-
I'd like to avoid user/password on IoT gateways to login to Cockpit for security reasons. Hence, I tried to set up Cockpit for Certificate authentication. I'd like to use the local Linux users, as the IoT gateways are not part of an MS-AD or simlar. The user name is in the CN of the certificate subject. Following a describtion of what I did so far. The user certificate is signed by a CA, which I included in
The /etc/cockpit/cockpit.conf contains:
So when I call I couldn't find any helpful information how I could fix this issue. Hence my question here: |
Beta Was this translation helpful? Give feedback.
Replies: 1 comment 9 replies
-
Yes, certificate authentication with just the local Linux users is possible. There is no central Identity Management System such as MS-AD required. The
Important is the rule name within the |
Beta Was this translation helpful? Give feedback.
Yes, certificate authentication with just the local Linux users is possible. There is no central Identity Management System such as MS-AD required. The
/etc/sssd/sssd.conf
file, however, need to be different according to the design page Certificate mapping and matching rules for all providers. The following example works for me as the required user 'admin' is in the CN of the subject:Important is the rule name within the
certmap
section, which is the Linux user, 'admin' in the example above. Thematchrule
is used to assign a certificate content…