Chapter 55. Using external identity providers to authenticate to IdM
You can associate users with external identity providers (IdP) that support the OAuth 2.0 device authorization flow. When these users authenticate with the System Security Services Daemon (SSSD) version available in RHEL 9.1 or later, they receive RHEL Identity Management (IdM) single sign-on capabilities with Kerberos tickets after performing authentication and authorization at the external IdP.
Notable features include:
- 
					Adding, modifying, and deleting references to external IdPs with ipa idp-*commands.
- 
					Enabling IdP authentication for users with the ipa user-mod --user-auth-type=idpcommand.
What is supported:
- 
					Logging in remotely via Secure Shell (SSH) with the keyboard-interactiveauthentication method enabled, which allows calling Pluggable Authentication Module (PAM) libraries.
- 
					Logging in locally with the console via the logindservice.
- 
					Retrieving a Kerberos TGT with the kinitutility.
What is currently not supported:
- Logging in to the IdM WebUI directly. To log in to the IdM WebUI, you must first acquire a Kerberos ticket.
- Logging in to Cockpit WebUI directly. To log in to the Cockpit WebUI, you must first acquire a Kerberos ticket.
55.1. The benefits of connecting IdM to an external IdP
As an administrator, you might want to allow users stored in an external identity source, such as a cloud services provider, to access RHEL systems joined to your Identity Management (IdM) environment. To achieve this, you can delegate the authentication and authorization process of issuing Kerberos tickets for these users to that external entity.
You can use this feature to expand IdM’s capabilities and allow users stored in external identity providers (IdPs) to access Linux systems managed by IdM.
55.2. How IdM incorporates logins via external IdPs
				SSSD 2.7.0 contains the sssd-idp package, which implements the idp Kerberos pre-authentication method. This authentication method follows the OAuth 2.0 Device Authorization Grant flow to delegate authorization decisions to external IdPs:
			
- 
						An IdM client user initiates OAuth 2.0 Device Authorization Grant flow, for example, by attempting to retrieve a Kerberos Ticket Granting Ticket (TGT) with the kinitutility at the command line.
- A special code and website link are sent from the Authorization Server to the IdM Key Distribution Center (KDC) backend.
- The IdM client displays the link and the code to the user. In this example, the IdM client outputs the link and code on the command line.
- The user opens the website link in a browser, which can be on another host, a mobile phone, and so on: - The user enters the special code.
- If necessary, the user logs in to the OAuth 2.0-based IdP.
- The user is prompted to authorize the client to access information.
 
- The user confirms access at the original device prompt. In this example, the user hits the Enter key at the command line.
- The IdM KDC backend polls the OAuth 2.0 Authorization Server for access to user information.
55.3. Creating a reference to an external identity provider
To connect external identity providers (IdPs) to your Identity Management (IdM) environment, create IdP references in IdM. Complete this procedure to create a reference called my-keycloak-idp to an IdP based on the Keycloak template. For more reference templates, see Example references to different external IdPs in IdM.
Prerequisites
- You have registered IdM as an OAuth application to your external IdP, and obtained a client ID.
- You can authenticate as the IdM admin account.
- Your IdM servers are using RHEL 9.1 or later.
- Your IdM servers are using SSSD 2.7.0 or later.
Procedure
- Authenticate as the IdM admin on an IdM server. - kinit admin - [root@server ~]# kinit admin- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow 
- Create a reference called - my-keycloak-idpto an IdP based on the Keycloak template, where the- --base-urloption specifies the URL to the Keycloak server in the format- server-name.$DOMAIN:$PORT/prefix.- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow 
Verification
- Verify that the output of the - ipa idp-showcommand shows the IdP reference you have created.- ipa idp-show my-keycloak-idp - [root@server ~]# ipa idp-show my-keycloak-idp- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow 
55.4. Example references to different external IdPs in IdM
				The following table lists examples of the ipa idp-add command for creating references to different IdPs in IdM.
			
