document: modulemd version: 2 data: stream: DL1 summary: The Red Hat Enterprise Linux Identity Management system module description: RHEL IdM is an integrated solution to provide centrally managed Identity (users, hosts, services), Authentication (SSO, 2FA), and Authorization (host access control, SELinux user roles, services). The solution provides features for further integration with Linux based clients (SUDO, automount) and integration with Active Directory based infrastructures (Trusts). license: module: - MIT dependencies: - buildrequires: 389-ds: - "1.4" httpd: - "2.4" pki-core: - "10.6" platform: - el8 requires: 389-ds: - "1.4" httpd: - "2.4" pki-core: - "10.6" platform: - el8 references: community: https://www.freeipa.org/ documentation: https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/linux_domain_identity_authentication_and_policy_guide/index tracker: https://pagure.io/freeipa/issues profiles: adtrust: description: RHEL IdM Server Integration with Active Directory rpms: - ipa-healthcheck - ipa-healthcheck-core - ipa-server-trust-ad client: description: RHEL IdM Client rpms: - ipa-client common: description: A default profile for RHEL IdM client rpms: - ipa-client dns: description: RHEL IdM with integrated DNS server and integrated CA rpms: - ipa-healthcheck - ipa-healthcheck-core - ipa-server - ipa-server-dns server: description: Base RHEL IdM Server with integrated CA and no integrated DNS rpms: - ipa-healthcheck - ipa-healthcheck-core - ipa-server components: rpms: bind-dyndb-ldap: rationale: Driver for BIND to store DNS information in LDAP ref: 2ae1532f0d4a0e6d4b4a70a2bc1c56e51b65f8e6 custodia: rationale: Remote access to secrets and credentials in IdM topology ref: 77c50a3ecfda381e33780e597dd1b995f12ed1b4 buildorder: 2 ipa: rationale: Module API ref: 9d28f5a8be6ae0abf0b9f9c122085de73317e526 ipa-healthcheck: rationale: A tool to detect issues in IdM clusters ref: 7d96088ca440ac419af99f6448467d2cfdc38e90 buildorder: 3 opendnssec: rationale: An implementation of DNSSEC support for IdM integrated DNS server ref: 725621d3982939bf6c606af33be0ab40e13fb154 python-jwcrypto: rationale: JSON Web Cryptographic Tokens used by Custodia ref: 0b70b5b3c7bee06b9fb2715dd6f7ef2f4695b6ee buildorder: 1 python-kdcproxy: rationale: MS-KKDCP (kerberos proxy) WSGI module ref: c77831ac71428f54504f1942a167c0274dc4ac21 python-qrcode: rationale: QR code generator for IdM two-factor authentication ref: a3e140b081ee2f078c744bfecc1bebadfe308c64 python-yubico: rationale: Support for Yubikey-based tokens for IdM two-factor authentication ref: b9682cae9abd46d1c382c224740de470e0ab8743 buildorder: 2 pyusb: rationale: Python USB support to access USB tokens for IdM two-factor authentication ref: cbe788209da3dc127e06669fe8528685ba1da20c buildorder: 1 slapi-nis: rationale: Compatibility plugin to serve legacy clients ref: 5fb4711559b4514ebc1ed88c9dfa496dbfebcb4e arches: - aarch64 - ppc64le - s390x - x86_64 softhsm: rationale: Software version of a PKCS#11 Hardware Security Module ref: 4c332559cf38930262d4f1a588b34d3d1a8eb5f6