Monday, 2010-11-08

*** WiKIDLogBot (~WiKIDLogB@ec2-174-129-6-100.compute-1.amazonaws.com) has joined #wikid13:13
card.freenode.netTopic for #wikid is: If no one is here, please try email, the nabble forums: http://www.wikidsystems.com/support/support/wikid-forums13:13
card.freenode.netUsers on #wikid: WiKIDLogBot @nowen finalbeta proprietarysucks SEJeff_work remix_tj13:13
nowenproprietarysucks: do you have some WiKID questions?14:46
*** manonst (406a83fe@gateway/web/freenode/ip.64.106.131.254) has joined #wikid17:05
manonsthello, anyone not idling?17:05
nowenyep17:05
manonstyay :)17:05
nowen;)17:06
manonsti'm looking at wikid for an enterprise deployment and was curious about running multiple domains on a single server17:06
nowenok17:06
nowennot a problem.  but you either need multiple external ips or a dns solution17:07
manonstfrom what i could gleam from the (quite limited) documentation, domains are identified either via a server code, or a dns entry of the domain indentuy17:07
nowenyes17:07
manonstok, with regards to the dns solution - how does this work for mobile clients?17:07
manonstaren't they hardcoded to point to wikidsystems.net?17:07
nowenwe create a dns entry for you.17:07
nowenso, it has to run through our dns service17:08
manonstis there an API or programitc way to do this?17:08
nowenwhat do you mean?17:08
manonsti mean, if I have a bunch of domains I am setting up, can I make an API call to wikid to create the DNS entry?17:08
manonstor is it an email and wait kind of thing?17:08
nowencurrently the latter.17:09
manonstI see.17:09
nowenhow many domains will you need?17:09
manonstUnknown.  I work for a hosting company, each client opting for 2FA would need their own domain17:09
manonstinitially, like 3017:09
nowenhmm17:10
nowenwe could pre-populate dns for you too17:10
manonstyeah all of them would resolve to the same IP address17:10
manonstso if you could resolve a block of domain identifiers for us that would work17:10
nowenare you sure you need a separate domain for each one?17:10
nowenwe can do that17:11
manonstI am not sure.  I haven't played with it too much as of yet, just working out the logistics17:11
manonstbut I do like the idea of flexibility on a per client level17:11
nowensure17:11
manonstCan pre-registration work with mobile clients as well?17:12
nowennot at this time17:12
manonstjust taking some notes...17:12
manonstI assume its possible to group users and associate a radius attribute with that group such that it can be returned to a firewall for use as a tunnel group?17:14
nowenyes17:14
nowenvia the under-documented groups tab17:14
nowen;)17:14
manonstis there any reporting on those users/groups?17:14
manonsttypically a client administrator will need to revalidate access on a recurring basis (perhaps anually)17:15
nowenthere can be a ton of logging done.  I'm not sure about the reports specifically tagged via groups17:15
nowenso, you would want an admin to review group membership?17:15
nowena list of users in that group?17:15
manonstI would want a client admin to see a list of users in each group and the associate radius attribute (tunnel group)17:16
manonstfor their domain only17:16
nowenok17:16
manonstideally client's would be able to login and manage users under their domain only and have no other access17:16
manonsti'm not sure if this is possible17:16
nowenso, we have group functionality in the API.  we would just have to make sure that the admin can do that17:17
nowenif it requires extending that api that's easy17:17
nowenthe API already allows for multi-tenancy17:17
manonstexcellent17:17
nowenwe can develop an admin tool for you also17:18
manonsteventually I would like everything polished under our portal, but a one off admin tool which delievers the functionality we need would certainly suffice in the short term17:19
nowenwhat language is your portal written in?17:19
manonsttoday it's php/perl17:19
manonstbut we are moving (in the next 1-50 years ;) ) a completly new portal17:20
nowenwe have a php network client. it's not our best/fastest language, but we can do it17:20
nowenreally, though the network client api is designed to be distributed.17:20
manonstdistributed in what manner?17:21
nowenwell, just that the network clients need a cert to talk to the WiKID server, so they can be anywhere17:21
manonstok...another question17:25
manonstcan pre-registration be done on a per domain level?17:25
nowenit must be17:25
manonstok.  and can the pre-registration details contain the group as well?17:26
manonstsorry for some of these questions, I have't installed the product.  All of this is being driven by reading all of your docs and watching the video17:27
manonstI'm getting a server setup now to take it for a spin17:27
