Warning | ||
---|---|---|
| ||
This page is obsolete. Please, refer to Install an IdP on Debian/Ubuntu/Raspbian instead. |
Panel | ||||
---|---|---|---|---|
On this page you will find instructions on how to set up a Moonshot Identity Provider (IdP) on Debian 8 (Jessie) using FreeRADIUS. It also installs and configures the Trust Router client, if you are going to use the Trust Router infrastructure. Contents
|
...
Numberedheadings |
---|
Install the Moonshot IdPWe’re now ready to install the Moonshot software and its required dependencies. Install the software by running the following command: Configure the Moonshot IdPNext, we need to configure the Moonshot IdP. Configure FreeRADIUSMoonshot UI credential storeWe need to enable the freeradius user to use the Moonshot UI flatstore: Set up the FreeRADIUS and Trust Router usersTo allow FreeRADIUS to read a key database for dynamic realm support, we need to place the FreeRADIUS user and the Trust Router users into each other's groups to allow them to read shared files of each other. Verify that the home directory for the RadSecNext, we need to configure RadSec. We do this by creating a file at Dynamic Realm supportWe need to tell your FreeRADIUS server to support dynamic lookup of realms.
RealmWe need to configure your realm in the FreeRADIUS server so that it knows not to send any requests for your own users off to another server.
Channel Binding SupportWe need to configure your FreeRADIUS server to support channel bindings.
EAP Type
User AuthenticationFreeRADIUS offers many options on to authenticate users; common ones including using a simple local flat file (useful for initial testing), or for production deployments using a credential store in an SQL database or a connection to LDAP/AD. To see the full range of options available, and find out how to configure them, visit the FreeRADIUS site. For the purposes of initial testing, we will use a simple local flat file, creating a user with username "testuser" and password "testing".
Configure the Trust Router ClientIf you are going to connect your Moonshot IdP to a Trust Router network, then the next step involves configuring the Trust Router client software and configuring its connection to a Trust Router. Configure TIDSThe IdP also runs the Temporary ID Server (TIDS).
TestingNow that we have the Moonshot IdP installed and configured, we're now ready to test! At this point you probably want three consoles open on the server, so that you can manually run various components separately. Testing FreeRADIUS locallyThe first test is to check whether FreeRADIUS is working in its most basic manner.
Testing the Trust Router connectionTo test the connection to Trust Router, we need to make sure the Temporary Identity Server (TIDS) software is running, then use the Temporary Identity Client (TIDC) software to simulate a connection to the Trust Router. Testing using the Temporary Identity Client (TIDC)
Testing the Temporary Identity Server (TIDS)
Next StepsAt this point, you now have a Moonshot IdP that is working and registered with a Trust Router. Now for the next steps: Automatically start the softwareFreeRADIUSTo automatically start FreeRADIUS, issue the following command (as root): If this is working correctly, you should see FreeRADIUS running as a daemon process. TIDSTo automatically start TIDS, issue the following command (as root): If this is working correctly, you should see TIDS running as a daemon process. Configure a real source of AuthenticationYour FreeRADIUS server can currently only authenticate a single user - "testuser". At this point, you will want to connect to Active Directory, LDAP, an SQL database, or some other source of credentials. See Integrate SAMLAs currently configured, this Moonshot IdP can only use RADIUS attributes. If you wish to also include SAML assertions, visit the Configure clientsIf you are going to also use your Moonshot IdP as a Moonshot RP (i.e., connect services to it that you wish to allow people to authenticate to using Moonshot), then see the |