IDP¶
Purpose¶
This system provides the CAcert OAuth2/OpenID Connect identity provider and will later provide a service for client registration.
Application Links¶
Todo
implement client registration in IDP
Administration¶
System Administration¶
Primary: Jan Dittberner
Application Administration¶
Application |
Administrator(s) |
---|---|
IDP |
Contact¶
Additional People¶
No additional people have sudo access on that machine.
Basics¶
Physical Location¶
This system is located in an LXC container on physical machine Infra03.
Logical Location¶
- IP Internet:
- IP Intranet:
- IP Internal:
- IPv6:
- MAC address:
00:ff:8f:af:da:e1
(eth0)
See also
See Network
Monitoring¶
- internal checks:
- external checks:
DNS¶
Name |
Type |
Content |
---|---|---|
idp.cacert.org |
IN A |
213.154.225.249 |
idp.cacert.org |
IN AAAA |
2001:7b8:616:162:3::17 |
idp.infra.cacert.org |
IN A |
10.0.3.17 |
See also
Operating System¶
Debian GNU/Linux 12 Bookworm
Services¶
Listening services¶
Port |
Service |
Origin |
Purpose |
---|---|---|---|
22/tcp |
ssh |
ANY |
admin console access |
25/tcp |
smtp |
local |
mail delivery to local MTA |
80/tcp |
http |
ANY |
redirect to https |
443/tcp |
https |
ANY |
https for cacert-idp |
5665/tcp |
icinga2 |
monitor |
remote monitoring service |
Running services¶
Service |
Usage |
Start mechanism |
---|---|---|
cacert-idp |
OpenID Connect IDP |
systemd unit |
cron |
job scheduler |
systemd unit |
dbus-daemon |
System message bus |
systemd unit |
Exim |
SMTP server for local mail submission |
systemd unit |
icinga2 |
Icinga2 monitoring agent |
systemd unit |
nginx |
Reverse proxy for Hydra |
systemd unit |
openssh server |
ssh daemon for remote administration |
systemd unit |
Puppet agent |
configuration management agent |
systemd unit |
rsyslog |
syslog daemon |
systemd unit |
Connected Systems¶
Outbound network connections¶
Security¶
SSH host keys¶
Algorithm |
Fingerprints |
---|---|
RSA |
|
DSA |
- |
ECDSA |
|
ED25519 |
|
See also
Non-distribution packages and modifications¶
The main service on the system is the CAcert OpenID Connect Identity provider application. The code for the application is maintained at https://code.cacert.org/cacert/oidc-idp. The package is installed from an internal Debian repository on Webstatic.
Risk assessments on critical packages¶
Critical Configuration items¶
Keys and X.509 certificates¶
IDP configuration¶
The IDP application configuration is managed via Puppet.
Client registration configuration¶
Tasks¶
Changes¶
Planned¶
Todo
install client registration application
Additional documentation¶
See also