nowenhmm. that may need to be added.  you can register with a group and pre-reg, so it can be done17:27
nowenno problem17:27
*** proprietarysucks has quit (Quit: Lost terminal)17:27
manonstok, so it's not out of the box but easy enough to implement?17:28
nowenshouldn't be too hard17:28
manonstSo if we spin up a new client that knows all the users which need 2FA in advance and which server access they should have (via tunnel groups)17:29
manonstthen I want to get all those users into the system in one shot17:29
manonstAnd then to manage the solution going forward, I want each client to be able to create users based on registration codes, and potentially be able to tie backend auth on a per domain level17:30
nowenyes.  all you need to do is get them the pre-shared secret in some secure manner for pre-reg17:31
nowenthen each customer gets a network client interface - they can manage their own users17:31
manonstthis interface, does it need a dedicated IP address?17:32
noweneach client gets a domain and a network client.  the network client is associated with infrastructure or whatever17:32
manonstyeah the network client would likely be radius communicating to the firewall17:33
manonstwhat I mean is the web based interface - it's all a single web portal correct?  and not an instance per domain running a different IP or port?17:33
nowenthe requirement is that they have their own .p12 file from the server.  so, you can have it all in one page, but each one needs it's own session with the server17:36
nowencurrently ;)17:36
nowenthough for security, that's probably the best way17:36
manonstI'm not sure I've conveyed my question cleary.17:37
manonstThe interactive web portal which admins use to manage WiKID - does this interface support multi-tennancy?17:38
nowenyes17:38
nowenohh. ok17:39
nowenlet me clarify too17:39
nowenso, here's what we would recommend - 1 connection to the WiKID server.  Then each user's access is controlled by the web app17:41
nowenso it bob@customer1.com logs in, he can manage customer1.com users only17:41
nowens/it/if17:41
manonstOk and this management is via a custom web app, not via the built-in one?17:42
nowenyes.17:42
nowenthe WiKIDAdmin is not limited to single domains, but this one would be17:42
manonstOk, and you mention that you could build this for us -- out of the goodness of your heart / included with the commericial pricing, or charged via professional services/consulting?17:43
nowencharges via pro services.  The wauth api packages are all lgpl.  you can also do it yourself17:43
manonstOk fair enough.17:44
nowenwe work well with other developers17:44
nowenand we like feedback.17:45
nowenwe're working on a "cloud" offering like this.  pre-populating dns entries is a good idea for it17:45
manonstCloud offering would be even better17:46
nowenyou mean where we host it? or it's on amazon?17:47
manonstwe'll we can do hosting as well - but when stuff is made for 'cloud' it generally contains the feature sets needed for hosting companies17:48
nowenyes I see what you mean17:48
manonstIt would be nice if this custom webapp could query a web services interface to find all portal users under customer1, then the customer admin could assign those users to predefined groups.17:49
manonstThen those users could do self-registration using their portal password17:49
nowenok - so call your customer DB and get a user list17:50
nowenput those users into a group and create the pre-reg data17:50
manonstisn't pre-reg differnt than self-reg?17:50
manonsti thought i read something about an AD backed self-reg17:51
nowenself-reg can be done with anything.  their existing username and password from that same web services interface17:51
nowenoh - yes - sorru17:52
nowenI misread your last statement17:52
nowenyes - exactly self-ref17:52
nowenreg17:52
manonstso can self-reg work with mobile clients?17:52
nowenyes17:52
manonstwhat's the process?  they type in the server code which would use DNS to point to wikisystems.net, which resolves back to me17:53
nowenyes17:53
manonstthen they get a registration code, but how to they associate that with their username via self-reg?17:53
nowenthen they are prompted to set their pin17:53
nowenthey would login to the web-app or some portion there off with their existing creds17:54
nowenand enter the registration code17:54
manonstand can self-registration be combined with prepopulating users in groups?17:55
nowenso, all users registered are added to a group?17:55
nowenthat we can do now17:55
manonstWhat I mean to say is:  The client admin sets authorization in advance17:59
manonstSo they see a list of all users they manage and can set them in various groups - the groups allow 2FA and set the tunnel group accordingly18:00
manonstif the user is not in a group, they get no 2FA access18:00
nowenhmm18:00
