Features/IPAv3TrustImprovements

From FedoraProject

< Features(Difference between revisions)
Jump to: navigation, search
(Fix last update date)
 
Line 9: Line 9:
 
== Summary ==
 
== Summary ==
 
<!-- A sentence or two summarizing what this feature is and what it will do.  This information is used for the overall feature summary page for each release. -->
 
<!-- A sentence or two summarizing what this feature is and what it will do.  This information is used for the overall feature summary page for each release. -->
Multiple Domain Controllers and multiple additional DNS domains managed by FreeIPA can now be accessible via trusting relationship by Active Directory domain members. Additionally, Global Catalog service is provided for use by AD clients, allowing FreeIPA users to be included into access-control lists of AD resources.
+
Multiple Domain Controllers and multiple additional DNS domains managed by FreeIPA can now be accessible via trusting relationship by Active Directory domain members.
 +
 
 +
<!-- De-scoped and targeted for F20: Additionally, Global Catalog service is provided for use by AD clients, allowing FreeIPA users to be included into access-control lists of AD resources. -->
  
 
== Owner ==
 
== Owner ==
Line 21: Line 23:
 
* Targeted release: [[Releases/19 | Fedora 19 ]]  
 
* Targeted release: [[Releases/19 | Fedora 19 ]]  
 
* Last updated: 2013-03-14
 
* Last updated: 2013-03-14
* Percentage of completion: 81%
+
* Percentage of completion: 100%
  
 
<!-- CHANGE THE "FedoraVersion" TEMPLATES ABOVE TO PLAIN NUMBERS WHEN YOU COMPLETE YOUR PAGE. -->
 
<!-- CHANGE THE "FedoraVersion" TEMPLATES ABOVE TO PLAIN NUMBERS WHEN YOU COMPLETE YOUR PAGE. -->
Line 27: Line 29:
 
<!-- Expand on the summary, if appropriate.  A couple sentences suffices to explain the goal, but the more details you can provide the better. -->
 
<!-- Expand on the summary, if appropriate.  A couple sentences suffices to explain the goal, but the more details you can provide the better. -->
 
In Fedora 18 only a single designated Domain Controller in FreeIPA realm is supported for interoperability with Active Directory and only a primary DNS domain associated with the FreeIPA realm is advertised to the trusted party.
 
In Fedora 18 only a single designated Domain Controller in FreeIPA realm is supported for interoperability with Active Directory and only a primary DNS domain associated with the FreeIPA realm is advertised to the trusted party.
With the changes coming in future FreeIPA release, support for multiple domain controllers per FreeIPA realm and multiple DNS domain suffixes associated with the realm will be available. FreeIPA will also provide Global Catalog service implementation which is key feature to allow discretionary access to Active Directory resources for FreeIPA users --- making possible, for example, interactive logon to Windows machines under a FreeIPA identity.
+
FreeIPA v3.2 release adds support for multiple domain controllers per FreeIPA realm and multiple DNS domain suffixes associated with the realm, allowing for greater deployment flexibility.  
 +
 
 +
<!-- De-scoped and targeted for F20: FreeIPA will also provide Global Catalog service implementation which is key feature to allow discretionary access to Active Directory resources for FreeIPA users --- making possible, for example, interactive logon to Windows machines under a FreeIPA identity. -->
  
 
== Benefit to Fedora ==
 
== Benefit to Fedora ==
 
<!-- What is the benefit to the platform?  If this is a major capability update, what has changed?  If this is a new feature, what capabilities does it bring? Why will Fedora become a better distribution or project because of this feature?-->
 
<!-- What is the benefit to the platform?  If this is a major capability update, what has changed?  If this is a new feature, what capabilities does it bring? Why will Fedora become a better distribution or project because of this feature?-->
System administrators, using FreeIPA in Fedora 19, will get access to resources in trusted Active Directory domains. Active Directory domain administrators will be able to authorize access to their machines, services, and applications for FreeIPA-managed users and groups, giving practical bi-directional interoperability.
+
System administrators, using FreeIPA in Fedora 19, will be able to designate FreeIPA domain controllers for interoperability with Active Directory and have greater flexibility in planning their domain topology.
 +
<!-- De-scoped and targeted for F20: get access to resources in trusted Active Directory domains. Active Directory domain administrators will be able to authorize access to their machines, services, and applications for FreeIPA-managed users and groups, giving practical bi-directional interoperability. -->
  
 
== Scope ==
 
== Scope ==
Line 51: Line 56:
 
3. What are the expected results of those actions?
 
3. What are the expected results of those actions?
 
-->
 
-->
Test instructions for trust feature are available at http://www.freeipa.org/page/Howto/IPAv3_AD_trust_setup and will extended to cover multi-DC configuration and extended access controls when accessing Windows machines
+
Test instructions for trust feature are available at http://www.freeipa.org/page/Howto/IPAv3_AD_trust_setup and extended to cover multi-DC configuration in https://fedoraproject.org/wiki/QA:Testcase_freeipav3_ad_realmdomains_windows and https://fedoraproject.org/wiki/QA:Testcase_freeipav3_ad_realmdomains
  
 
== User Experience ==
 
== User Experience ==
Line 59: Line 64:
 
== Dependencies ==
 
== Dependencies ==
 
<!-- What other packages (RPMs) depend on this package?  Are there changes outside the developers' control on which completion of this feature depends?  In other words, completion of another feature owned by someone else and might cause you to not be able to finish on time or that you would need to coordinate?  Other upstream projects like the kernel (if this is not a kernel feature)? -->
 
<!-- What other packages (RPMs) depend on this package?  Are there changes outside the developers' control on which completion of this feature depends?  In other words, completion of another feature owned by someone else and might cause you to not be able to finish on time or that you would need to coordinate?  Other upstream projects like the kernel (if this is not a kernel feature)? -->
 +
Depends on SSSD 1.10 and Kerberos 1.11, both in Fedora 19 already.
  
 
== Contingency Plan ==
 
== Contingency Plan ==

Latest revision as of 10:47, 10 May 2013


Contents

[edit] FreeIPA v3 Trust Improvements

[edit] Summary

Multiple Domain Controllers and multiple additional DNS domains managed by FreeIPA can now be accessible via trusting relationship by Active Directory domain members.


[edit] Owner

  • Email: abokovoy@redhat.com

[edit] Current status

  • Targeted release: Fedora 19
  • Last updated: 2013-03-14
  • Percentage of completion: 100%

[edit] Detailed Description

In Fedora 18 only a single designated Domain Controller in FreeIPA realm is supported for interoperability with Active Directory and only a primary DNS domain associated with the FreeIPA realm is advertised to the trusted party. FreeIPA v3.2 release adds support for multiple domain controllers per FreeIPA realm and multiple DNS domain suffixes associated with the realm, allowing for greater deployment flexibility.


[edit] Benefit to Fedora

System administrators, using FreeIPA in Fedora 19, will be able to designate FreeIPA domain controllers for interoperability with Active Directory and have greater flexibility in planning their domain topology.

[edit] Scope

The work is done in the scope of FreeIPA upstream development. List of development tasks is available here. Additional capabilities are provided as part of SSSD upstream development, designed and tracked here

[edit] How To Test

Test instructions for trust feature are available at http://www.freeipa.org/page/Howto/IPAv3_AD_trust_setup and extended to cover multi-DC configuration in https://fedoraproject.org/wiki/QA:Testcase_freeipav3_ad_realmdomains_windows and https://fedoraproject.org/wiki/QA:Testcase_freeipav3_ad_realmdomains

[edit] User Experience

FreeIPA-managed users will be able to log-in interactively to Windows machines in a trusted Active Directory domain. FreeIPA administrators will be able to configure multiple domain controllers and multiple DNS domain suffixes visible to a trusted Active Directory domain.

[edit] Dependencies

Depends on SSSD 1.10 and Kerberos 1.11, both in Fedora 19 already.

[edit] Contingency Plan

Feature implementation affects FreeIPA and SSSD. If SSSD part is not implemented in time, this feature is not delivered. There is no effects otherwise, previous behaviour is retained. Same goes for FreeIPA. Other parts of Fedora are not affected.

[edit] Documentation

[edit] Release Notes

  • When using FreeIPA to trust Active Directory domain, it is now possible to designate multiple domain controllers in FreeIPA to serve Windows clients.
  • FreeIPA adds management of additional domain suffixes visible to trusted Active Directory domain's clients.
  • FreeIPA now implements Global Catalog service to allow Active Directory domain administrators grant access to their resources to FreeIPA users.

[edit] Comments and Discussion