<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Recent changes to Confluent_auth</title><link>https://sourceforge.net/p/xcat/wiki/Confluent_auth/</link><description>Recent changes to Confluent_auth</description><atom:link href="https://sourceforge.net/p/xcat/wiki/Confluent_auth/feed" rel="self"/><language>en</language><lastBuildDate>Mon, 04 Aug 2014 02:53:54 -0000</lastBuildDate><atom:link href="https://sourceforge.net/p/xcat/wiki/Confluent_auth/feed" rel="self" type="application/rss+xml"/><item><title>Confluent_auth modified by Guang Cheng Li</title><link>https://sourceforge.net/p/xcat/wiki/Confluent_auth/</link><description>&lt;div class="markdown_content"&gt;&lt;pre&gt;--- v4
+++ v5
@@ -1,3 +1,5 @@
+[[include ref=Design_Warning]]
+
 Confluent Authentication model
 ---------------------------------
 This will be a developer toned document for now, going into more detail
&lt;/pre&gt;
&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Guang Cheng Li</dc:creator><pubDate>Mon, 04 Aug 2014 02:53:54 -0000</pubDate><guid>https://sourceforge.net4e7e04cce014a43e0afb18bcb78ffe4117c4c0a9</guid></item><item><title>Confluent_auth modified by Jarrod Johnson</title><link>https://sourceforge.net/p/xcat/wiki/Confluent_auth/</link><description>&lt;div class="markdown_content"&gt;&lt;pre&gt;&lt;/pre&gt;
&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Jarrod Johnson</dc:creator><pubDate>Fri, 01 Aug 2014 13:36:33 -0000</pubDate><guid>https://sourceforge.netbe6178f96825724929be8a2d54285515afa2ad05</guid></item><item><title>Confluent_auth modified by Jarrod Johnson</title><link>https://sourceforge.net/p/xcat/wiki/Confluent_auth/</link><description>&lt;div class="markdown_content"&gt;&lt;pre&gt;&lt;/pre&gt;
&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Jarrod Johnson</dc:creator><pubDate>Fri, 01 Aug 2014 13:36:20 -0000</pubDate><guid>https://sourceforge.netd79ee60fdde6dad777eac252d83793c2b20d135c</guid></item><item><title>Confluent_Auth modified by Jarrod Johnson</title><link>https://sourceforge.net/p/xcat/wiki/Confluent_Auth/</link><description>&lt;div class="markdown_content"&gt;&lt;pre&gt;--- v1
+++ v2
@@ -25,3 +25,13 @@
 1.If client is either root or the owner of the process, they are allowed in.
 2.Otherwise, the username and groups are checked against known users/groups
 3.If 1 and 2 find no matches, revert to generic passphrase mechanism common with TLS socket.
+
+TLS Socket
+-----------------------------------------
+1. If client certificate is provided and verified, then subjectaltname is used if present, else subject to identify user.  If certificate does not work, fail.
+2. If no client certificate provided, go to generic passphrase mechanism as in unix socket.
+
+HTTP
+----------------------------------------
+1. If and only if over a unix socket, consider evaluating client certificate passed in headers
+2. Go to generic passphrase mechanism
&lt;/pre&gt;
&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Jarrod Johnson</dc:creator><pubDate>Wed, 16 Jul 2014 18:54:16 -0000</pubDate><guid>https://sourceforge.net455f03e343ce285bf4ac52d009a602bf0c03f9e3</guid></item><item><title>Confluent_Auth modified by Jarrod Johnson</title><link>https://sourceforge.net/p/xcat/wiki/Confluent_Auth/</link><description>&lt;div class="markdown_content"&gt;&lt;h2 id="confluent-authentication-model"&gt;Confluent Authentication model&lt;/h2&gt;
&lt;p&gt;This will be a developer toned document for now, going into more detail&lt;br /&gt;
than most any user will care to think about.&lt;/p&gt;
&lt;p&gt;Confluent does/will offer a number of authentication schemes:&lt;br /&gt;
&lt;em&gt;Passphrases in its configuration stores:&lt;br /&gt;
    -PBKDF transformed passphrase&lt;br /&gt;
    -Users need not exist in anything outside the service (e.g. /etc/passwd) if not appropriate&lt;/em&gt;PAM configuration&lt;br /&gt;
    -If /etc/pam.d/confluent exists, the above passphrase backend is totally ignored in favor of PAM&lt;br /&gt;
    -Users and/or groups still must exist in the cfg to be authorized&lt;br /&gt;
&lt;em&gt;Certificates&lt;br /&gt;
    -For TLS direct client to be supported&lt;br /&gt;
    -Might not be supported for HTTP&lt;/em&gt;Console access tokens&lt;br /&gt;
    -Allowing a client service to authenticate and request a token which is bound to a particular console&lt;br /&gt;
*System authentication&lt;br /&gt;
    -Unix domain socket uses the kernel attested user/password values to correlate to groups&lt;/p&gt;
&lt;p&gt;To be clear about priorities, the various services are described:&lt;/p&gt;
&lt;h2 id="unix-socket"&gt;UNIX Socket&lt;/h2&gt;
&lt;p&gt;1.If client is either root or the owner of the process, they are allowed in.&lt;br /&gt;
2.Otherwise, the username and groups are checked against known users/groups&lt;br /&gt;
3.If 1 and 2 find no matches, revert to generic passphrase mechanism common with TLS socket.&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Jarrod Johnson</dc:creator><pubDate>Tue, 15 Jul 2014 21:15:57 -0000</pubDate><guid>https://sourceforge.net24231c4ccba8f09deee24239613eea35cc215300</guid></item></channel></rss>