Imported Upstream version 4.7.2
This commit is contained in:
@@ -5,37 +5,61 @@
|
||||
<title>IPA: Identity Policy Audit</title>
|
||||
<script type="text/javascript" src="../ui/js/libs/loader.js"></script>
|
||||
<script type="text/javascript">
|
||||
var dojoConfig = {
|
||||
baseUrl: "../ui/js",
|
||||
has: {
|
||||
'dojo-firebug': false,
|
||||
'dojo-debug-messages': true
|
||||
},
|
||||
parseOnLoad: false,
|
||||
async: true,
|
||||
packages: [
|
||||
{
|
||||
name:'dojo',
|
||||
location:'dojo'
|
||||
},
|
||||
{
|
||||
name: 'freeipa',
|
||||
location: 'freeipa'
|
||||
}
|
||||
]
|
||||
};
|
||||
(function() {
|
||||
function loaded() {
|
||||
$(document).ready(function() {
|
||||
var domain = '.' + (IPA_DOMAIN || 'example.com');
|
||||
$('.example-domain').text(domain);
|
||||
|
||||
var browser = IPA.browser_config.get_browser();
|
||||
if (browser.mozilla) {
|
||||
var ff_config = $("#configurefirefox");
|
||||
var obj = $('<object/>', {
|
||||
type: 'text/html',
|
||||
'class': 'browser-config'
|
||||
});
|
||||
obj.prop('data', 'jar:/ipa/errors/configure.jar!/preferences.html');
|
||||
obj.appendTo(ff_config);
|
||||
ff_config.show();
|
||||
}
|
||||
});
|
||||
}
|
||||
|
||||
var icons = [
|
||||
'../ui/favicon.ico'
|
||||
];
|
||||
var styles = [
|
||||
'../ui/css/patternfly.css',
|
||||
'../ui/css/ipa.css'
|
||||
];
|
||||
var scripts = [
|
||||
'../ui/js/libs/jquery.js',
|
||||
'krb.js',
|
||||
'ffconfig.js'
|
||||
'../ui/js/libs/jquery.ordered-map.js',
|
||||
'../ui/js/dojo/dojo.js'
|
||||
];
|
||||
ipa_loader.scripts(scripts, loaded);
|
||||
ipa_loader.scripts(scripts, function() {
|
||||
require([
|
||||
'dojo/dom',
|
||||
'freeipa/core',
|
||||
'dojo/domReady!'
|
||||
],
|
||||
function(dom) {
|
||||
var text = require('freeipa/text');
|
||||
var msg = "".concat(
|
||||
text.get('@i18n:ssbrowser-page.header'),
|
||||
text.get('@i18n:ssbrowser-page.firefox-header'),
|
||||
text.get('@i18n:ssbrowser-page.firefox-actions'),
|
||||
text.get('@i18n:ssbrowser-page.chrome-header'),
|
||||
text.get('@i18n:ssbrowser-page.chrome-certificate'),
|
||||
text.get('@i18n:ssbrowser-page.chrome-spnego'),
|
||||
text.get('@i18n:ssbrowser-page.ie-header'),
|
||||
text.get('@i18n:ssbrowser-page.ie-actions')
|
||||
);
|
||||
dom.byId('ssbrowser-msg').innerHTML=msg;
|
||||
});
|
||||
});
|
||||
ipa_loader.styles(styles);
|
||||
ipa_loader.icons(icons);
|
||||
})();
|
||||
</script>
|
||||
|
||||
@@ -52,14 +76,100 @@
|
||||
<div class="container-fluid">
|
||||
<div class="row">
|
||||
<div class="col-sm-12">
|
||||
<div class="ssbrowser">
|
||||
<div class="ssbrowser" id="ssbrowser-msg">
|
||||
<noscript>
|
||||
<h1>Browser Kerberos Setup</h1>
|
||||
<h2><img alt="Internet Explorer" src="../ui/images/ie-icon.png">Internet Explorer Configuration</h2>
|
||||
|
||||
<h2>Firefox</h2>
|
||||
|
||||
<p>
|
||||
You can configure Firefox to use Kerberos for Single Sign-on. The following instructions will guide you in configuring your web browser to send your Kerberos credentials to the appropriate Key Distribution Center which enables Single Sign-on.
|
||||
</p>
|
||||
|
||||
<ol>
|
||||
<li>
|
||||
<p>
|
||||
<a href="ca.crt" id="ca-link" class="btn btn-default">Import Certificate Authority certificate</a>
|
||||
</p>
|
||||
<p>
|
||||
Make sure you select <b>all three</b> checkboxes.
|
||||
</p>
|
||||
</li>
|
||||
<li>
|
||||
In the address bar of Firefox, type <code>about:config</code> to display the list of current configuration options.
|
||||
</li>
|
||||
<li>
|
||||
In the Filter field, type <code>negotiate</code> to restrict the list of options.
|
||||
</li>
|
||||
<li>
|
||||
Double-click the <code>network.negotiate-auth.trusted-uris</code> entry to display the Enter string value dialog box.
|
||||
</li>
|
||||
<li>
|
||||
Enter the name of the domain against which you want to authenticate, for example, <code class="example-domain">.example.com.</code>
|
||||
</li>
|
||||
<li><a href="../ui/index.html" id="return-link" class="btn btn-default">Return to Web UI</a></li>
|
||||
</ol>
|
||||
|
||||
<h2>Chrome</h2>
|
||||
|
||||
<p>
|
||||
You can configure Chrome to use Kerberos for Single Sign-on. The following instructions will guide you in configuring your web browser to send your Kerberos credentials to the appropriate Key Distribution Center which enables Single Sign-on.
