Accounts and Groups are the primary reason for Kanidm to exist. Kanidm is optimised as a repository for these data. As a result, they have many concepts and important details to understand.
Kanidm ships with a number of default accounts and groups. This is to give you the best out of box experience possible, as well as supplying best practice examples related to modern IDM systems.
The system admin account (the account you recovered in the setup) has limited privileges - only to manage high-privilege accounts and services. This is to help separate system administration from identity administration actions. An idm_admin is also provided that is only for management of accounts and groups.
Both admin and idm_admin should NOT be used for daily activities - they exist for initial system configuration, and for disaster recovery scenarios. You should delegate permissions as required to named user accounts instead.
The majority of the provided content is privilege groups that provide rights over Kanidm administrative actions. These include groups for account management, person management (personal and sensitive data), group management, and more.
By default the idm_admin has no password, and can not be accessed. You should recover it with the admin (system admin) account. We recommend the use of "reset_credential" as it provides a high strength, random, machine only password.
kanidm account credential reset_credential --name admin idm_admin Generated password for idm_admin: tqoReZfz....
We can now use the idm_admin to create initial groups and accounts.
kanidm group create demo_group --name idm_admin kanidm account create demo_user "Demonstration User" --name idm_admin kanidm group add_members demo_group demo_user --name idm_admin kanidm group list_members demo_group --name idm_admin kanidm account get demo_user --name idm_admin
You can also use anonymous to view users and groups - note that you won't see as many fields due to the different anonymous access profile limits!
kanidm account get demo_user --name anonymous
You should take some time to inspect the default groups which are related to default permissions. These can be viewed with:
kanidm group list kanidm group get <name>
Members of the
idm_account_manage_priv group have the rights to manage other users
accounts security and login aspects. This includes resetting account credentials.
We can perform a password reset on the demo_user for example as idm_admin, who is a default member of this group.
kanidm account credential set_password demo_user --name idm_admin kanidm self whoami --name demo_user
Kanidm supports groups being members of groups, allowing nested groups. These nesting relationships are shown through the "memberof" attribute on groups and accounts.
Kanidm makes all group-membership determinations by inspecting an entries "memberof" attribute.
An example can be easily shown with:
kanidm group create group_1 --name idm_admin kanidm group create group_2 --name idm_admin kanidm account create nest_example "Nesting Account Example" --name idm_admin kanidm group add_members group_1 group_2 --name idm_admin kanidm group add_members group2 nest_example --name idm_admin kanidm account get nest_example --name anonymous
Kanidm supports accounts that are only able to be authenticated between specific datetime windows. This takes the form of a "valid from" attribute that defines the earliest start date where authentication can succeed, and an expiry date where the account will no longer allow authentication.
This can be displayed with:
kanidm account validity show demo_user --name idm_admin valid after: 2020-09-25T21:22:04+10:00 expire: 2020-09-25T01:22:04+10:00
These datetimes are stored in the server as UTC, but presented according to your local system time to aid correct understanding of when the events will occur.
To set the values, an account with account management permission is required (for example, idm_admin). Again, these values will correctly translated from the entered local timezone to UTC.
# Set the earliest time the account can start authenticating kanidm account validity begin_from demo_user '2020-09-25T11:22:04+00:00' --name idm_admin # Set the expiry or end date of the account kanidm account validity expire_at demo_user '2020-09-25T11:22:04+00:00' --name idm_admin
To unset or remove these values the following can be used:
kanidm account validity begin_from demo_user any|clear --name idm_admin kanidm account validity expire_at demo_user never|clear --name idm_admin
To "lock" an account, you can set the expire_at value to the past or unix epoch. Even in the situation where the "valid from" is after the expire_at, the expire_at will be respected.
kanidm account validity expire_at demo_user 1970-01-01T00:00:00+00:00 --name idm_admin
These validity settings impact all authentication functions of the account (kanidm, ldap, radius).
As a security mechanism there is a distinction between "accounts" and "high permission accounts". This is to help prevent elevation attacks, where say a member of a service desk could attempt to reset the password of idm_admin or admin, or even a member of HR or System Admin teams to move laterally.
Generally, membership of a "privilege" group that ships with Kanidm, such as:
- many more ...
Indirectly grants you membership to "idm_high_privilege". If you are a member of this group, the standard "account" and "people" rights groups are NOT able to alter, read or manage these accounts. To manage these accounts higher rights are required, such as those held by the admin account are required.
Further, groups that are considered "idm_high_privilege" can NOT be managed by the standard "idm_group_manage_priv" group.
Management of high privilege accounts and groups is granted through the the "hp" variants of all privileges. A non-conclusive list:
Membership of any of these groups should be considered to be equivalent to system administration rights in the directory, and by extension, over all network resources that trust Kanidm.
All groups that are flagged as "idm_high_privilege" should be audited and monitored to ensure that they are not altered.