manonstat this point users exist but don't have a token assigned to them18:00
manonstthen use self registration to associate the token to the existing user18:00
nowenlet me try to run through it18:01
manonstusing this setup, an admin to do all of the work in advance, and whenever the user gets around to registering the token it will immediately start working18:01
nowenthe client admin pulls a list of users from your web services.18:01
manonstcorrect18:01
nowenthey assign certain users to a group for 2fa18:02
manonstto one or more groups18:02
manonstdifferent groups grant differnet server access18:02
nowenok18:02
nowenthen the users have to self-register.  when they do, the process also puts them into their groups in WiKID which are associate with return attributes.18:03
nowenthen they have 2fa access and are in groups18:03
nowendoes that sound about right?18:03
manonstnot exactly what I was saying but it could work as well18:04
manonstI was expecting the assigning of users to groups initially to be groups in WiKID18:04
manonstand then the self registration would just associate the token to the existing user in the existing group18:04
nowenyes.  a bit different but I think putting some of the logic outside the WiKID server is more secure18:05
nowenand, to be clear, there isn't really a user in WiKID until the registration occurs18:05
manonstOk, I was under the impression the registration was a registration of a token, not necessarily a user18:06
nowenwell, yeah, it's a two-step process18:06
manonstbut given that contraint I can see why would need/want the users & groups to be externally maintained and then populated in WiKID during the registration process18:07
nowenpin is set and the account is created/username is registered, account is activated18:07
manonstso does this all sound feasible with the current API?18:07
nowenyes18:07
manonstk18:08
manonstbrb18:09
manonstso given this workflow, would the groups pre-exist in the WiKID with the radius attribs?18:32
manonstand then during the self-reg, the web app would query the portal DB to determine the user's group membership?18:33
nowenthat would make the most sense, if possible.18:33
nowenI am assuming that you have sold them a set of rights18:33
nowenso, we would set those up in WiKID.18:33
manonstyep that's what I think as well18:37
*** proprietarysucks (~nathanr@static-96-247-50-178.lsanca.fios.verizon.net) has joined #wikid19:07
proprietarysuckshi, did anyone get my question about a set up service?19:08
nowenproprietarysucks: no.  what was it?19:08
proprietarysucksdo you guys offer a set up service?19:09
proprietarysucksfor community edition?19:09
proprietarysucksgoogle sso 1 domain19:09
nowenwe don't do a lot of paid support/install stuff19:10
proprietarysucksgotcha19:10
proprietarysucksyou have a typo in your install script19:11
proprietarysucks[-f19:11
proprietarysucksinstead of [ -f19:11
proprietarysucksbreaks in sh, bash19:11
nowenoops.  which script is that?19:12
proprietarysucksthe very first one, the set up script19:14
proprietarysucksmay I also recommend adding iptables to dependencies, since wikid will crash and burn without it19:15
*** finalbeta_ (~finalbeta@ip-83-134-173-214.dsl.scarlet.be) has joined #wikid19:15
nowenwikidctl setup?19:15
nowenhmm19:15
*** finalbeta has quit (Ping timeout: 240 seconds)19:17
proprietarysucksgrep -lr '[-f' *19:22
proprietarysucksor rather19:23
proprietarysucksgrep -lr '\[-f' *19:23
proprietarysucksit's wikidserver_config.sh19:23
proprietarysucksI think19:24
proprietarysucksyeah there's at least one in there19:24
nowenok got that one19:25
proprietarysucksI find your scripts odd as well, they are in sh but call for bash as their shell19:26
proprietarysucksand have some places where " " would be recommended in sh using [ ]19:26
proprietarysucksfor example line 79 on that file19:26
proprietarysucksif [[ ! $PFILE ]; then    ->   if [[ ! "$PFILE" ]; then19:27
proprietarysucksessentially you're going to always want "$myvar" inside of [ ]19:27
nowenhmm. well, they have been around for a while have had a few people in them19:27
proprietarysucksunderstood19:28
nowensome of them me ;)19:28
proprietarysucksusually you would write something in SH for portability, which would only be possible if you're using SH as the shell19:28
proprietarysucksin this case you're using SH but calling BASH. also since you can be pretty damn sure any system that can run wikid can have bash, I'd recommend just rolling with bash19:29
proprietarysucksanyways I'm blabbering, too much coffee19:29
proprietarysucksthanks19:30
nowennp19:30
nowenthanks for the feedback!19:30
*** proprietarysucks has quit (Quit: Lost terminal)21:11
*** nowen has parted #wikid (None)23:02

Generated by irclog2html.py 2.11.0 by Marius Gedminas - find it at mg.pov.lt!