Skip to content

[v13] Allow for Windows PKI operations to target a different domain#31440

Closed
zmb3 wants to merge 4 commits intobranch/v13from
zmb3/separate-pki-domain
Closed

[v13] Allow for Windows PKI operations to target a different domain#31440
zmb3 wants to merge 4 commits intobranch/v13from
zmb3/separate-pki-domain

Conversation

@zmb3
Copy link
Copy Markdown
Collaborator

@zmb3 zmb3 commented Sep 5, 2023

Today, our AD support largely assumes there is a single active directory domain. The certificates that we generate are for users in this domain, the computers we discover via LDAP come from this domain, and the PKI set up we perform targets this domain.

In more complicated AD configurations, PKI is often configured in a root domain, while users, servers, and discovery should be done against a child domain.

The new pki_domain configuration field will allow you to override the default domain specified in the ldap section with a root domain that is used for configuring the NTAuth store and publishing the CRL. Teleport continues to do discovery and issue certificates for the domain specified in the ldap section of the config.

Updates #20233

Note: targeting v13 to do a dev build

<string>APPL</string>
<key>CFBundleShortVersionString</key>
<string>13.3.8</string>
<string>1.0</string>
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Not sure why this changed to 1.0 or if it matters (same for the other Info.plist file)

Comment thread Makefile Outdated
# Pre-releases: "1.0.0-alpha.1", "1.0.0-beta.2", "1.0.0-rc.3"
# Master/dev branch: "1.0.0-dev"
VERSION=13.3.8
VERSION=13.3.9-dev.pkidomain.1
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Technically we're "add[ing] functionality in a backward compatible manner" which would be a MINOR change, though feel free to ignore if it just complicates things.

Comment thread lib/config/fileconf.go
Comment on lines +362 to +364
if s.cfg.PKIDomain != "" {
s.cfg.Log.Infof("Windows PKI will be performed against %v", s.cfg.PKIDomain)
caLDAPconfig.Domain = s.cfg.PKIDomain
}
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
if s.cfg.PKIDomain != "" {
s.cfg.Log.Infof("Windows PKI will be performed against %v", s.cfg.PKIDomain)
caLDAPconfig.Domain = s.cfg.PKIDomain
}
if s.cfg.PKIDomain != "" {
caLDAPconfig.Domain = s.cfg.PKIDomain
}
s.cfg.Log.Infof("Windows PKI will be performed against %v", caLDAPconfig.Domain)

@zmb3 zmb3 force-pushed the zmb3/separate-pki-domain branch 2 times, most recently from 0dae389 to dd9e159 Compare September 8, 2023 17:37
zmb3 added 2 commits September 8, 2023 11:50
Today, our AD support largely assumes there is a single active directory
domain. The certificates that we generate are for users in this domain,
the computers we discover via LDAP come from this domain, and the PKI
set up we perform targets this domain.

In more complicated AD configurations, PKI is often configured in a root
domain, while users, servers, and discovery should be done against a
child domain.

The new pki_domain configuration field will allow you to override the
default domain specified in the ldap section with a root domain that is
used for configuring the NTAuth store and publishing the CRL. Teleport
continues to do discovery and issue certificates for the domain
specified in the ldap section of the config.
@zmb3 zmb3 force-pushed the zmb3/separate-pki-domain branch from 2e25110 to 1da41b8 Compare September 8, 2023 17:50
@zmb3
Copy link
Copy Markdown
Collaborator Author

zmb3 commented Oct 10, 2023

Opened #33218 against master now that we've proven this functionality out.

@zmb3 zmb3 closed this Oct 10, 2023
@zmb3 zmb3 deleted the zmb3/separate-pki-domain branch October 10, 2023 15:54
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants