Add LDAP user federation using the Keycloak localization tool.
LDAP user federation is not currently configured in Keycloak. For example, if it was not configured in Keycloak when the system was initially installed or the LDAP user federation was removed.
The SYSTEM_DOMAIN_NAME
value found in some of the URLs on this page is expected to be the system’s fully qualified domain name (FQDN).
(ncn-mw#
) The FQDN can be found by running the following command on any Kubernetes NCN.
kubectl get secret site-init -n loftsman -o jsonpath='{.data.customizations\.yaml}' | base64 -d | yq r - spec.network.dns.external
Example output:
system.hpc.amslabs.hpecorp.net
Be sure to modify the example URLs on this page by replacing SYSTEM_DOMAIN_NAME
with the actual value found using the above command.
(ncn-mw#
) Prepare to edit the customizations.yaml
file.
If the customizations.yaml
file is managed in an external Git repository (as recommended), then clone a local working tree. Replace the <URL>
value in the following command before running it.
git clone <URL> /root/site-init
cd /root/site-init
If there is not a backup of site-init
, perform the following steps to create a new one using the values stored in the Kubernetes cluster.
Set the CSM_DISTDIR
variable to the path to the unpacked CSM release tarball.
Create a new site-init
directory using the CSM tarball.
cp -r ${CSM_DISTDIR}/shasta-cfg/* /root/site-init
cd /root/site-init
Extract customizations.yaml
from the site-init
Kubernetes secret.
kubectl -n loftsman get secret site-init -o jsonpath='{.data.customizations\.yaml}' | base64 -d - > customizations.yaml
Extract the certificate and key used to create the sealed secrets.
kubectl -n kube-system get secret sealed-secrets-key -o jsonpath='{.data.tls\.crt}' | base64 -d - > certs/sealed_secrets.crt
kubectl -n kube-system get secret sealed-secrets-key -o jsonpath='{.data.tls\.key}' | base64 -d - > certs/sealed_secrets.key
NOTE
All subsequent steps of this procedure should be performed within the/root/site-init
directory created in this step.
(ncn-mw#
) Repopulate the keycloak_users_localize
and cray-keycloak
sealed secrets in the customizations.yaml
file with the desired configuration.
Update the LDAP settings with the desired configuration. LDAP connection information
is stored in the keycloak-users-localize
secret in the customizations.yaml
file.
ldap_connection_url
key is required and is set to an LDAP URL.ldap_bind_dn
and ldap_bind_credentials
keys are optional.
For example:
cray-keycloak:
generate:
name: keycloak-certs
data:
- type: static_b64
args:
name: certs.jks
value: /u3+7QAAAAIAAAAA5yXvSDt11bGXyBA9M2iy0/5i1Tg=
keycloak_users_localize:
generate:
name: keycloak-users-localize
data:
- type: static
args:
name: ldap_connection_url
value: "ldaps://my_ldap.my_org.test"
- type: static
args:
name: ldap_bind_dn
value: "cn=my_admin"
- type: static
args:
name: ldap_bind_credentials
value: "my_ldap_admin_password"
The example above puts an empty certs.jks
in the cray-keycloak
sealed secret.
The next step will generate certs.jks
.
Other LDAP configuration settings are set in the spec.kubernetes.services.cray-keycloak-users-localize
field in the customizations.yaml
file.
A list of the fields follows. The format of the entries in this list is:
* <cray-keycloak-users-localize chart option name> : <description>
- default: <the default value if not overridden in customizations.yaml>
- type: <type that the value in customizations.yaml has to be. e.g., if type is string and a number is entered then you need to quote it>
- allowed values: <if only certain values are allowed they are listed here>
The fields are:
* ldapProviderId : The Keycloak provider ID for the component. This must be "ldap"
- default: ldap
- type: string
* ldapFederationName : The name of the LDAP provider in Keycloak. If a provider with this name already exists then this tool will not create a new provider.
- default: shasta-user-federation-ldap
- type: string
* ldapPriority : The priority of this provider when looking up users or adding a user.
- default: 1
- type: string
* ldapEditMode : If you want to be able to create or change users in Keycloak and have them created or modified in the LDAP server, and the LDAP server allows it, then this can be changed.
- default: READ_ONLY
- type: string
- allowed values: `READ_ONLY`, `WRITEABLE`, or `UNSYNCED`
* ldapSyncRegistrations : If true, then newly created users will be created in the LDAP server.
- default: false
- type: string
- allowed values: true or false
* ldapVendor: This determines some defaults for what mappers are created by default.
- default: other
- type: string
- allowed values: Active Directory, Red Hat Directory Server, Tivoli, Novell eDirectory, or other
* ldapUsernameLDAPAttribute: The LDAP attribute to map to the username in Keycloak.
- default: uid
- type: string
* ldapRdnLDAPAttribute: The LDAP attribute being used as the users RDN.
- default: uid
- type: string
* ldapUuidLDAPAttribute: The LDAP attribute being used as a unique ID.
- default: uid
- type: string
* ldapUserObjectClasses: The object classes for user entries.
- default: posixAccount
- type: comma-separated string
* ldapAuthType: Set to "none" if the LDAP server allows anonymous search for users and groups, otherwise set to "simple" to bind.
- default: none
- type: string
- allowed values: none or simple
* ldapSearchBase: The DN for the base entry to search for users and groups.
- default: cn=default
- type: string
* ldapSearchScope: The search scope to use when searching for users or groups: 2 for subtree, 1 for onelevel
- default: 2
- type: string
- allowed values: 1 or 2
* ldapUseTruststoreSpi: Determines if the truststore is used to validate the server certificate when connecting to the server.
- default: ldapsOnly
- type: string
- allowed values: ldapsOnly, always, never
* ldapConnectionPooling: If true then Keycloak will use a connection pool of LDAP connections.
- default: true
- type: string
- allowed values: true or false
* ldapPagination: Set to true if the LDAP server supports or requires use of the paging extension.
- default: true
- type: string
- allowed values: true or false
* ldapAllowKerberosAuthentication:
- Set to true to enable HTTP authentication of users with SPNEGO/Kerberos tokens.
- default: false
- type: string
* ldapBatchSizeForSync: Count of LDAP users to be imported from LDAP to Keycloak in a single transaction.
- default: 4000
- type: string
* ldapFullSyncPeriod: If a positive number, this is the number of seconds between automatic full user synchronization operations; if negative then full user synchronization operations will not be done automatically.
- default: -1
- type: string
* ldapChangedSyncPeriod: f a positive number, this is the number of seconds between automatic changed user synchronization operations; if negative then changed user synchronization operations will not be done automatically.
- default: -1
- type: string
* ldapDebug: Set to true to enable extra logging of LDAP operations.
- default: true
- allowed values: true or false
* ldapUserAttributeMappers: Extra attribute mappers to create so that users have attributes required by Shasta software. The Keycloak attribute that the LDAP attribute maps to will be the same.
- default: [uidNumber, gidNumber, loginShell, homeDirectory]
- type: list of strings
* ldapUserAttributeMappersToRemove: These attribute mappers will be removed, to be used in the case where the default attribute mappers are not appropriate. For example, this could be used to remove the email mapper if email addresses are not unique.
- default: []
- type: list of strings
* ldapGroupNameLDAPAttribute: The LDAP attribute to map to the group name in Keycloak.
- default: cn
- type: string
* ldapGroupObjectClass: The object classes for group entries.
- default: posixGroup
- type: comma-separated string
* ldapPreserveGroupInheritance: Whether group inheritance should be propagated to Keycloak or not.
- default: false
- type: string
- allowed values: true or false
* ldapMembershipLDAPAttribute: Name of the LDAP attribute that refers to the group members.
- default: memberUid
- type: string
* ldapMembershipAttributeType: If the member attribute contains the DN for the user, then set this to DN. If the member attribute is the UID of the entry then set this to UID.
- default: UID
- type: string
- allowed values: UID or DN
* ldapMembershipUserLDAPAttribute: If the ldapMembershipAttributeType is UID then this is the LDAP attribute containing the UID value, otherwise this is ignored.
- default: uid
- type: string
* ldapGroupsLDAPFilter: Extra filter to include when searching for group entries. If this is not the empty string the value must start with the ( character and end with ).
- default: ""
- type: string
* ldapUserRolesRetrieveStrategy: Defines how to retrieve groups for a user.
- default: LOAD_GROUPS_BY_MEMBER_ATTRIBUTE
- type: string
- allowed values: LOAD_GROUPS_BY_MEMBER_ATTRIBUTE, GET_GROUPS_FROM_USER_MEMBEROF_ATTRIBUTE, LOAD_GROUPS_BY_MEMBER_ATTRIBUTE_RECURSIVELY
* ldapMappedGroupAttributes: Attributes of the group that will be added as attributes of the user. Some Shasta REST API operations require the user to have a gidNumber and this adds that attribute from the LDAP group.
- default: cn,gidNumber,memberUid
- type: comma-separated string
* ldapDropNonExistingGroupsDuringSync: If true, groups that are not in LDAP will be deleted when synchronizing.
- default: false
- type: string
- allowed values: true or false
* ldapDoFullSync: Tells the HPE Cray EX Keycloak localization tool to perform an immediate full user synchronization after configuring the LDAP integration.
- default: true
- type: string
* ldapRoleMapperDn: If this is an empty string then a role mapper is not created, otherwise this the DN used as the search base to find role entries.
- default: ""
- type: string
* ldapRoleMapperRoleNameLDAPAttribute: The LDAP attribute to map to the role name in Keycloak.
- default: cn
- type: string
* ldapRoleMapperRoleObjectClasses: The object classes for role entries.
- default: groupOfNames
- type: string
* ldapRoleMapperLDAPAttribute: Name of the LDAP attribute that refers to the group members.
- default: member
- type: string
* ldapRoleMapperMemberAttributeType: If the member attribute contains the DN for the user, then set this to DN. If the member attribute is the UID of the entry then set this to UID.
- default: DN
- type: string
- allowed values: UID or DN
* ldapRoleMapperUserLDAPAttribute: If the ldapRoleMapperMemberAttributeType is UID then this is the LDAP attribute containing the UID value, otherwise this is ignored.
- default: sAMAccountName
- type: string
* ldapRoleMapperRolesLDAPFilter: Extra filter to include when searching for group entries. If this is not the empty string the value must start with the ( character and end with ).
- default: ""
- type: string
* ldapRoleMapperMode: Specifies how to retrieve roles for the user.
- default: READ_ONLY
- allowed values: READ_ONLY, LDAP_ONLY, or IMPORT
* ldapRoleMapperStrategy: Defines how to retrieve roles for a user.
- default: LOAD_ROLES_BY_MEMBER_ATTRIBUTE
- type: string
- allowed values: LOAD_ROLES_BY_MEMBER_ATTRIBUTE, GET_ROLES_FROM_MEMBEROF_ATTRIBUTE, or LOAD_ROLES_BY_MEMBER_ATTRIBUTE_RECURSIVELY
* ldapRoleMapperMemberOfLDAPAttribute: Only used when ldapRoleMapperStrategy is GET_ROLES_FROM_MEMBEROF_ATTRIBUTE where it is the LDAP attribute in the user entry that contains the roles that the user has.
- default: memberOf
- type: string
* ldapRoleMapperUseRealmRolesMapping: If true then LDAP role mappings will be mapped to realm role mappings in Keycloak, otherwise the LDAP role mappings will be mapped to client role mappings.
- default: false
- type: string
- allowed values: true or false
* ldapRoleMapperClientId: If ldapRoleMapperUseRealmRolesMapping is false then this is the client ID to apply the roles to.
- default: shasta
- type: string
(Optional) (ncn-mw#
) Add the LDAP CA certificate in the certs.jks
section of customizations.yaml
.
If LDAP requires TLS (recommended), update the cray-keycloak
sealed
secret value by supplying a base-64-encoded Java KeyStore (JKS) that
contains the CA certificate that signed with the LDAP server’s host key. The
password for the JKS file must be password
.
Administrators may use the keytool
command from the openjdk:11-jre-slim
container image
packaged with CSM to create a JKS file that includes a PEM-encoded
CA certificate to verify the LDAP host(s).
Load the openjdk
container image.
NOTE
Requires a properly configured Docker or Podman environment.
${CSM_DISTDIR}/hack/load-container-image.sh artifactory.algol60.net/csm-docker/stable/docker.io/library/openjdk:11-jre-slim
Troubleshooting:
If the output shows the skopeo.tar
file cannot be found, then ensure that the $CSM_DISTDIR
directory looks contains the artifactory.algol60.net
directory which includes the originally installed docker images.
The following is an example of the skopeo.tar file not being found:
++ podman load -q -i ./hack/../vendor/skopeo.tar
++ sed -e 's/^.*: //'
+ SKOPEO_IMAGE=
If the following overlay error is returned, it could be caused by an earlier podman invocation using a different configuration:
"ERRO[0000] [graphdriver] prior storage driver overlay failed: 'overlay' is not supported over overlayfs, a mount_program is required: backing file system is unsupported for this graph driver"
To recover podman, move the overlay directories to a backup folder as follows:
mkdir /var/lib/containers/storage/backup
mv /var/lib/containers/storage/overlay* /var/lib/containers/storage/backup
This should allow load-container-images.sh
to succeed.
Create (or update) cert.jks
with the PEM-encoded CA certificate for an LDAP host.
IMPORTANT: Replace
<ca-cert.pem>
and<alias>
before running the command.
podman run --rm -v "$(pwd):/data" artifactory.algol60.net/csm-docker/stable/docker.io/library/openjdk:11-jre-slim keytool \
-importcert -trustcacerts -file /data/<ca-cert.pem> -alias <alias> -keystore /data/certs.jks \
-storepass password -noprompt
Set variables for the LDAP server.
In the following example, the LDAP server has the hostname dcldap2.hpc.amslabs.hpecorp.net
and is using the port 636
.
LDAP=dcldap2.hpc.amslabs.hpecorp.net
PORT=636
Get the issuer certificate for the LDAP server at port 636
.
Use openssl s_client
to connect and show the certificate chain returned by the LDAP host.
openssl s_client -showcerts -connect $LDAP:${PORT} </dev/null
Generate cacert.pem
containing the issuer’s certificate.
Either manually extract (cut/paste) the issuer’s
certificate into cacert.pem
, or try the following commands to
create it automatically.
NOTE
The following commands were verified using OpenSSL version1.1.1d
and use the-nameopt RFC2253
option to ensure consistent formatting of distinguished names. Older versions of OpenSSL may not support-nameopt
on thes_client
command or may use a different default format. However, administrators should be able to extract the issuer certificate manually from the output of the aboveopenssl s_client
example, if necessary.
Observe the issuer’s DN.
For example:
openssl s_client -showcerts -nameopt RFC2253 -connect $LDAP:${PORT} </dev/null 2>/dev/null | grep issuer= | sed -e 's/^issuer=//'
Example output:
CN=DigiCert Global G2 TLS RSA SHA256 2020 CA1,O=DigiCert Inc,C=US
Extract the issuer’s certificate using the awk
command.
NOTE
The issuer DN is properly escaped as part of theawk
pattern below. If the value being used is different, then be sure to escape it properly!
openssl s_client -showcerts -nameopt RFC2253 -connect $LDAP:${PORT} </dev/null 2>/dev/null |
awk '/s:CN=DigiCert Global G2 TLS RSA SHA256 2020 CA1,O=DigiCert Inc,C=US/,/END CERTIFICATE/' |
awk '/BEGIN CERTIFICATE/,/END CERTIFICATE/' > cacert.pem
Verify the issuer’s certificate was properly extracted and saved in cacert.pem
.
cat cacert.pem
Expected output looks similar to the following:
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
Create certs.jks
.
podman run --rm -v "$(pwd):/data" artifactory.algol60.net/csm-docker/stable/docker.io/library/openjdk:11-jre-slim keytool -importcert \
-trustcacerts -file /data/cacert.pem -alias cray-data-center-ca -keystore /data/certs.jks \
-storepass password -noprompt
Create certs.jks.b64
by base-64 encoding certs.jks
.
base64 certs.jks > certs.jks.b64
Inject and encrypt certs.jks.b64
into customizations.yaml
.
cat <<EOF | yq w - 'data."certs.jks"' "$(<certs.jks.b64)" | \
yq r -j - | /root/site-init/utils/secrets-encrypt.sh | \
yq w -f - -i /root/site-init/customizations.yaml \
spec.kubernetes.sealed_secrets.cray-keycloak
{
"kind": "Secret",
"apiVersion": "v1",
"metadata": {
"name": "keycloak-certs",
"namespace": "services",
"creationTimestamp": null
},
"data": {}
}
EOF
Update kafka
secrets with the new certs.jks.b64
.
kubectl get secret cray-shared-kafka-clients-ca-cert -n services -o json | jq --rawfile cert certs.jks.b64 '.data["ca.p12"]=$cert'
kubectl get secret cray-shared-kafka-cluster-ca-cert -n services -o json | jq --rawfile cert certs.jks.b64 '.data["ca.p12"]=$cert'
Restart the operator to apply the change:
kubectl rollout restart -n services deployments cray-shared-kafka-entity-operator
(ncn-mw#
) Prepare to generate sealed secrets.
Secrets are stored in customizations.yaml
as SealedSecret
resources
(encrypted secrets), which are deployed by specific charts and decrypted by the
sealed secrets operator. In order for that to happen, those Secrets must first be seeded,
generated, and encrypted.
./utils/secrets-reencrypt.sh customizations.yaml ./certs/sealed_secrets.key ./certs/sealed_secrets.crt
(ncn-mw#
) Encrypt the static values in the customizations.yaml
file after making changes.
The following command must be run within the site-init
directory.
./utils/secrets-seed-customizations.sh customizations.yaml
Expected output looks similar to:
Creating Sealed Secret keycloak-certs
Generating type static_b64...
Creating Sealed Secret keycloak-master-admin-auth
Generating type static...
Generating type static...
Generating type randstr...
Generating type static...
Creating Sealed Secret cray_reds_credentials
Generating type static...
Generating type static...
Creating Sealed Secret cray_meds_credentials
Generating type static...
Creating Sealed Secret cray_hms_rts_credentials
Generating type static...
Generating type static...
Creating Sealed Secret vcs-user-credentials
Generating type randstr...
Generating type static...
Creating Sealed Secret generated-platform-ca-1
Generating type platform_ca...
Creating Sealed Secret pals-config
Generating type zmq_curve...
Generating type zmq_curve...
Creating Sealed Secret munge-secret
Generating type randstr...
Creating Sealed Secret slurmdb-secret
Generating type static...
Generating type static...
Generating type randstr...
Generating type randstr...
Creating Sealed Secret keycloak-users-localize
Generating type static...
(ncn-mw#
) Decrypt the sealed secret to verify it was generated correctly.
./utils/secrets-decrypt.sh keycloak_users_localize | jq -r '.data.ldap_connection_url' | base64 --decode
Expected output looks similar to the following:
ldaps://my_ldap.my_org.test
(ncn-mw#
) Upload the modified customizations.yaml
file to Kubernetes.
kubectl delete secret -n loftsman site-init
kubectl create secret -n loftsman generic site-init --from-file=customizations.yaml
(ncn-mw#
) Re-apply the cray-keycloak
Helm chart with the updated customizations.yaml
file.
Follow the Redeploying a Chart procedure with the following specifications:
Name of chart to be redeployed: cray-keycloak
Base name of manifest: platform
Instead of downloading the customizations from Kubernetes, use the updated customizations.yaml
file.
When reaching the step to validate that the redeploy was successful, perform the following steps:
Only follow these steps as part of the previously linked chart redeploy procedure.
Wait for the keycloak-certs
secret to reflect the new cert.jks
.
Run the following command until there is a non-empty value in the secret (this can take a minute or two):
kubectl get secret -n services keycloak-certs -o yaml | grep certs.jks
Example output:
certs.jks: <REDACTED>
Restart the cray-keycloak-
pods.
kubectl rollout restart statefulset -n services cray-keycloak
Wait for the Keycloak pods to restart.
kubectl rollout status statefulset -n services cray-keycloak
Make sure to perform the entire linked procedure, including the step to save the updated customizations.
