--- document: modulemd version: 2 data: name: idm stream: "DL1" summary: The Red Hat Enterprise Linux Identity Management system module description: >- RHEL IdM is an integrated solution to provide centrally managed Identity (users, hosts, services), Authentication (SSO, 2FA), and Authorization (host access control, SELinux user roles, services). The solution provides features for further integration with Linux based clients (SUDO, automount) and integration with Active Directory based infrastructures (Trusts). license: module: - MIT dependencies: - buildrequires: 389-ds: [1.4] httpd: [2.4] pki-core: [10.6] platform: [oc8] requires: 389-ds: [1.4] httpd: [2.4] pki-core: [10.6] platform: [oc8] references: community: https://www.freeipa.org/ documentation: https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/linux_domain_identity_authentication_and_policy_guide/index tracker: https://pagure.io/freeipa/issues profiles: adtrust: description: RHEL IdM Server Integration with Active Directory rpms: - ipa-healthcheck - ipa-healthcheck-core - ipa-server-trust-ad client: description: RHEL IdM Client rpms: - ipa-client common: description: A default profile for RHEL IdM client rpms: - ipa-client dns: description: RHEL IdM with integrated DNS server and integrated CA rpms: - ipa-healthcheck - ipa-healthcheck-core - ipa-server - ipa-server-dns server: description: Base RHEL IdM Server with integrated CA and no integrated DNS rpms: - ipa-healthcheck - ipa-healthcheck-core - ipa-server components: rpms: bind-dyndb-ldap: rationale: Driver for BIND to store DNS information in LDAP ref: 728d9569b1b6b2a3dcebea8e2129ed93515b51cf custodia: rationale: Remote access to secrets and credentials in IdM topology ref: b1ea3a7c0de42af9808f6d259b0ffeb3f9bb2574 buildorder: 2 ipa: rationale: Module API ref: 55ee5ee512a61f0e34488106b51745dc13cddd7a ipa-healthcheck: rationale: A tool to detect issues in IdM clusters ref: b4c828578634d4eaabc0b9660423d9f5829895a7 buildorder: 3 opendnssec: rationale: An implementation of DNSSEC support for IdM integrated DNS server ref: cf30f3e6a0791ea8c91dd336e1876f83972aafcc python-jwcrypto: rationale: JSON Web Cryptographic Tokens used by Custodia ref: 5f3d50736c2d246ad88b0a098363a3ea8f7f6213 buildorder: 1 python-kdcproxy: rationale: MS-KKDCP (kerberos proxy) WSGI module ref: a641b7c9b2096950c1a1eff72089c9ae6cdb0355 python-qrcode: rationale: QR code generator for IdM two-factor authentication ref: 7e409fc1186ff4e7f9e5bfcd6c291fe1636a44ef python-yubico: rationale: Support for Yubikey-based tokens for IdM two-factor authentication ref: 6f4fee9a9768b161ecd8bfec3ef185f64818c4cf buildorder: 2 pyusb: rationale: Python USB support to access USB tokens for IdM two-factor authentication ref: c6815003754f405f20cdc2d3529dd51ddf965ec2 buildorder: 1 slapi-nis: rationale: Compatibility plugin to serve legacy clients ref: 7439a70fa0ee910af12403d206168820f359d0f6 arches: [aarch64, ppc64le, s390x, x86_64] softhsm: rationale: Software version of a PKCS#11 Hardware Security Module ref: dae4a0930540a3d0ded6d7166113042e1a9816c5 ...