Home Configuring FreeIPA LDAP with Ansible Automation Platform 2.5
Post
Cancel

Configuring FreeIPA LDAP with Ansible Automation Platform 2.5

Introduction

This is a quick blog post to highlight integrating FreeIPA’s LDAP(S) into the recent Ansible Automation Platform 2.5.

This also applies to RedHat’s Identity Management (IDM) which is their commercial version of FreeIPA.

While documentation of the LDAP provider exists, I could only find 1 example of this online from a few years ago.

This post is more of a reference point then a tutorial.

Configuring

  • Create a bind user and give it appropriate permissions to search the database
  • (Optional) Create a user group that is required for someone to log into the platform with
  • (Optional) Create a user group that will grant administrative privileges

Once on the platform, you can use this configuration as a point of reference:

LDAP Configuration Image LDAP Configuration Image

LDAPS may not work out the box if you do not trust the root certificate of the IPA server

Enroll your servers in your IPA realm. It will automatically fetch and trust the CA!

Group Rules

Rules in 2.5 has changed since 2.4, with it being a little less intuitive in my opinion. Here are the rules I deployed:

LDAP Rules Image

What this reads as:

  • Name of the rule
  • Trigger (In this case: A directory group)
  • Operation (AND/OR) This is ignored if there is only 1 provided
  • Groups (CN path to appropriate group)
  • Revoke (Do the opposite. In this case; don’t allow login)

Here is an example of a CN I used for the allow login group.

cn=aap_users,cn=groups,cn=accounts,dc=jamdoog,dc=gra

This post is licensed under CC BY 4.0 by the author.