document: modulemd version: 2 data: stream: DL1 summary: The Red Hat Enterprise Linux Identity Management system module description: RHEL IdM is an integrated solution to provide centrally managed Identity (users, hosts, services), Authentication (SSO, 2FA), and Authorization (host access control, SELinux user roles, services). The solution provides features for further integration with Linux based clients (SUDO, automount) and integration with Active Directory based infrastructures (Trusts). license: module: - MIT dependencies: - buildrequires: 389-ds: - "1.4" httpd: - "2.4" pki-core: - "10.6" platform: - el8 requires: 389-ds: - "1.4" httpd: - "2.4" pki-core: - "10.6" platform: - el8 references: community: https://www.freeipa.org/ documentation: https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/linux_domain_identity_authentication_and_policy_guide/index tracker: https://pagure.io/freeipa/issues profiles: adtrust: description: RHEL IdM Server Integration with Active Directory rpms: - ipa-healthcheck - ipa-healthcheck-core - ipa-server-trust-ad client: description: RHEL IdM Client rpms: - ipa-client common: description: A default profile for RHEL IdM client rpms: - ipa-client dns: description: RHEL IdM with integrated DNS server and integrated CA rpms: - ipa-healthcheck - ipa-healthcheck-core - ipa-server - ipa-server-dns server: description: Base RHEL IdM Server with integrated CA and no integrated DNS rpms: - ipa-healthcheck - ipa-healthcheck-core - ipa-server components: rpms: bind-dyndb-ldap: rationale: Driver for BIND to store DNS information in LDAP ref: c0441121114e9c4f630a8693075f8d6f847f3531 custodia: rationale: Remote access to secrets and credentials in IdM topology ref: 77c50a3ecfda381e33780e597dd1b995f12ed1b4 buildorder: 2 ipa: rationale: Module API ref: 99d225ab6d3ab179ede7815472a9a0ae4e5fada8 ipa-healthcheck: rationale: A tool to detect issues in IdM clusters ref: c412fcc643a8d63fee66f4ac87cb0f1ed6b9a672 buildorder: 3 opendnssec: rationale: An implementation of DNSSEC support for IdM integrated DNS server ref: 725621d3982939bf6c606af33be0ab40e13fb154 python-jwcrypto: rationale: JSON Web Cryptographic Tokens used by Custodia ref: 224b7da68a1e25c3c38334cc9060d7888abbdf13 buildorder: 1 python-kdcproxy: rationale: MS-KKDCP (kerberos proxy) WSGI module ref: c77831ac71428f54504f1942a167c0274dc4ac21 python-qrcode: rationale: QR code generator for IdM two-factor authentication ref: a3e140b081ee2f078c744bfecc1bebadfe308c64 python-yubico: rationale: Support for Yubikey-based tokens for IdM two-factor authentication ref: b9682cae9abd46d1c382c224740de470e0ab8743 buildorder: 2 pyusb: rationale: Python USB support to access USB tokens for IdM two-factor authentication ref: cbe788209da3dc127e06669fe8528685ba1da20c buildorder: 1 slapi-nis: rationale: Compatibility plugin to serve legacy clients ref: 5fb4711559b4514ebc1ed88c9dfa496dbfebcb4e arches: - aarch64 - ppc64le - s390x - x86_64 softhsm: rationale: Software version of a PKCS#11 Hardware Security Module ref: 4c332559cf38930262d4f1a588b34d3d1a8eb5f6