Este conteúdo não está disponível no idioma selecionado.
Chapter 17. Enabling passkey authentication in IdM environment
The Fast IDentity Online 2 (FIDO2) standard is based on public key cryptography and adds the option of a passwordless flow with PIN or biometrics. The passkey authentication in the IdM environment uses FIDO2 compatible devices supported by the libfido2 library.
The passkey authentication method provides an additional security layer to comply with regulatory standards by including passwordless and multi-factor authentication (MFA) that require a PIN or a fingerprint. It uses a combination of special hardware and software, such as passkey device and passkey enablement in an Identity Management (IdM) environment, to strengthen the security in the environment where data protection plays a key role.
If your system is connected to a network with the IdM environment, the passkey authentication method issues a Kerberos ticket automatically, which enables single sign-on (SSO) for an IdM user.
You can use passkey to authenticate through the graphical interface to your operating system. If your system allows you to authenticate with passkey and password, you can skip passkey authentication and authenticate with the password by pressing Space on your keyboard followed by the Enter key. If you use GNOME Desktop Manager (GDM), you can press Enter to bypass the passkey authentication.
Note that, currently, the passkey authentication in the IdM environment does not support FIDO2 attestation mechanism, which allows for the identification of the particular passkey device.
The following procedures provide instructions on managing and configuring passkey authentication in an IdM environment.
17.1. Prerequisites Copiar o linkLink copiado para a área de transferência!
- You have a passkey device.
Install the
fido2-toolspackage:dnf install fido2-tools
# dnf install fido2-toolsCopy to Clipboard Copied! Toggle word wrap Toggle overflow Set the PIN for the passkey device:
- Connect the passkey device to the USB port.
List the connected passkey devices:
fido2-token -L
# fido2-token -LCopy to Clipboard Copied! Toggle word wrap Toggle overflow Set the PIN for your passkey device by following the command prompts.
fido2-token -C passkey_device
# fido2-token -C passkey_deviceCopy to Clipboard Copied! Toggle word wrap Toggle overflow
-
You have installed the
sssd-passkeypackage.
17.2. Registering a passkey device Copiar o linkLink copiado para a área de transferência!
As a user you can configure authentication with a passkey device. A passkey device is compatible with any FIDO2 specification device, such as YubiKey 5 NFC. To configure this authentication method, follow the instructions below.
Prerequisites
- The PIN for the passkey device is set.
Passkey authentication is enabled for an IdM user:
ipa user-add user01 --first=user --last=01 --user-auth-type=passkey
# ipa user-add user01 --first=user --last=01 --user-auth-type=passkeyCopy to Clipboard Copied! Toggle word wrap Toggle overflow Use the
ipa user-modwith the same--user-auth-type=passkeyparameter for an existing IdM user.- Access to the physical machine to which the user wants to authenticate.
Procedure
- Insert the passkey device in the USB port.
Register the passkey for the IdM user:
ipa user-add-passkey user01 --register
# ipa user-add-passkey user01 --registerCopy to Clipboard Copied! Toggle word wrap Toggle overflow Follow the application prompts:
- Enter the PIN for the passkey device.
Touch the device to verify your identity. If you are using a biometric device, ensure to use the same finger with which you registered the device.
TipIt is good practice for users to configure multiple passkey devices as a backup that allows authentication from multiple locations or devices. To ensure the Kerberos ticket is issued during authentication, do not configure more than 12 passkey devices for a user.
Verification
Log in to the system with the username you have configured to use passkey authentication. The system prompts you to insert the passkey device:
Insert your passkey device, then press ENTER.
Insert your passkey device, then press ENTER.Copy to Clipboard Copied! Toggle word wrap Toggle overflow Insert the passkey device into the USB port and enter your PIN when prompted:
Enter PIN: Creating home directory for user01@example.com.
Enter PIN: Creating home directory for user01@example.com.Copy to Clipboard Copied! Toggle word wrap Toggle overflow Confirm the Kerberos ticket is issued:
klist
$ klist Default principal: user01@IPA.EXAMPLE.COMCopy to Clipboard Copied! Toggle word wrap Toggle overflow
Note, to skip passkey authentication, enter any character in the prompt or enter an empty PIN if user authentication is enabled. The system redirects you to password based authentication.
If you enter the PIN for your passkey device incorrectly 3 times, disconnect the physical token and reconnect it to the USB port and perform a successful authentication. If you do not complete a power cycle, you will not be able to authenticate even if you enter the PIN correctly.
17.3. Authentication policies Copiar o linkLink copiado para a área de transferência!
Use authentication policies to configure the available online and local authentication methods.
- Authentication with online connection
- Uses all online authentication methods that the service provides on the server side. For IdM, AD, or Kerberos services, the default authentication method is Kerberos.
- Authentication without online connection
-
Uses authentication methods that are available for a user. You can tune the authentication method with the
local_auth_policyoption.
Use the local_auth_policy option in the /etc/sssd/sssd.conf file to configure the available online and offline authentication methods. By default, the authentication is performed only with the methods that the server side of the service supports. You can tune the policy with the following values:
-
The
matchvalue enables the matching of offline and online states. For example, the IdM server supports online passkey authentication andmatchenables offline and online authentications for the passkey method. -
The
onlyvalue offers only offline methods and ignores the online methods. -
The
enableanddisablevalues explicitly define the methods for offline authentication. For example,enable:passkeyenables only passkey for offline authentication.
The following configuration example allows local users to authenticate locally using smart card authentication:
[domain/shadowutils] id_provider = proxy proxy_lib_name = files auth_provider = none local_auth_policy = only
[domain/shadowutils]
id_provider = proxy
proxy_lib_name = files
auth_provider = none
local_auth_policy = only
The local_auth_policy option applies to the passkey and smart card authentication methods.
17.4. Retrieving an IdM ticket-granting ticket as a passkey user Copiar o linkLink copiado para a área de transferência!
To retrieve a Kerberos ticket-granting ticket (TGT) as a passkey user, request an anonymous Kerberos ticket and enable Flexible Authentication via Secure Tunneling (FAST) channel to provide a secure connection between the Kerberos client and Kerberos Distribution Center (KDC).
Prerequisites
- You registered your passkey device and configured your authentication policies.
Procedure
Initialize the credentials cache by running the following command:
kinit -n @IDM.EXAMPLE.COM -c FILE:armor.ccache
[root@client ~]# kinit -n @IDM.EXAMPLE.COM -c FILE:armor.ccacheCopy to Clipboard Copied! Toggle word wrap Toggle overflow Note that this command creates the armor.ccache file that you need to point to whenever you request a new Kerberos ticket.
Request a Kerberos ticket by running the command:
kinit -T FILE:armor.ccache <username>@IDM.EXAMPLE.COM
[root@client ~]# kinit -T FILE:armor.ccache <username>@IDM.EXAMPLE.COM Enter your PIN:Copy to Clipboard Copied! Toggle word wrap Toggle overflow NoteIf you enter the PIN for your passkey device incorrectly 3 times, disconnect the physical token and reconnect it to the USB port and perform a successful authentication. If you do not complete a power cycle, you will not be able to authenticate even if you enter the PIN correctly.
Verification
Display your Kerberos ticket information:
Copy to Clipboard Copied! Toggle word wrap Toggle overflow The
pa_type = 153indicates passkey authentication.