You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This is a feature request to introduce some mechanism for user configurable long-lived authentication sessions.
I'm part of a team which holds a shared responsibility over hundreds of Juju models. The way we interact with those models is via a bastion server (network access restricted via VPN and firewall, access restricted via LDAP group membership), where each model is only accessible to a single service account (access to which is restricted by sudoers rules applied to subgroups of users who should have access to that model).
For example, I'm able to sudo -iu my-production-model to access the local user account, who then has access to a Juju client which is configured to talk to the model.
For the models which we've migrated to an internal JAAS controller, we're experiencing some friction from the fact that we need to re-authenticate via SSO daily, since JIMM's macaroons are only valid for 24 hours.
It would really help to reduce this friction if there was some kind of capability to configure the authorized session time (per-user, per-model, per-controller even).
I recognise that this may introduce an increased security risk, which is acceptable to us given the security mechanisms we currently have in place, but may not be acceptable to others. If you have any alternate suggestions which could help us to reduce the re-authentication friction while maintaining that security posture, please let me know!
Thanks
The text was updated successfully, but these errors were encountered:
While we investigate how to enable this functionality, I wanted to mention that I think the source of the 24h expiry on macaroons comes from Candid. The Mojo spec for that deployment can be found here - https://bazaar.launchpad.net/~canonical-is/canonical-mojo-specs/trunk/view/head:/cdo/jaas-candid/bundle.yaml and the line api-macaroon-timeout: 24h. I think modifying that would have the desired effect on JIMM but could also have an unintentional effect on other tools using Candid.
Hi,
This is a feature request to introduce some mechanism for user configurable long-lived authentication sessions.
I'm part of a team which holds a shared responsibility over hundreds of Juju models. The way we interact with those models is via a bastion server (network access restricted via VPN and firewall, access restricted via LDAP group membership), where each model is only accessible to a single service account (access to which is restricted by sudoers rules applied to subgroups of users who should have access to that model).
For example, I'm able to
sudo -iu my-production-model
to access the local user account, who then has access to a Juju client which is configured to talk to the model.For the models which we've migrated to an internal JAAS controller, we're experiencing some friction from the fact that we need to re-authenticate via SSO daily, since JIMM's macaroons are only valid for 24 hours.
It would really help to reduce this friction if there was some kind of capability to configure the authorized session time (per-user, per-model, per-controller even).
I recognise that this may introduce an increased security risk, which is acceptable to us given the security mechanisms we currently have in place, but may not be acceptable to others. If you have any alternate suggestions which could help us to reduce the re-authentication friction while maintaining that security posture, please let me know!
Thanks
The text was updated successfully, but these errors were encountered: