document: modulemd version: 2 data: stream: DL1 summary: The Red Hat Enterprise Linux Identity Management system module description: RHEL IdM is an integrated solution to provide centrally managed Identity (users, hosts, services), Authentication (SSO, 2FA), and Authorization (host access control, SELinux user roles, services). The solution provides features for further integration with Linux based clients (SUDO, automount) and integration with Active Directory based infrastructures (Trusts). license: module: - MIT dependencies: - buildrequires: 389-ds: - "1.4" httpd: - "2.4" pki-core: - "10.6" platform: - el8 requires: 389-ds: - "1.4" httpd: - "2.4" pki-core: - "10.6" platform: - el8 references: community: https://www.freeipa.org/ documentation: https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/linux_domain_identity_authentication_and_policy_guide/index tracker: https://pagure.io/freeipa/issues profiles: adtrust: description: RHEL IdM Server Integration with Active Directory rpms: - ipa-healthcheck - ipa-healthcheck-core - ipa-server-trust-ad client: description: RHEL IdM Client rpms: - ipa-client common: description: A default profile for RHEL IdM client rpms: - ipa-client dns: description: RHEL IdM with integrated DNS server and integrated CA rpms: - ipa-healthcheck - ipa-healthcheck-core - ipa-server - ipa-server-dns server: description: Base RHEL IdM Server with integrated CA and no integrated DNS rpms: - ipa-healthcheck - ipa-healthcheck-core - ipa-server components: rpms: bind-dyndb-ldap: rationale: Driver for BIND to store DNS information in LDAP ref: 715c46d30551e9c00da2b6f7038497f9d33abf0a custodia: rationale: Remote access to secrets and credentials in IdM topology ref: 77c50a3ecfda381e33780e597dd1b995f12ed1b4 buildorder: 2 ipa: rationale: Module API ref: 0cdfdb420b304a8b3af0bfe7c3d8cde3768ca99a ipa-healthcheck: rationale: A tool to detect issues in IdM clusters ref: 7d96088ca440ac419af99f6448467d2cfdc38e90 buildorder: 3 opendnssec: rationale: An implementation of DNSSEC support for IdM integrated DNS server ref: 725621d3982939bf6c606af33be0ab40e13fb154 python-jwcrypto: rationale: JSON Web Cryptographic Tokens used by Custodia ref: 8fd081baa0e587a17e52005ef5833eb20b70bd24 buildorder: 1 python-kdcproxy: rationale: MS-KKDCP (kerberos proxy) WSGI module ref: c77831ac71428f54504f1942a167c0274dc4ac21 python-qrcode: rationale: QR code generator for IdM two-factor authentication ref: a3e140b081ee2f078c744bfecc1bebadfe308c64 python-yubico: rationale: Support for Yubikey-based tokens for IdM two-factor authentication ref: b9682cae9abd46d1c382c224740de470e0ab8743 buildorder: 2 pyusb: rationale: Python USB support to access USB tokens for IdM two-factor authentication ref: cbe788209da3dc127e06669fe8528685ba1da20c buildorder: 1 slapi-nis: rationale: Compatibility plugin to serve legacy clients ref: 60bb41d9ca323a8379d5558c0630d49d5d632edf arches: - aarch64 - ppc64le - s390x - x86_64 softhsm: rationale: Software version of a PKCS#11 Hardware Security Module ref: 4c332559cf38930262d4f1a588b34d3d1a8eb5f6