<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>CentOS &#8211; privacyID3A</title>
	<atom:link href="https://www.privacyidea.org/tag/centos/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.privacyidea.org</link>
	<description>flexible, Open Source Multi Factor Authentication (2FA)</description>
	<lastBuildDate>Mon, 02 Dec 2019 13:45:46 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.privacyidea.org/wp-content/uploads/2016/06/cropped-only-logo-white-background-32x32.png</url>
	<title>CentOS &#8211; privacyID3A</title>
	<link>https://www.privacyidea.org</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Two-Factor-Authentication with OTP on CentOS 7</title>
		<link>https://www.privacyidea.org/two-factor-authentication-with-otp-on-centos-7/</link>
					<comments>https://www.privacyidea.org/two-factor-authentication-with-otp-on-centos-7/#comments</comments>
		
		<dc:creator><![CDATA[Cornelius Kölbel]]></dc:creator>
		<pubDate>Mon, 12 Oct 2015 19:14:47 +0000</pubDate>
				<category><![CDATA[CentOS]]></category>
		<category><![CDATA[documentation]]></category>
		<category><![CDATA[Howto]]></category>
		<category><![CDATA[RADIUS]]></category>
		<category><![CDATA[Authentication]]></category>
		<category><![CDATA[FreeRADIUS]]></category>
		<guid isPermaLink="false">https://www.privacyidea.org/?p=757</guid>

					<description><![CDATA[Attention: This HowTo is outdated! There is an improved HowTo included in the privacyIDEA documentation This Howto describes the setup of privacyIDEA on CentOS 7 including a FreeRADIUS 3 configuration. This Howto is provided by Patrick Hirschbühl. Thanks a lot for this contribution! privacyIDEA + MySQL on CentOS 7 Minimal Installation of CentOS 7 yum [&#8230;]]]></description>
										<content:encoded><![CDATA[<p style="background-color: #ffffe0; border-radius: 10px; padding: 20px; margin: 20px; border: 1px solid black;"><strong>Attention:</strong> This HowTo is outdated! There is an improved HowTo included in the <a href="https://privacyidea.readthedocs.io/en/latest/installation/centos.html">privacyIDEA documentation</a></p>
<p>This Howto describes the setup of privacyIDEA on CentOS 7 including a FreeRADIUS 3 configuration.</p>
<p>This Howto is provided by Patrick Hirschbühl. Thanks a lot for this contribution!</p>
<h1>privacyIDEA + MySQL on CentOS 7</h1>
<h2>Minimal Installation of CentOS 7</h2>
<pre>yum -y install net-tools
yum -y install wget NetworkManager-tui</pre>
<p>Example for /etc/hosts</p>
<pre> 192.168.1.2 privacyideaserver privacyideaserver.domain</pre>
<p>/etc/selinux/config</p>
<pre>SELINUX=disabled</pre>
<p>Install necessary software:</p>
<pre>rpm --import /etc/pki/rpm-gpg/RPM-GPG-KEY*
yum -y install epel-release
yum -y install yum-priorities</pre>
<p>Edit /etc/yum.repos.d/epel.repo</p>
<pre>[epel]
 name=Extra Packages for Enterprise Linux 7 - $basearch
 #baseurl=http://download.fedoraproject.org/pub/epel/7/$basearch
 mirrorlist=https://mirrors.fedoraproject.org/metalink?repo=epel-7&amp;arch=$basearch
 failovermethod=priority
 priority=10
 enabled=1
 gpgcheck=1
 gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-EPEL-7</pre>
<p>Install further software:</p>
<pre>yum update
yum -y groupinstall 'Development Tools'
yum -y install open-vm-tools net-tools; reboot
yum install ntp -y</pre>
<p>Optional Tools:</p>
<pre>yum install links nmap rkhunter</pre>
<h2>privacyIDEA</h2>
<pre>yum install mariadb-server httpd mod_wsgi mod_ssl python-devel gcc mariadb-devel libjpeg-devel \
freeradius freeradius-utils freeradius-perl openldap-devel perl-libwww-perl perl-Config-IniFiles \
perl-Try-Tiny perl-Data-Dump perl-JSON perl-LWP-Protocol-http* python-virtualenv libffi-devel \
freetype-devel libpng-devel postgresql-devel

 systemctl enable radiusd.service
 systemctl start radiusd
 systemctl enable mariadb.service
 systemctl start mariadb
 systemctl enable httpd.service
 systemctl start httpd</pre>
<h3>Create Database</h3>
<pre>mysql_secure_installation
echo 'create database privacyidea;' | mysql -u root -p
echo 'grant all privileges on privacyidea.* to "privacyidea"@"localhost" identified by "unknown";' \
   | mysql -u root -p</pre>
<h3>Install privacyIDEA</h3>
<pre>virtualenv /opt/privacyIDEA
cd /opt/privacyIDEA
source bin/activate</pre>
<p>Install further requirements for building packages with pip:</p>
<pre>yum -y install libxslt-devel libxml2-devel</pre>
<p>Download requirements.txt from <a href="https://github.com/privacyidea/privacyidea/blob/master/requirements.txt">https://github.com/privacyidea/privacyidea/blob/master/requirements.txt</a></p>
<pre>pip install -r requirements.txt
pip install MySQL-python
pip install privacyidea
mkdir /etc/privacyidea
mkdir /var/log/privacyidea</pre>
<p>Edit /etc/privacyidea/pi.cfg:</p>
<pre># The realm, where users are allowed to login as administrators
SUPERUSER_REALM = ['super', 'administrators']
# Your database
SQLALCHEMY_DATABASE_URI = 'mysql://privacyidea:unknown@localhost/privacyidea'
# This is used to encrypt the auth_token
SECRET_KEY = 't0p s3cr3t'
# This is used to encrypt the admin passwords
PI_PEPPER = "Never know..."
# This is used to encrypt the token data and token passwords
PI_ENCFILE = '/etc/privacyidea/enckey'
# This is used to sign the audit log
PI_AUDIT_KEY_PRIVATE = '/etc/privacyidea/private.pem'
PI_AUDIT_KEY_PUBLIC = '/etc/privacyidea/public.pem'
PI_LOGFILE = '/var/log/privacyidea/privacyidea.log'
# PI_LOGLEVEL = 20
# PI_INIT_CHECK_HOOK = 'your.module.function'</pre>
<p>Run further commands:</p>
<pre>pi-manage.py create_enckey
pi-manage.py create_audit_keys
pi-manage.py createdb
pi-manage.py admin add admin -e admin@localhost</pre>
<h3>Add firewall rules</h3>
<pre>firewall-cmd --permanent --zone=public --add-service=http --add-service=https --add-service=radius
firewall-cmd --reload
firewall-cmd --zone=public --list-all</pre>
<h3>Test</h3>
<pre>systemctl stop httpd
pi-manage.py runserver -h Hostname-or-IP -p 80
systemctl start httpd</pre>
<h3>Create user</h3>
<pre>useradd -r -m privacyidea -d /opt/privacyIDEA</pre>
<h3>Fix rights privacyIDEA</h3>
<pre>chown -R privacyidea:root /etc/privacyidea
/opt/privacyIDEA/bin/privacyidea-fix-access-rights -f /etc/privacyidea/pi.cfg -u privacyidea
chmod 400 /etc/privacyidea/enckey
chmod 400 /etc/privacyidea/*.pem
chown -R privacyidea:root /var/log/privacyidea</pre>
<h3>privacyIDEA Apache config</h3>
<pre>mkdir -p /var/run/wsgi
cp /opt/privacyIDEA/etc/privacyidea/privacyideaapp.wsgi /etc/privacyidea
mv /etc/httpd/conf.d/welcome.conf /etc/httpd/conf.d/welcome.conf.disabled</pre>
<p>Edit /etc/httpd/conf/httpd.conf:</p>
<p>ServerName Hostname-or-IP:80</p>
<p>Edit /etc/httpd/conf.d/privacyidea.conf:</p>
<pre>TraceEnable off
ServerSignature Off
ServerTokens Prod
WSGIPythonHome /opt/privacyIDEA
WSGISocketPrefix /var/run/wsgi

&lt;VirtualHost _default_:80&gt;
  ServerAdmin webmaster@localhost
  ServerName localhost
  RewriteEngine On
  RewriteCond %{HTTPS} !=On
  RewriteRule (.*) https://%{HTTP_HOST}%{REQUEST_URI} [R=301,L]
&lt;/VirtualHost&gt;

&lt;VirtualHost _default_:443&gt;
  ServerAdmin webmaster@localhost
  ServerName localhost
  DocumentRoot /var/www
  &lt;Directory /&gt;
    Require all granted
    Options FollowSymLinks
    AllowOverride None
  &lt;/Directory&gt;
  # The daemon is running as user 'privacyidea'
  # This user should have access to the encKey database encryption file
  WSGIDaemonProcess privacyidea python-path=/etc/privacyidea:/opt/privacyIDEA/lib/python2.7/site-packages processes=1 threads=15 display-name=%{GROUP} user=privacyidea
  WSGIProcessGroup privacyidea
  WSGIPassAuthorization On
  WSGIScriptAlias / /etc/privacyidea/privacyideaapp.wsgi
  SSLEngine On
  SSLProtocol All -SSLv2 -SSLv3
  SSLHonorCipherOrder On
  SSLCipherSuite EECDH+AES256:DHE+AES256:EECDH+AES:EDH+AES:-SHA1:EECDH+RC4:EDH+RC4:RC4-SHA:AES256-SHA:!aNULL:!eNULL:!EXP:!LOW:!MD5
  SSLCertificateFile /etc/pki/tls/certs/privacyideaserver.pem
  SSLCertificateKeyFile /etc/pki/tls/private/privacyideaserver.key
&lt;/VirtualHost&gt;</pre>
<p>Enable Apache config:</p>
<pre>/opt/privacyIDEA/bin/privacyidea-create-certificate -f /etc/httpd/conf.d/privacyidea.conf
apachectl configtest
systemctl restart httpd</pre>
<h2>Config Freeradius 3 for privacyIDEA</h2>
<pre>cp /opt/privacyIDEA/lib64/privacyidea/authmodules/FreeRADIUS/privacyidea_radius.pm \
  /etc/raddb/mods-config/perl/</pre>
<p>Edit /etc/raddb/mods-available/perl:</p>
<pre>perl {
 filename = ${modconfdir}/${.:instance}/privacyidea_radius.pm
}</pre>
<pre>ln -s /etc/raddb/mods-available/perl /etc/raddb/mods-enabled/</pre>
<p>Edit /etc/raddb/clients.conf:</p>
<pre>client Radius-Client {
  ipaddr = 192.168.1.1/32
  secret = shared_secret_key
  require_message_authenticator = no
  nas_type = other
}</pre>
<p>Edit /etc/raddb/sites-available/privacyidea:</p>
<pre>server default {
 listen {
   type = auth
   ipaddr = *
   port = 0
   limit {
      max_connections = 16
      lifetime = 0
      idle_timeout = 30
   }
 }
 listen {
   ipaddr = *
   port = 0
   type = acct
   limit {
   }
 }