(ncn-mw#
) Uninstall the current cray-keycloak-users-localize
chart.
helm del cray-keycloak-users-localize -n services
(ncn-mw#
) Re-apply the cray-keycloak-users-localize
Helm chart with the updated customizations.yaml
file.
Follow the Redeploying a Chart procedure with the following specifications:
Name of chart to be redeployed: cray-keycloak-users-localize
Base name of manifest: platform
Instead of downloading the customizations from Kubernetes, use the updated customizations.yaml
file.
When reaching the step to validate that the redeploy was successful, perform the following steps:
Only follow these steps as part of the previously linked chart redeploy procedure.
Watch the pod to check the status of the job.
The pod will go through the normal Kubernetes states. It will stay in a Running
state for a while, and then it will go to Completed
.
kubectl get pods -n services | grep keycloak-users-localize
Example output:
keycloak-users-localize-1-sk2hn 0/2 Completed 0 2m35s
Check the pod’s logs.
Replace the KEYCLOAK_POD_NAME
value with the pod name from the previous step.
kubectl logs -n services KEYCLOAK_POD_NAME keycloak-localize
Example log entry showing that it has updated the “s3” objects and ConfigMaps
:
2020-07-20 18:26:15,774 - INFO - keycloak_localize - keycloak-localize complete
(ncn-mw#
) Sync the users and groups from Keycloak to the compute nodes.
Get the crayvcs
password.
kubectl get secret -n services vcs-user-credentials \
--template={{.data.vcs_password}} | base64 --decode
Check out content from the cos-config-management
VCS repository.
git clone https://api-gw-service-nmn.local/vcs/cray/cos-config-management.git
cd cos-config-management
git checkout integration
Create the group_vars/Compute/keycloak.yaml
file.
The file contents should be:
---
keycloak_config_computes: True
Push the changes to VCS with the crayvcs
username.
git add group_vars/Compute/keycloak.yaml
git commit -m "Configure keycloak on computes"
git push origin integration
Update the Configuration Framework Service (CFS) configuration.
cray cfs configurations update configurations-example --file ./configurations-example.json --format json
Example output:
{
"lastUpdated": "2021-07-28T03:26:30:37Z",
"layers": [
{
"cloneUrl": "https://api-gw-service-nmn.local/vcs/cray/example-repo.git",
"commit": "<git commit id>",
"name": "configurations-layer-example-1",
"playbook": "site.yml"
}
],
"name": "configurations-example"
}
Reboot with the Boot Orchestration Service (BOS).
cray bos v1 session create --template-name BOS_TEMPLATE --operation reboot
(ncn-mw#
) Validate that LDAP integration was added successfully.
Retrieve the admin
user’s password for Keycloak.
kubectl get secrets -n services keycloak-master-admin-auth -ojsonpath='{.data.password}' | base64 -d
Log in to the Keycloak UI using the admin
user and the password obtained in the previous step.
The Keycloak UI URL is typically similar to the following: https://auth.cmn.SYSTEM_DOMAIN_NAME/keycloak
Click on the Users
tab in the navigation pane on the left.
Click on the View all users
button and verify that the LDAP users appear in the table.
Verify that a token can be retrieved from Keycloak using an LDAP user/password.
In the example below, replace myuser
, mypass
, and shasta
in the cURL command with
site-specific values. The shasta
client is created during the SMS install process.
In the following example, the jq
command is not required; it is simply used to
format the output for readability.
curl -s \
-d grant_type=password \
-d client_id=shasta \
-d username=myuser \
-d password=mypass \
https://api-gw-service-nmn.local/keycloak/realms/shasta/protocol/openid-connect/token |
jq
Expected output:
{
"access_token": "ey...IA", <<-- NOTE this value, used in the following step
"expires_in": 300,
"not-before-policy": 0,
"refresh_expires_in": 1800,
"refresh_token": "ey...qg",
"scope": "profile email",
"session_state": "10c7d2f7-8921-4652-ad1e-10138ec6fbc3",
"token_type": "bearer"
}
Validate that the access_token
looks correct.
Copy the access_token
from the previous step and open a browser window.
Navigate to http://jwt.io
and paste the token in the Encoded
field.
Verify that the preferred_username
is the expected LDAP user, and that the
role is admin
(or other role appropriate for the user).