mirror of
https://github.com/ovh/the-bastion.git
synced 2026-05-09 08:25:27 +02:00
[GH-ISSUE #33] PIV verification status communicated to remote realms #12
Labels
No labels
answered
bug
documentation
enhancement
enhancement
feature
feature
kept-open-for-info
pull-request
question
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/the-bastion#12
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @vmalguy on GitHub (Nov 5, 2020).
Original GitHub issue: https://github.com/ovh/the-bastion/issues/33
In a multi-realm deployment infra, remote realm should send PIV informations to the local bastion.
This could be use to enforce local Multi-Factor Authentication policies even for realm users.
@Alkorin commented on GitHub (Nov 5, 2020):
PIV doesn't mean MFA. It only proves that the private key is stored in a secure physical device.
Do you need MFA aswell ?
@speed47 commented on GitHub (Nov 5, 2020):
Interesting use case. I think the remote bastion can also pass some more information to the local one, such as:
Then on the local bastion, you might be able to specify some policies that will be enforced, something along the lines of:
... which would deny any remote user not having PIV enforced on his local bastion
@vmalguy commented on GitHub (Nov 5, 2020):
anything that could help enforce access policies
When it come to PIV, I like some flexibility.
Per realm is good but how about also per group or host or user ?
@Alkorin commented on GitHub (Nov 5, 2020):
The main goal of realm is to not have the notion of user in the local bastion. Authentication is delegated to the distant bastion.
But we could have this check on groups so that a distant user can't use the group if he didn't used its PIV key to connect to the distant bastion.
@speed47 commented on GitHub (Nov 5, 2020):
Could be done too, even if it would be a bit more complex:
realm-wide setting:
group-wide setting:
per-host: not really doable, because nobody has the authority over a given host, from the point of view of the bastion: a host can be in 2 distinct groups for that matter, with 2 distinct owners. Or a group can be 0.0.0.0/0 and have all the possible hosts in it.
But then, you might also want to grant an account the right to bypass the realm-wide policy, because this account might be a robot and doesn't have the required hand to click on his PIV key...
This is what has been done for password MFA and TOTP MFA:
@speed47 commented on GitHub (Nov 5, 2020):
In any case @Alkorin we'll need
yubico-piv-checker;)