|
||||
</p>
|
||||
|
||||
<h3>Import CA Certificate</h3>
|
||||
<ol>
|
||||
<li>
|
||||
Download the <a href="ca.crt">CA certificate</a>. Alternatively, if the host is also an IdM client, you can find the certificate in /etc/ipa/ca.crt.
|
||||
</li>
|
||||
<li>
|
||||
Click the menu button with the <em>Customize and control Google Chrome</em> tooltip, which is by default in the top right-hand corner of Chrome, and click <em>Settings</em>.
|
||||
</li>
|
||||
<li>
|
||||
Click <em>Show advanced settings</em> to display more options, and then click the <em>Manage certificates</em> button located under the HTTPS/SSL heading.
|
||||
</li>
|
||||
<li>
|
||||
In the <em>Authorities</em> tab, click the <em>Import</em> button at the bottom.
|
||||
</li>
|
||||
<li>Select the CA certificate file that you downloaded in the first step.</li>
|
||||
</ol>
|
||||
|
||||
<h3>
|
||||
Enable SPNEGO (Simple and Protected GSSAPI Negotiation Mechanism) to Use Kerberos Authentication
|
||||
in Chrome
|
||||
</h3>
|
||||
<ol>
|
||||
<li>
|
||||
Make sure you have the necessary directory created by running:
|
||||
<div><code>
|
||||
[root@client]# mkdir -p /etc/opt/chrome/policies/managed/
|
||||
</code></div>
|
||||
</li>
|
||||
<li>
|
||||
Create a new <code>/etc/opt/chrome/policies/managed/mydomain.json</code> file with write privileges limited to the system administrator or root, and include the following line:
|
||||
<div><code>
|
||||
{ "AuthServerWhitelist": "*<span class="example-domain">.example.com.</span>" }
|
||||
</code></div>
|
||||
<div>
|
||||
You can do this by running:
|
||||
</div>
|
||||
<div><code>
|
||||
[root@server]# echo '{ "AuthServerWhitelist": "*<span class="example-domain">.example.com.</span>" }' > /etc/opt/chrome/policies/managed/mydomain.json
|
||||
</code></div>
|
||||
</li>
|
||||
</ol>
|
||||
<ol>
|
||||
<p>
|
||||
<strong>Note:</strong> If using Chromium, use <code>/etc/chromium/policies/managed/</code> instead of <code>/etc/opt/chrome/policies/managed/</code> for the two SPNEGO Chrome configuration steps above.
|
||||
</p>
|
||||
</ol>
|
||||
|
||||
<h2>Internet Explorer</h2>
|
||||
<p><strong>WARNING:</strong> Internet Explorer is no longer a supported browser.</p>
|
||||
<p>
|
||||
Once you are able to log into the workstation with your kerberos key you are now able to use that ticket in Internet Explorer.
|
||||
</p>
|
||||
<p>
|
||||
<strong>Login to the Windows machine using an account of your Kerberos realm (administrative domain)</strong>
|
||||
<strong>Log into the Windows machine using an account of your Kerberos realm (administrative domain)</strong>
|
||||
</p>
|
||||
<p>
|
||||
<strong>In Internet Explorer, click Tools, and then click Internet Options.</strong>
|
||||
@@ -85,38 +195,7 @@
|
||||
</ol>
|
||||
</div>
|
||||
|
||||
<h2><img alt="Firefox" src="../ui/images/firefox-icon.png">Firefox Configuration</h2>
|
||||
|
||||
<p>
|
||||
You can configure Firefox to use Kerberos for Single Sign-on. The following instructions will guide you in configuring your web browser to send your Kerberos credentials to the appropriate Key Distribution Center which enables Single Sign-on.
|
||||
</p>
|
||||
|
||||
<ol>
|
||||
<li>
|
||||
In the address bar of Firefox, type <code>about:config</code> to display the list of current configuration options.
|
||||
</li>
|
||||
<li>
|
||||
In the Filter field, type <code>negotiate</code> to restrict the list of options.
|
||||
</li>
|
||||
<li>
|
||||
Double-click the <code>network.negotiate-auth.trusted-uris</code> entry to display the Enter string value dialog box.
|
||||
</li>
|
||||
<li>
|
||||
Enter the name of the domain against which you want to authenticate, for example, <code class="example-domain">.example.com.</code>
|
||||
</li>
|
||||
<li><strong> You are all set. </strong></li>
|
||||
</ol>
|
||||
|
||||
<h3>Automatic Configuration of older versions</h3>
|
||||
<p>You can configure older versions of Firefox (up to version 14) using signed code. Use <a href="browserconfig.html">Firefox configuration page</a> for newer versions.</p>
|
||||
<ol>
|
||||
<li>Import <a href="ca.crt">CA certificate</a>. Make sure you checked all three checkboxes.</li>
|
||||
<li>
|
||||
Click on "Configure Browser" button below.
|
||||
<div id="configurefirefox" style="display:none"></div>
|
||||
</li>
|
||||
</ol>
|
||||
|
||||
</noscript>
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
|
||||
Reference in New Issue
Block a user