| Identity Provider | Important options | Command example | 
|---|---|---|
| 
								Microsoft Identity Platform, | 
								 | ipa idp-add my-azure-idp \ --provider microsoft \ --organization main \ --client-id <azure_client_id>  | 
|  | 
								 | ipa idp-add my-google-idp \ --provider google \ --client-id <google_client_id>  | 
| GitHub | 
								 | ipa idp-add my-github-idp \ --provider github \ --client-id <github_client_id>  | 
| 
								Keycloak, | 
								 | ipa idp-add my-keycloak-idp \ --provider keycloak \ --organization main \ --base-url keycloak.idm.example.com:8443/auth \ --client-id <keycloak_client_id> Note 
									The Quarkus version of Keycloak 17 and later have removed the  | 
| Okta | 
								 | ipa idp-add my-okta-idp \ --provider okta --base-url dev-12345.okta.com \ --client-id <okta_client_id>  | 
55.5. Options for the ipa idp-* commands to manage external identity providers in IdM
The following examples show how to configure references to external IdPs based on the different IdP templates. Use the following options to specify your settings:
- --provider
- The predefined template for one of the known identity providers.
- --client-id
- The OAuth 2.0 client identifier issued by the IdP during application registration. As the application registration procedure is specific to each IdP, refer to their documentation for details. If the external IdP is Red Hat Single Sign-On (SSO), see Creating an OpenID Connect Client.
- --base-url
- Base URL for IdP templates, required by Keycloak and Okta.
- --organization
- Domain or Organization ID from the IdP, required by Microsoft Azure.
- --secret
- Optional: Use this option if you have configured your external IdP to require a secret from confidential OAuth 2.0 clients. If you use this option when creating an IdP reference, you are prompted for the secret interactively. Protect the client secret as a password. Note- SSSD in RHEL 9.1 only supports non-confidential OAuth 2.0 clients that do not use a client secret. If you want to use external IdPs that require a client secret from confidential clients, you must use SSSD in RHEL 9.2 and later. 
55.6. Managing references to external IdPs
				After you have created a reference to an external identity provider (IdP), you can find, show, modify, and delete that reference. This example shows you how to manage a reference to an external IdP named keycloak-server1.
			
Prerequisites
- You can authenticate as the IdM admin account.
- Your IdM servers are using RHEL 9.1 or later.
- Your IdM servers are using SSSD 2.7.0 or later.
- You have created a reference to an external IdP in IdM. See Creating a reference to an external identity provider.
Procedure
- Authenticate as the IdM admin on an IdM server. - kinit admin - [root@server ~]# kinit admin- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow 
- Manage the IdP reference. - To find an IdP reference whose entry includes the string - keycloak:- ipa idp-find keycloak - [root@server ~]# ipa idp-find keycloak- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow 
- To display an IdP reference named - my-keycloak-idp:- ipa idp-show my-keycloak-idp - [root@server ~]# ipa idp-show my-keycloak-idp- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow 
- To modify an IdP reference, use the - ipa idp-modcommand. For example, to change the secret for an IdP reference named- my-keycloak-idp, specify the- --secretoption to be prompted for the secret:- ipa idp-mod my-keycloak-idp --secret - [root@server ~]# ipa idp-mod my-keycloak-idp --secret- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow 
- To delete an IdP reference named - my-keycloak-idp:- ipa idp-del my-keycloak-idp - [root@server ~]# ipa idp-del my-keycloak-idp- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow 
 
55.7. Enabling an IdM user to authenticate via an external IdP
				To enable an IdM user to authenticate via an external identity provider (IdP), associate the external IdP reference you have previously created with the user account. This example associates the external IdP reference keycloak-server1 with the user idm-user-with-external-idp.
			
Prerequisites
- Your IdM client and IdM servers are using RHEL 9.1 or later.
- Your IdM client and IdM servers are using SSSD 2.7.0 or later.
- You have created a reference to an external IdP in IdM. See Creating a reference to an external identity provider.
Procedure
- Modify the IdM user entry to associate an IdP reference with the user account: - Copy to Clipboard Copied! - Toggle word wrap Toggle overflow 
Verification
- Verify that the output of the - ipa user-showcommand for that user displays references to the IdP:- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow 
55.8. Retrieving an IdM ticket-granting ticket as an external IdP user
If you have delegated authentication for an Identity Management (IdM) user to an external identity provider (IdP), the IdM user can request a Kerberos ticket-granting ticket (TGT) by authenticating to the external IdP.
Complete this procedure to:
- Retrieve and store an anonymous Kerberos ticket locally.
- 
						Request the TGT for the idm-user-with-external-idp user by using kinitwith the-Toption to enable Flexible Authentication via Secure Tunneling (FAST) channel to provide a secure connection between the Kerberos client and Kerberos Distribution Center (KDC).
Prerequisites
- Your IdM client and IdM servers use RHEL 9.1 or later.
- Your IdM client and IdM servers use SSSD 2.7.0 or later.
- You have created a reference to an external IdP in IdM. See Creating a reference to an external identity provider.
- You have associated an external IdP reference with the user account. See Enabling an IdM user to authenticate via an external IdP.
- The user that you are initially logged in as has write permissions on a directory in the local filesystem.
Procedure
- Use Anonymous PKINIT to obtain a Kerberos ticket and store it in a file named - ./fast.ccache.- kinit -n -c ./fast.ccache - $ kinit -n -c ./fast.ccache- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow 
- Optional: View the retrieved ticket: - Copy to Clipboard Copied! - Toggle word wrap Toggle overflow 
- Begin authenticating as the IdM user, using the - -Toption to enable the FAST communication channel.- kinit -T ./fast.ccache idm-user-with-external-idp - [root@client ~]# kinit -T ./fast.ccache idm-user-with-external-idp Authenticate at https://oauth2.idp.com:8443/auth/realms/master/device?user_code=YHMQ-XKTL and press ENTER.:- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow 
- In a browser, authenticate as the user at the website provided in the command output.
- At the command line, press the Enter key to finish the authentication process.
Verification
- Display your Kerberos ticket information and confirm that the line - config: pa_typeshows- 152for pre-authentication with an external IdP.- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow - The - pa_type = 152indicates external IdP authentication.
55.9. Logging in to an IdM client via SSH as an external IdP user
To log in to an IdM client via SSH as an external identity provider (IdP) user, begin the login process on the command linel. When prompted, perform the authentication process at the website associated with the IdP, and finish the process at the Identity Management (IdM) client.
Prerequisites
- Your IdM client and IdM servers are using RHEL 9.1 or later.
- Your IdM client and IdM servers are using SSSD 2.7.0 or later.
- You have created a reference to an external IdP in IdM. See Creating a reference to an external identity provider.
- You have associated an external IdP reference with the user account. See Enabling an IdM user to authenticate via an external IdP.
Procedure
- Attempt to log in to the IdM client via SSH. - ssh idm-user-with-external-idp@client.idm.example.com - [user@client ~]$ ssh idm-user-with-external-idp@client.idm.example.com (idm-user-with-external-idp@client.idm.example.com) Authenticate at https://oauth2.idp.com:8443/auth/realms/main/device?user_code=XYFL-ROYR and press ENTER.- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow 
- In a browser, authenticate as the user at the website provided in the command output.
- At the command line, press the Enter key to finish the authentication process.
Verification
- Display your Kerberos ticket information and confirm that the line - config: pa_typeshows- 152for pre-authentication with an external IdP.- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow 
55.10. The --provider option in the ipa idp-* commands
The following identity providers (IdPs) support OAuth 2.0 device authorization grant flow:
- Microsoft Identity Platform, including Azure AD
- GitHub
- Keycloak, including Red Hat Single Sign-On (SSO)
- Okta
				When using the ipa idp-add command to create a reference to one of these external IdPs, you can specify the IdP type with the --provider option, which expands into additional options as described below:
			
