ABFAB: Trust Router
This file represents a server that is implementing an identity provider
for GSS-EAP
(RFC 7055) using the trust router protocol for dynamic realm
discovery. Any ABFAB identity provider is also an ABFAB relying party proxy.
This file does not include a TLS listener. Please see abfab-tls
for a simple example of a RADSEC listener for ABFAB.
|
server { … }
recv Access-Request
Run these rules when receiving an Access-Request
policy.d/filter
for full documentation.If you intend to use CUI and you require that the Operator-Name
be set for CUI generation and you want to generate CUI also
for your local clients then uncomment the operator-name below and
set the operator-name for your clients in clients.conf
operator-name
If you want to generate CUI for some clients that do not send proper
CUI requests, then uncomment the cui below and set add_cui = yes
for these clients in clients.conf
cui
For EAP requests.
EAP authentication.
Allow EAP authentication.
send Access-Accept
Run these rules when sending an Access-Accept
For EAP-TTLS
and PEAP
, add the cached attributes to the reply.
The session-state
attributes are automatically cached when
an Access-Challenge
is sent, and automatically retrieved
when an Access-Request
is received.
The session-state
attributes are automatically deleted after
an Access-Reject
or Access-Accept
is sent.
Create the CUI
value and add the attribute to Access-Accept
.
Uncomment the line below if returning the CUI.
If you want to have a log of authentication replies, uncomment the
following line, and enable the detail reply_log
module.
After authenticating the user, do another SQL query.
See "Authentication Logging Queries" in mods-available/sql
Instead of sending the query to the SQL server, write it into a log file.
Uncomment the following if you want to modify the user’s object in LDAP after a successful login.
exec
for full documentation.Remove reply message if the response contains an EAP-Message
.
send Access-Reject
policy.d/eap
for full documentation.Run these rules for sending an Access-Reject
.
if you have set edir = yes in the ldap module configuration,
please remember to add the ldap module name (or instance).
|
Please see the
Insert attr_filter for full documentation.EAP-Failure message if the request was rejected by policy instead of
because of an authentication failure And already has an EAP message For non-ABFAB,
we insert the failure all the time, but for ABFAB It’s more desirable to preserve
Reply-Message when we can.
|
Default Configuration
EAP-Message
.server abfab-idp {
recv Access-Request {
abfab_psk_authorize
abfab_client_check
filter_username
eap {
ok = return
}
expiration
}
authenticate eap {
eap
}
send Access-Accept {
&reply += &session-state
# cui
# reply_log
-sql
# sql_log
# ldap
exec
remove_reply_message_if_eap
}
send Access-Reject {
-sql
attr_filter.access_reject
if (&reply.Eap-Message) {
eap
}
remove_reply_message_if_eap
}
}