...
Numberedheadings |
---|
Install the SoftwareWe’re now ready to install the Moonshot software and its required dependencies. Install the software by running the following command: If you try to start FreeRADIUS at this point, it will not currently start successfully as the certificates it requires have not been generated - they are created in step 3.1 below.
Configure the Moonshot APCNext, we need to configure the Moonshot APC. Configure FreeRADIUSRadSecNext we need to configure RadSec. We do this by creating a file at RealmWe next need to configure your realm in the FreeRADIUS server so that it knows not to send any requests for your own users off to another server.
Channel Binding SupportWe next need to configure your FreeRADIUS server to support channel bindings.
EAP Type
Returning the User-NameThe APC must return the User-Name attribute in its RADIUS response.
Resource Provider AuthenticationAll Resource Providers in the Trust Router network, including all IdPs and RP Proxies and the Trust Router itself, need to authenticate themselves to the APC using Moonshot. This means that for every service or organisation, you must provision a credential on the APC. In a production environment, we recommend you use a method of Resource Provider Authentication that integrates well with your chosen method of managing your Trust Router infrastructure. See We recommend using an automatic means to provision credential files, such as an online portal. Defining the APC credentialDuring testing, we recommend
Provisioning the APC credentialFor the APC credential you defined in the previous step, create a
Configure the Trust Router connectionThe APC is fundamental to a Trust Router network, so the next step involves configuring the Trust Router client software and configuring its connection to a Trust Router. Set up the FreeRADIUS and Trust Router usersWe need to place the FreeRADIUS user and the Trust Router users into each other's groups to allow them to read each other's shared files. Configure TIDSThe APC also runs the Temporary ID Server (TIDS).
TestingNow that we have the Moonshot IdP installed and configured, we're now ready to test! At this point you probably want three consoles open on the server, so that you can manually run various components separately. Testing FreeRADIUS locallyThe first test is to check whether FreeRADIUS is working in its most basic manner.
Testing the Trust Router connectionTo test the connection to Trust Router, we need to make sure the Temporary Identity Server (TIDS) software is running, then use the Temporary Identity Client (TIDC) software to simulate a connection to the Trust Router. Starting the Temporary Identity Server (TIDS)In window 3 (window 1 should still be still running the FreeRADIUS server and window 2 the radtest command), run the TIDS software: testapc@YOUR-APC-REALM is the identity that the trust router will use when provisioning keys - this makes it easy to spot in your own log files. This uses the "tids" binary which is used in the following way - tids [your-ip-address] trustrouter-gss-name] [your-hostname] [path-to-key-database] When using Network Address Translation (NAT) or a firewall, you must specify your external IP address.
Run an APC authentication testAt this point, you must configure your trust router to use testapc@YOUR-APC-REALM as authentication.
Next StepsAt this point, you now have a Moonshot APC that is working. Now for the next steps: Automatically start the softwareFreeRADIUSTo automatically start FreeRADIUS, issue the following command (as root): If this is working correctly, you should see FreeRADIUS running as a daemon process. TIDSTo automatically start TIDS, issue the following command (as root): If this is working correctly, you should see TIDS running as a daemon process. Configure a real source of AuthenticationYour FreeRADIUS server can currently only authenticate a single user - "testapc". At this point, you will want to connect to your management database. The FreeRADIUS site has information and instructions for how to do this. |