On 16/07/2022 04:08, Jacob M Cutright via FreeIPA-users wrote:
Hello,
Apologies if I am misunderstanding and this is incorrect, but users who
log in via SSH keys do not get Kerberos tickets by default, which is why
your pam_sss_sudo isn't working. You can reference this issue here:
https://pagure.io/freeipa/issue/4000/
Yeah, if you're using PubkeyAuthentication then you can't do any of this.
If you're wedded to PubkeyAuthentication then there's not much else you
can do other than configure sudo rules to allow the Ansible user to use
sudo without authentication.
Arguably this is more secure anyway, because with
GSSAPIDelegateCredentials, you're handing the Ansible controller's TGT
over to the managed host; if that host has been compromised then the
attacker than now use the controller's TGT to authenticate to other
services on your network...
--
Sam Morris <https://robots.org.uk/>
PGP: rsa4096/CAAA AA1A CA69 A83A 892B 1855 D20B 4202 5CDA 27B9
_______________________________________________
FreeIPA-users mailing list -- freeipa-users@lists.fedorahosted.org
To unsubscribe send an email to freeipa-users-le...@lists.fedorahosted.org
Fedora Code of Conduct:
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives:
https://lists.fedorahosted.org/archives/list/freeipa-users@lists.fedorahosted.org
Do not reply to spam on the list, report it:
https://pagure.io/fedora-infrastructure