On 2/7/07, <b class="gmail_sendername">Alan DeKok</b> <<a href="mailto:aland@deployingradius.com">aland@deployingradius.com</a>> wrote:<div><span class="gmail_quote"></span><blockquote class="gmail_quote" style="border-left: 1px solid rgb(204, 204, 204); margin: 0pt 0pt 0pt 0.8ex; padding-left: 1ex;">
Nick Owen wrote:<br>><br>> I am looking for the best way to provision groups of users for temporary<br>> access across multiple servers. The users would be using ssh and sudo.<br>> They would be assigned to a group of servers, then removed after the job
<br>> was complete. There a hundreds of servers involved.<br><br> RADIUS may not be a good way to do this, because the users will still<br>need UID's, etc., which RADIUS doesn't supply.<br><br></blockquote></div>
I think we can put the UIDs into our auth server, which supports radius. I was hoping that the requests would come from the target server to the freeradius box, which would check to see if that user/group had current rights to that server, then proxy the auth request to our auth server to validate the one-time password.
<br clear="all"><br>-- <br>Nick Owen<br>WiKID Systems, Inc.<br>404.962.8983 (desk)<br>404.542.9453 (cell)<br><a href="http://www.wikidsystems.com">http://www.wikidsystems.com</a><br>At last, two-factor authentication, without the hassle factor
<br>Now open source: <a href="http://sourceforge.net/projects/wikid-twofactor/">http://sourceforge.net/projects/wikid-twofactor/</a>