- --provider=microsoft
- Microsoft Azure IdPs allow parametrization based on the Azure tenant ID, which you can specify with the - --organizationoption to the- ipa idp-addcommand. If you need support for the live.com IdP, specify the option- --organization common.- Choosing - --provider=microsoftexpands to use the following options. The value of the- --organizationoption replaces the string- ${ipaidporg}in the table.- Expand - Option - Value - --auth-uri=URI- https://login.microsoftonline.com/${ipaidporg}/oauth2/v2.0/authorize- --dev-auth-uri=URI- https://login.microsoftonline.com/${ipaidporg}/oauth2/v2.0/devicecode- --token-uri=URI- https://login.microsoftonline.com/${ipaidporg}/oauth2/v2.0/token- --userinfo-uri=URI- https://graph.microsoft.com/oidc/userinfo- --keys-uri=URI- https://login.microsoftonline.com/common/discovery/v2.0/keys- --scope=STR- openid email- --idp-user-id=STR- email
- --provider=google
- Choosing - --provider=googleexpands to use the following options:- Expand - Option - Value - --auth-uri=URI- https://accounts.google.com/o/oauth2/auth- --dev-auth-uri=URI- https://oauth2.googleapis.com/device/code- --token-uri=URI- https://oauth2.googleapis.com/token- --userinfo-uri=URI- https://openidconnect.googleapis.com/v1/userinfo- --keys-uri=URI- https://www.googleapis.com/oauth2/v3/certs- --scope=STR- openid email- --idp-user-id=STR- email
- --provider=github
- Choosing - --provider=githubexpands to use the following options:- Expand - Option - Value - --auth-uri=URI- https://github.com/login/oauth/authorize- --dev-auth-uri=URI- https://github.com/login/device/code- --token-uri=URI- https://github.com/login/oauth/access_token- --userinfo-uri=URI- https://openidconnect.googleapis.com/v1/userinfo- --keys-uri=URI- https://api.github.com/user- --scope=STR- user- --idp-user-id=STR- login
- --provider=keycloak
- With Keycloak, you can define multiple realms or organizations. Since it is often a part of a custom deployment, both base URL and realm ID are required, and you can specify them with the - --base-urland- --organizationoptions to the- ipa idp-addcommand:- ipa idp-add MySSO --provider keycloak \ --org main --base-url keycloak.domain.com:8443/auth \ --client-id <your-client-id> - [root@client ~]# ipa idp-add MySSO --provider keycloak \ --org main --base-url keycloak.domain.com:8443/auth \ --client-id <your-client-id>- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow - Choosing - --provider=keycloakexpands to use the following options. The value you specify in the- --base-urloption replaces the string- ${ipaidpbaseurl}in the table, and the value you specify for the- --organization `option replaces the string `${ipaidporg}.- Expand - Option - Value - --auth-uri=URI- https://${ipaidpbaseurl}/realms/${ipaidporg}/protocol/openid-connect/auth- --dev-auth-uri=URI- https://${ipaidpbaseurl}/realms/${ipaidporg}/protocol/openid-connect/auth/device- --token-uri=URI- https://${ipaidpbaseurl}/realms/${ipaidporg}/protocol/openid-connect/token- --userinfo-uri=URI- https://${ipaidpbaseurl}/realms/${ipaidporg}/protocol/openid-connect/userinfo- --scope=STR- openid email- --idp-user-id=STR- email
- --provider=okta
- After registering a new organization in Okta, a new base URL is associated with it. You can specify this base URL with the - --base-urloption to the- ipa idp-addcommand:- ipa idp-add MyOkta --provider okta --base-url dev-12345.okta.com --client-id <your-client-id> - [root@client ~]# ipa idp-add MyOkta --provider okta --base-url dev-12345.okta.com --client-id <your-client-id>- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow - Choosing - --provider=oktaexpands to use the following options. The value you specify for the- --base-urloption replaces the string- ${ipaidpbaseurl}in the table.- Expand - Option - Value - --auth-uri=URI- https://${ipaidpbaseurl}/oauth2/v1/authorize- --dev-auth-uri=URI- https://${ipaidpbaseurl}/oauth2/v1/device/authorize- --token-uri=URI- https://${ipaidpbaseurl}/oauth2/v1/token- --userinfo-uri=URI- https://${ipaidpbaseurl}/oauth2/v1/userinfo- --scope=STR- openid email- --idp-user-id=STR- email