피드 구독

Identity management solutions integrate systems, services, and applications into a single ecosystem that provides authentication, access control, enterprise SSO, identity information and the policies related to those identities. While I have dedicated time to explaining how to provide these capabilities to Linux systems - it is now time to broaden the scope and talk a little bit about services and applications.

In some ways, services and applications are very similar. They are both usually

web-based and accessible by browsers and via an HTTP based API. However, there are other services that can (and should) be integrated into the identity management fabric. To name a few I would call out CUPS printing services, IMAP, VPN, and storage servers like NFS and Samba. These services really deserve separate articles, so I suggest you focus primarily on the services that "speak HTTP" and use the term “service” and “application” interchangeably in this context.

Services are written in different languages and use different frameworks - the most common being Java, Python, Ruby and PHP. In addition, Perl-based applications are still popular in some environments. While Java has historically provided a number of tools and capabilities to help solve identity related problems - there were still some gaps in the available open source offerings. While this has changed recently, I will set this topic aside for a future article as Java deserves a separate, more focused post. Here we will talk about web applications that leverage, or can leverage, Apache as a web server.

Traditionally applications have been built using frameworks that provided very basic LDAP capabilities. In the modern world this is not enough any more. It is also very costly to build robust identity management capabilities into every application. The authentication and identity information gathering can be offloaded from an application to a series of Apache modules that provide authentication, enterprise SSO, access control checks, and collect all necessary information from the central LDAP-based server of your choice; this includes Active Directory (AD), IdM/FreeIPA, IdM/FreeIPA in a trust configuration with AD, or a generic LDAP server. Once collected, the information is passed to the actual application in the CGI variables or HTTP header. Applications can simply use this data instead of building in their own LDAP support.

We have been promoting this approach for more than a year now and while we presented on it at a number of different conferences - it is now time to spread the word and to help you reduce your development burden and costs.

The slide deck that covers this approach was published on the Ohio LinuxFest site and is quite comprehensive. This conference was held in October 2015 in Columbus, Ohio. Unfortunately, I was not able to present there. Thunder, rain and humanity turned against me. If you are interested in the details of this unfortunate trip you can take a look at my LinkedIn blog.

Here is the deck. There are other talks on the subject. Some are a bit more technical. This one is a good example. If you are interested in this topic and want to get more information, I encourage you to comment on this post. Feedback and suggestions are always welcome. Remember, we appreciate all contributions and welcome any joint efforts that help to solve real world problems in this area. I look forward to working with you!


저자 소개

UI_Icon-Red_Hat-Close-A-Black-RGB

채널별 검색

automation icon

오토메이션

기술, 팀, 인프라를 위한 IT 자동화 최신 동향

AI icon

인공지능

고객이 어디서나 AI 워크로드를 실행할 수 있도록 지원하는 플랫폼 업데이트

open hybrid cloud icon

오픈 하이브리드 클라우드

하이브리드 클라우드로 더욱 유연한 미래를 구축하는 방법을 알아보세요

security icon

보안

환경과 기술 전반에 걸쳐 리스크를 감소하는 방법에 대한 최신 정보

edge icon

엣지 컴퓨팅

엣지에서의 운영을 단순화하는 플랫폼 업데이트

Infrastructure icon

인프라

세계적으로 인정받은 기업용 Linux 플랫폼에 대한 최신 정보

application development icon

애플리케이션

복잡한 애플리케이션에 대한 솔루션 더 보기

Original series icon

오리지널 쇼

엔터프라이즈 기술 분야의 제작자와 리더가 전하는 흥미로운 스토리