Hi Daniel, 
My configuration bases on the guide I found at 
https://www.freeipa.org/page/Using_FreeIPA_and_FreeRadius_as_a_RADIUS_based_software_token_OTP_system_with_CentOS/RedHat_7
Skip the first part and start with "Install, configure and test RADIUS Server 
as a frontend to IPA".

Since this is a POC, I've set up radius server on one of my ipa servers 
"ipa-poc-1.lab" (would have added another one on second ipa machine for 
redundancy if I went to PROD) and added it to my IPA vie GUI under 
Authentication -> RADIUS servers.

Below my radius config w/o commented lines:

ipa-poc-1 /etc/raddb # cat radiusd.conf |egrep -v "^\s*(#|$)"
prefix = /usr
exec_prefix = /usr
sysconfdir = /etc
localstatedir = /var
sbindir = /usr/sbin
logdir = ${localstatedir}/log/radius
raddbdir = ${sysconfdir}/raddb
radacctdir = ${logdir}/radacct
name = radiusd
confdir = ${raddbdir}
modconfdir = ${confdir}/mods-config
certdir = ${confdir}/certs
cadir   = ${confdir}/certs
run_dir = ${localstatedir}/run/${name}
db_dir = ${localstatedir}/lib/radiusd
libdir = /usr/lib64/freeradius
pidfile = ${run_dir}/${name}.pid
correct_escapes = true
max_request_time = 30
cleanup_delay = 5
max_requests = 16384
hostname_lookups = no
log {
        destination = files
        colourise = yes
        file = ${logdir}/radius.log
        syslog_facility = daemon
        stripped_names = no
        auth = no
        auth_badpass = no
        auth_goodpass = no
        msg_denied = "You are already logged in - access denied"
}
checkrad = ${sbindir}/checkrad
security {
        user = radiusd
        group = radiusd
        allow_core_dumps = no
        max_attributes = 200
        reject_delay = 1
        status_server = yes
}
proxy_requests  = yes
$INCLUDE proxy.conf
$INCLUDE clients.conf
thread pool {
        start_servers = 5
        max_servers = 32
        min_spare_servers = 3
        max_spare_servers = 10
        max_requests_per_server = 0
        auto_limit_acct = no
}
modules {
        $INCLUDE mods-enabled/
}
instantiate {
}
policy {
        $INCLUDE policy.d/
}
$INCLUDE sites-enabled/

 

And clients config file:

ipa-poc-1 /etc/raddb # cat clients.conf |egrep -v "^\s*(#|$)"
client default {
        ipaddr = FREEIPA_SERVER_IP/32
        proto = udp
        secret = very_secure_pass
        require_message_authenticator = no
        nas_type         = cisco        # localhost isn't usually a NAS...
        limit {
                max_connections = 16
                lifetime = 0
                idle_timeout = 30
        }
}
client localhost_ipv6 {
        ipv6addr        = ::1
        secret          = very_secure_pass
}
client asa-V {
        ipaddr = CISCO_ASA_IP/32
        proto = udp
        secret = very_complicated_secret
        require_message_authenticator = no
        nas_type         = cisco        # localhost isn't usually a NAS...
        limit {
                max_connections = 16
                lifetime = 0
                idle_timeout = 30
        }
}

We plan to put all TACACS rules/acls on ASA.
_______________________________________________
FreeIPA-users mailing list -- [email protected]
To unsubscribe send an email to [email protected]
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedorahosted.org/archives/list/[email protected]
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure
  • [Freeipa-users] Re: ... White, Daniel E. (GSFC-770.0)[NICS] via FreeIPA-users
    • [Freeipa-users]... Mariusz Stysiak via FreeIPA-users
      • [Freeipa-us... White, Daniel E. (GSFC-770.0)[NICS] via FreeIPA-users

Reply via email to