking policy when there is too many attempts to guess password to your user account. To set it use MAX_FAILURES_PER_MINUTE option. By default it's set to 6.

Locking of account after failed login
You account can be locked after X failed logins. There are two options to configure that.
First possibility is to set  MAX_FAILURES_SINCE_SUCCESS this option means that user account is locked after X unsuccessfull login attempts to your account after last successfull login.

The second possibility is to set MAX_FAILURES_PER_INTERVAL this options means that your user account will be locked after X unsuccesfull login attempts to your account in X hours. The value of hours can be set  in option INTERVAL_HOURS.

Your accounts are locked to X minutes. The amount of minutes can be changed by value of option LOCK_MINUTES. Or you can unlock your user by running cli command:
$ ovirt-aaa-jdbc-tool user unlock user1

Removing of failed login
Failed login can be automatically removed during house keeping. All failed login which are older then X days specified in option FAILED_LOGINS_OLD_DAYS will be removed.

Other

 

Max login minutes

With MAX_LOGIN_MINUTES option you can set how long your user can be logged in. If time exceeds, he will be automatically logged out.

Many others

There are many other options. You can explore them by yourself, just run:
$ ovirt-aaa-jdbc-tool settings show

úterý 19. května 2015

SAML and oVirt 3.5

Same way as kerberos is supported for oVirt 3.5 there is also support for SAML via apache module.

There are few SAML apache modules, but I chose mod_auth_mellon, as it has very nice documentation.

First of all we need to setup some identity provider. I chose OpenAM. Please follow steps to quick install of OpenAM with embedded OpenDJ ldap.

OK I presume, that you have up and running OpenAM on tomcat with embedded OpenDJ ldap.
Next step is to setup ourt OpenAM as Identity Provider. Go to 'common-tasks' tab and hit the button 'Created Hosted Identity Provider'. Set name  of your metadata(your URL). Signing key, if you want. Then create new CoT and named it as you like, not important for us. Now very important thing. You need to add attribute mapping, so we are able to map the uid of user in ldap to REMOTE_USER env of apache. Please set 'Name in assertion' to 'common-name' and 'Local attribute name' to 'cn'. And we are done.

Apache configuration

Now we need to setup oVirt apache as service provider(I am using RHEL 6.6):
  • Create SP metadata:
    $ /usr/libexec/mod_auth_mellon/mellon_create_metadata.sh WHAT_EVER_SP_ENTITY_NAME_ID ENTITY-ID https://ovirt/mellon
  • Previous step will create for you three files:
             WHAT_EVER_SP_ENTITY_NAME_ID.xml
             WHAT_EVER_SP_ENTITY_NAME_ID.key
             WHAT_EVER_SP_ENTITY_NAME_ID.cert 
  • copy them to the /etc/httpd/mellon  and asure that all files and folder can be read by apache.
  • Create mod_auth_mellon configuration:
    $ cat /etc/httpd/conf.d/auth_mellon.conf
    LoadModule auth_mellon_module modules/mod_auth_mellon.so
    <Location />
    MellonSPCertFile /etc/httpd/mellon/WHAT_EVER_SP_ENTITY_NAME_ID.cert
    MellonSPPrivateKeyFile /etc/httpd/mellon/WHAT_EVER_SP_ENTITY_NAME_ID.key
    MellonSPMetadataFile /etc/httpd/mellon/WHAT_EVER_SP_ENTITY_NAME_ID.xml
    MellonUser "common-name"
    MellonEndpointPath /mellon
    RewriteEngine on
    RewriteCond %{LA-U:REMOTE_USER} ^(.*)$
    RewriteRule ^(.*)$ - [L,P,E=REMOTE_USER:%1]
    RequestHeader set X-Remote-User %{REMOTE_USER}s
    </Location>
    <Location /ovirt-engine/api>
    MellonEnable "auth"
    Require valid-user
    AuthType "Mellon"
    </Location>
  • In OpenAM go to 'common-tasks' , hit 'register remote service provider'. Upload your SP metadata WHAT_EVER_SP_ENTITY_NAME_ID.xml. Choose already cretead CoT. That's all, click 'configure'.