authorize {
   preprocess
   digest
   suffix
   ntdomain
   files
   expiration
   logintime
   pap
   update control {
      Auth-Type := Perl
   }
}

authenticate {
   Auth-Type Perl {
     perl
   }
   digest
}

preacct {
   suffix
   files
}

accounting {
   detail
}

session {
}
post-auth {
}
pre-proxy {
}
post-proxy {
}
}</pre>
<pre>ln -s /etc/raddb/sites-available/privacyidea /etc/raddb/sites-enabled/
rm /etc/raddb/sites-enabled/default
rm /etc/raddb/sites-enabled/inner-tunnel</pre>
<p>Edit /etc/privacyidea/rlm_perl.ini:</p>
<pre>[Default]
URL = https://127.0.0.1/validate/check
#REALM = someRealm
#RESCONF = someResolver
SSL_CHECK = false
#DEBUG = true</pre>
<p>Edit /etc/raddb/mods-config/perl/privacyidea_radius.pm</p>
<pre>our $CONFIG_FILE = “/etc/privacyidea/rlm_perl.ini”;
cp /opt/privacyIDEA/etc/privacyidea/dictionary /etc/raddb/</pre>
<h3>Test Freeradius</h3>
<pre>systemctl stop radiusd
radiusd -X
echo "User-Name=user, User-Password=password" | radclient -sx localhost auth testing123
systemctl restart radiusd</pre>
<h3>Fix rights privacyIDEA and Freeradius</h3>
<pre>chown -R privacyidea:root /etc/privacyidea
chgrp -R radiusd /etc/raddb
cd /etc/raddb
ll -Z
restorecon /etc/raddb/*</pre>
<p>reboot <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f642.png" alt="🙂" class="wp-smiley" style="height: 1em; max-height: 1em;" /></p>
<h3>Change Password Admin User</h3>
<pre>cd /opt/privacyIDEA
source bin/activate
pi-manage.py admin change -p admin</pre>
<h3>Update privacyIDEA</h3>
<pre>cd /opt/privacyIDEA
source bin/activate
pip install --upgrade cffi
pip install --upgrade bcrypt
pip install --upgrade privacyidea</pre>
]]></content:encoded>
					
					<wfw:commentRss>https://www.privacyidea.org/two-factor-authentication-with-otp-on-centos-7/feed/</wfw:commentRss>
			<slash:comments>4</slash:comments>
		
		
			</item>
		<item>
		<title>2FA with FreeRADIUS on CentOS</title>
		<link>https://www.privacyidea.org/2fa-with-freeradius-on-centos/</link>
					<comments>https://www.privacyidea.org/2fa-with-freeradius-on-centos/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Fri, 27 Jun 2014 11:19:08 +0000</pubDate>
				<category><![CDATA[CentOS]]></category>
		<category><![CDATA[documentation]]></category>
		<category><![CDATA[Howto]]></category>
		<category><![CDATA[RADIUS]]></category>
		<category><![CDATA[FreeRADIUS]]></category>
		<category><![CDATA[Installation]]></category>
		<guid isPermaLink="false">https://www.privacyidea.org/?p=204</guid>

					<description><![CDATA[A new howto is available at howtoforge. It shows how you can setup a privacyIDEA system on CentOS 6.5 in conjunction with the FreeRADIUS. Thus being able to have one central authentication system and connect many applications to this system via the RADIUS protocol.]]></description>
										<content:encoded><![CDATA[<p>A new howto is available at <a href="http://www.howtoforge.com/two-factor-authentication-with-otp-using-privacyidea-and-freeradius-on-centos" target="_blank">howtoforge</a>.</p>
<p>It shows how you can setup a privacyIDEA system on CentOS 6.5 in conjunction with the FreeRADIUS.</p>
<p>Thus being able to have one central authentication system and connect many applications to this system via the RADIUS protocol.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.privacyidea.org/2fa-with-freeradius-on-centos/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
