infrastructure/machines/vault01/k-radius/default.nix
Ryan Lahfa 3ca3ff8939
All checks were successful
build configuration / build_web02 (push) Successful in 1m43s
build configuration / build_storage01 (push) Successful in 1m45s
build configuration / build_compute01 (push) Successful in 1m47s
build configuration / build_vault01 (push) Successful in 1m56s
build configuration / build_web01 (push) Successful in 2m12s
lint / check (push) Successful in 41s
build configuration / build_bridge01 (push) Successful in 1m25s
build configuration / build_geo01 (push) Successful in 1m27s
build configuration / build_geo02 (push) Successful in 1m28s
build configuration / build_rescue01 (push) Successful in 1m31s
build configuration / push_to_cache_storage01 (push) Successful in 1m43s
build configuration / push_to_cache_web02 (push) Successful in 1m38s
build configuration / push_to_cache_bridge01 (push) Successful in 1m33s
build configuration / push_to_cache_geo01 (push) Successful in 1m41s
build configuration / push_to_cache_compute01 (push) Successful in 2m1s
build configuration / push_to_cache_rescue01 (push) Successful in 1m35s
build configuration / push_to_cache_geo02 (push) Successful in 1m26s
build configuration / push_to_cache_web01 (push) Successful in 2m34s
feat(radius): add AP secret for RADIUS auth requests
Signed-off-by: Ryan Lahfa <ryan@dgnum.eu>
2024-08-31 22:38:35 +02:00

66 lines
1.6 KiB
Nix

{ config, lib, ... }:
{
imports = [ ./module.nix ];
services.k-radius = {
enable = true;
radiusClients = {
ap = {
ipaddr = "0.0.0.0/0";
secret = config.age.secrets."radius-ap-radius-secret_file".path;
};
};
settings = {
# URL to the Kanidm server
uri = "https://sso.dgnum.eu";
# verify the hostname of the Kanidm server
verify_hostnames = "true";
# Strict CA verification
verify_ca = "false";
verify_certificate = "false";
# Path to the kanidm ca
# Default vlans for groups that don't specify one.
radius_default_vlan = 99;
# A list of Kanidm groups which must be a member
# before they can authenticate via RADIUS.
radius_required_groups = [ "radius_access@sso.dgnum.eu" ];
# A mapping between Kanidm groups and VLANS
radius_groups = [
{
spn = "dgnum_members@sso.dgnum.eu";
vlan = 1;
}
{
spn = "dgnum_clients@sso.dgnum.eu";
vlan = 2;
}
];
};
authTokenFile = config.age.secrets."radius-auth_token_file".path;
privateKeyPasswordFile = config.age.secrets."radius-private_key_password_file".path;
certs = builtins.listToAttrs (
builtins.map (name: lib.nameValuePair name config.age.secrets."radius-${name}_pem_file".path) [
"ca"
"cert"
"dh"
"key"
]
);
};
age-secrets.autoMatch = [ "radius" ];
networking.firewall.allowedTCPPorts = [ 1812 ];
networking.firewall.allowedUDPPorts = [ 1812 ];
}