Description
This repository contains the current state of the development of the direct integration of SSSD with an external IdP. Currently Keycloak and Entra ID are supported.
You can find a short video with a demo at https://sbose.fedorapeople.org/sssd-idp-demo/sssd-idp-demo.mp4. There is also an extended demo with more details on Youtube.
The code is based on the git trees:
- https://github.com/sumit-bose/sssd/tree/sss_idmap_4_idp
- https://github.com/sumit-bose/sssd/tree/oidc_entra_id_users_groups
- https://github.com/sumit-bose/sssd/tree/id_provider_idp
Feel free to leave comments, questions and suggestions on github.
Installation Instructions
After installing the packages form this repository, especially the sssd-idp
package, create a sssd.conf
file like e.g.:
[sssd]
config_file_version = 2
services = nss, pam
domains = YOU.onmicrosoft.com, keycloak
[domain/YOU.onmicrosoft.com]
id_provider = idp
auto_private_groups = true
use_fully_qualified_names = true
debug_level = 9
idp_client_id = UUID_of_YOUR_Entra_ID_client
idp_client_id = Password_of_YOUR_Entra_ID_client
idp_token_endpoint = https://login.microsoftonline.com/YOUR_Entra_ID_tennant_UUID/oauth2/v2.0/token
idp_device_auth_endpoint = https://login.microsoftonline.com/YOUR_Entra_ID_tennant_UUID/oauth2/v2.0/devicecode
idp_userinfo_endpoint = https://graph.microsoft.com/v1.0/me
idp_id_scope = https%3A%2F%2Fgraph.microsoft.com%2F.default
idp_auth_scope = openid profile email
[domain/keycloak]
idp_type = keycloak:https://master.keycloak.test:8443/auth/admin/realms/master/
id_provider = idp
auto_private_groups = true
use_fully_qualified_names = true
debug_level = 9
idp_client_id = YourKeycloakClient
idp_client_secret = YourKeycloakClientPassword
idp_token_endpoint = https://master.keycloak.test:8443/auth/realms/master/protocol/openid-connect/token
idp_userinfo_endpoint = https://master.keycloak.test:8443/auth/realms/master/protocol/openid-connect/userinfo
idp_device_auth_endpoint = https://master.keycloak.test:8443/auth/realms/master/protocol/openid-connect/auth/device
idp_id_scope = profile
idp_auth_scope = openid profile email
[nss]
debug_level = 9
default_shell = /bin/bash
fallback_homedir = /home/%f
Please note that the IdP clients must have the permission to read user and group attributes.
Active Releases
The following unofficial repositories are provided as-is by owner of this project. Contact the owner directly for bugs or issues (IE: not bugzilla).
Release | Architectures | Repo Download |
---|---|---|
![]() |
x86_64 (872)* | Centos-stream 10 (23 downloads) |
![]() |
x86_64 (9)* | Centos-stream 8 (25 downloads) |
![]() |
x86_64 (981)* | Centos-stream 9 (22 downloads) |
![]() |
x86_64 (11)* | EPEL 8 (36 downloads) |
![]() |
x86_64 (1306)* | EPEL 9 (168 downloads) |
![]() |
aarch64 (885)*, s390x (854)*, x86_64 (860)* | Fedora 39 (0 downloads) |
![]() |
aarch64 (887)*, ppc64le (892)*, s390x (885)*, x86_64 (1497)* | Fedora 40 (39 downloads) |
![]() |
aarch64 (330)*, ppc64le (355)*, s390x (338)*, x86_64 (605)* | Fedora 41 (28 downloads) |
![]() |
aarch64 (0)*, ppc64le (0)*, s390x (0)*, x86_64 (0)* | Fedora 42 (2 downloads) |
![]() |
x86_64 (9)* | Fedora eln (21 downloads) |
![]() |
aarch64 (871)*, ppc64le (869)*, s390x (890)*, x86_64 (948)* | Fedora rawhide (24 downloads) |
* Total number of downloaded packages.