oVirt AAA configuration

We had setup both mod_auth_mellon as SP and OpenAM as IdP. Last thing is to setup oVirt to respect this setup.
  • Install oVirt AAA packages:
    $ yum install -y ovirt-engine-extension-aaa-misc ovirt-engine-extension-aaa-ldap
  • Authn configuration:
    $ cat /etc/ovirt-engine/extensions.d/http-authn.properties
    ovirt.engine.extension.name = http-authn
    ovirt.engine.extension.bindings.method = jbossmodule
    ovirt.engine.extension.binding.jbossmodule.module = org.ovirt.engine-extensions.aaa.misc
    ovirt.engine.extension.binding.jbossmodule.class = org.ovirt.engineextensions.aaa.misc.http.AuthnExtension
    ovirt.engine.extension.provides = org.ovirt.engine.api.extensions.aaa.Authn
    ovirt.engine.aaa.authn.profile.name = http
    ovirt.engine.aaa.authn.authz.plugin = saml-authz
    config.artifact.name = HEADER
    config.artifact.arg = X-Remote-User
  • Authz configuration:
    $ cat /etc/ovirt-engine/extensions.d/saml_authz.properties
    ovirt.engine.extension.name = saml-authz
    ovirt.engine.extension.bindings.method = jbossmodule
    ovirt.engine.extension.binding.jbossmodule.module = org.ovirt.engine-extensions.aaa.ldap
    ovirt.engine.extension.binding.jbossmodule.class = org.ovirt.engineextensions.aaa.ldap.AuthzExtension
    ovirt.engine.extension.provides = org.ovirt.engine.api.extensions.aaa.Authz
    config.profile.file.1 = /etc/ovirt-engine/aaa/opendj_saml.properties
  • Connection configuration:
    $ cat /etc/ovirt-engine/aaa/opendj_saml.properties
    include = <opendj.properties>
    pool.default.serverset.type = single
    pool.default.serverset.single.server = YOUR_OPEN_AM_URL
    pool.default.serverset.single.port = YOUR_EMBEEDED_OPENDJ_PORT # default 50389
    pool.default.auth.type = simple
    pool.default.auth.simple.bindDN = cn=Directory Manager # use user with some only read permissions
    pool.default.auth.simple.password = XXXXXXX
  • This is custom properties file of opendj, I've created it for this example saml configuration. It's not supported by oVirt:
    $ cat /usr/share/ovirt-engine-extension-aaa-ldap/profiles/opendj.properties
    include = <simple.properties>
    attrmap.map-principal-record.attr.PrincipalRecord_DN.map = _dn
    attrmap.map-principal-record.attr.PrincipalRecord_ID.map = entryUUID
    attrmap.map-principal-record.attr.PrincipalRecord_NAME.map = uid
    attrmap.map-principal-record.attr.PrincipalRecord_PRINCIPAL.map = uid
    attrmap.map-principal-record.attr.PrincipalRecord_DISPLAY_NAME.map = displayName
    attrmap.map-principal-record.attr.PrincipalRecord_DEPARTMENT.map = department
    attrmap.map-principal-record.attr.PrincipalRecord_FIRST_NAME.map = givenName
    attrmap.map-principal-record.attr.PrincipalRecord_LAST_NAME.map = sn
    attrmap.map-principal-record.attr.PrincipalRecord_TITLE.map = title
    attrmap.map-principal-record.attr.PrincipalRecord_EMAIL.map = mail
    attrmap.map-group-record.attr.GroupRecord_DN.map = _dn
    attrmap.map-group-record.attr.GroupRecord_ID.map = entryUUID
    attrmap.map-group-record.attr.GroupRecord_NAME.map = cn
    attrmap.map-group-record.attr.GroupRecord_DISPLAY_NAME.map = description
    sequence-init.init.600-opendj-init-vars = opendj-init-vars
    sequence.opendj-init-vars.010.description = set base dn
    sequence.opendj-init-vars.010.type = var-set
    sequence.opendj-init-vars.010.var-set.variable = simple_attrsBaseDN
    sequence.opendj-init-vars.010.var-set.value = namingContexts
    sequence.opendj-init-vars.020.description = set user attribute
    sequence.opendj-init-vars.020.type = var-set
    sequence.opendj-init-vars.020.var-set.variable = simple_attrsUserName
    sequence.opendj-init-vars.020.var-set.value = uid
    sequence.opendj-init-vars.030.description = set principal record attributes
    sequence.opendj-init-vars.030.type = var-set
    sequence.opendj-init-vars.030.var-set.variable = simple_attrsPrincipalRecord
    sequence.opendj-init-vars.030.var-set.value = entryUUID, uid, displayName, department, givenName, sn, title, mail
    sequence.opendj-init-vars.040.type = var-set
    sequence.opendj-init-vars.040.var-set.variable = simple_filterUserObject
    sequence.opendj-init-vars.040.var-set.value = (objectClass=person)(uid=*)
    sequence.opendj-init-vars.050.description = set group record attributes
    sequence.opendj-init-vars.050.type = var-set
    sequence.opendj-init-vars.050.var-set.variable = simple_attrsGroupRecord
    sequence.opendj-init-vars.050.var-set.value = entryUUID, cn, description
    sequence.opendj-init-vars.060.description = set group object filter
    sequence.opendj-init-vars.060.type = var-set
    sequence.opendj-init-vars.060.var-set.variable = simple_filterGroupObject
    sequence.opendj-init-vars.060.var-set.value = (objectClass=groupOfUniqueNames)
    sequence.opendj-init-vars.070.description = set group member filter
    sequence.opendj-init-vars.070.type = var-set
    sequence.opendj-init-vars.070.var-set.variable = simple_attrGroupMemberDN
    sequence.opendj-init-vars.070.var-set.value = uniqueMember
  • Check correct persmissions of all properties file, it have to be readeble by oVirt.

No we will create test user in OpenDJ. Go to OpenAM -> 'Access Control' tab -> select your realm (default /). Click 'Subjects' tab -> Add new user -> Fill appropriate values. (ie user1.)

Now go to oVirt webadmin and search within 'http' profile for user1 and assign him permissions. Now go to ovirt-engine/api URL and you will be forwarded to OpenAM login screen, fill your credentials and you are now able to access rest-api.

úterý 30. prosince 2014

Tool which will help you migrate from legacy kerbldap to new AAA

Since oVirt 4.0 there will be no support for legacy kerbldap domains (added via engine-manage-domains command). A tool that will help your to migrate to new AAA was written. Please refer to README to more information.

openldap stops work with ovirt when uprage into fedora 20

I have recently upgraded openldap to fedora 20 and I had
openldap connected into ovirt 3.5. Everything went
smooth but openldap didn't work with ovirt. The first issue,
is common for all almost all ldap providers since it was cyrus-sasl-lib
bug. There was an easy workaround with setting sasl_qop into auth.

But there was another issue which I don't why happend, but ovirt
send kerberos request:
ldap/localhost@REALM
instead of
ldap/fqdn@REALM,

So to easily workaround this problem just add:

$ kadmin.local:
add_principal -randkey ldap/localhost@REALM
ktadd -keytab your_keytab_path ldap/localhost@REALM

Then restart openldap, and everything goes fine now. :)