Tom Hubrecht
8a42e18d98
All checks were successful
build configuration / build_storage01 (push) Successful in 1m38s
build configuration / build_compute01 (push) Successful in 1m40s
build configuration / build_web01 (push) Successful in 2m11s
build configuration / build_vault01 (push) Successful in 2m11s
lint / check (push) Successful in 27s
build configuration / build_geo02 (push) Successful in 1m20s
build configuration / build_geo01 (push) Successful in 1m23s
build configuration / build_web02 (push) Successful in 1m28s
build configuration / build_rescue01 (push) Successful in 1m28s
build configuration / build_bridge01 (push) Successful in 1m20s
build configuration / push_to_cache_storage01 (push) Successful in 1m32s
build configuration / push_to_cache_geo02 (push) Successful in 1m38s
build configuration / push_to_cache_geo01 (push) Successful in 1m38s
build configuration / push_to_cache_compute01 (push) Successful in 2m8s
build configuration / push_to_cache_rescue01 (push) Successful in 1m39s
build configuration / push_to_cache_web01 (push) Successful in 2m29s
build configuration / push_to_cache_web02 (push) Successful in 1m28s
build configuration / push_to_cache_bridge01 (push) Successful in 1m17s
58 lines
1.3 KiB
Nix
58 lines
1.3 KiB
Nix
{ config, ... }:
|
|
|
|
{
|
|
imports = [ ./module.nix ];
|
|
|
|
services.k-radius = {
|
|
enable = true;
|
|
|
|
domain = "radius.dgnum.eu";
|
|
|
|
radiusClients = {
|
|
ap = {
|
|
ipaddr = "0.0.0.0/0";
|
|
secret = config.age.secrets."radius-ap-radius-secret_file".path;
|
|
};
|
|
};
|
|
|
|
settings = {
|
|
# URL to the Kanidm server
|
|
uri = "https://sso.dgnum.eu";
|
|
|
|
# verify the hostname of the Kanidm server
|
|
verify_hostnames = "true";
|
|
|
|
# Strict CA verification
|
|
verify_ca = "false";
|
|
verify_certificate = "false";
|
|
|
|
# Path to the kanidm ca
|
|
|
|
# Default vlans for groups that don't specify one.
|
|
radius_default_vlan = 99;
|
|
|
|
# A list of Kanidm groups which must be a member
|
|
# before they can authenticate via RADIUS.
|
|
radius_required_groups = [ "radius_access@sso.dgnum.eu" ];
|
|
|
|
# A mapping between Kanidm groups and VLANS
|
|
radius_groups = [
|
|
{
|
|
spn = "dgnum_members@sso.dgnum.eu";
|
|
vlan = 1;
|
|
}
|
|
{
|
|
spn = "dgnum_clients@sso.dgnum.eu";
|
|
vlan = 2;
|
|
}
|
|
];
|
|
};
|
|
|
|
authTokenFile = config.age.secrets."radius-auth_token_file".path;
|
|
};
|
|
|
|
age-secrets.autoMatch = [ "radius" ];
|
|
|
|
networking.firewall.allowedTCPPorts = [ 1812 ];
|
|
networking.firewall.allowedUDPPorts = [ 1812 ];
|
|
}
|