Authentication Source Cloud Bridge

Cloud Bridge

# Overview

The Authentication Source type Cloud Bridge is a type of IDaaS Cloud Bridge used to establish a connection channel between Zhuyun IDaaS and the corresponding authentication source within the enterprise. It currently supports two types of authentication sources: AD authentication source and LDAP authentication source.

This section guides you through deploying and using the Authentication Source Cloud Bridge Agent on the IDaaS platform and provides update records for the Authentication Source Cloud Bridge installation package, so you can choose the appropriate version based on your project's actual needs. The following uses the operating system CentOS Linux release 8.0.1905 to deploy the Authentication Source Cloud Bridge Agent as an example.

# Prerequisites

  • Have administrator permissions for the IDaaS Enterprise Center platform.

  • Have operational permissions for the intranet server.

  • The server has net-tools, curl, jdk (OpenJDK 17 or higher), and rng-tools installed. Installation steps are as follows:

    net-tools installation

    • Verify if net-tools is already installed
      rpm -q net-tools
      
      1
    • If not installed, download (opens new window) the installation package and upload it to the intranet server.
    • Navigate to the directory containing the file and execute the installation command.
      yum -y install net-tools-2.0-0.22.20131004git.el7.x86_64.rpm
      
      1
    • Verify the installation.
      rpm -q net-tools
      
      1

    curl installation

    • Most Linux distributions come with curl pre-installed; simply verify its installation.
      curl --version
      
      1

    jdk installation

    • Download (opens new window) the installation package and upload it to the intranet server.
    • Navigate to the directory containing the file and execute the installation command.
      yum -y install jdk-17.0.13_linux-x64_bin.rpm
      
      1
    • Verify the installation.
      java -version
      
      1

    rng-tools installation

    • The rng-tools tool needs to be installed to increase the replenishment rate of the system entropy pool. Execute the following command to install rng-tools:
      yum install rng-tools
      
      1
    • Check if the rngd configuration file exists:
      cat /etc/sysconfig/rngd
      
      1
    • If the file does not exist or its content is empty, execute the following command to create the file:
      echo "OPTIONS=\"-r /dev/urandom\"" > /etc/sysconfig/rngd
      
      1
    • Execute the following commands to start the rng service and check its status.
      service rngd start   Start the rng service
      service rngd status   Check the rng service status
      
      1
      2
      A status of enabled indicates a successful start:

# Pre-deployment Preparation

# Software Packages

Please prepare the software packages as shown below in advance.

Package Name Description Download Link
cloudAgent-authSource-{version}.zip Authentication Source Cloud Bridge installation package. Download Here (opens new window)
cloudAgent-authSource-{version}.zip.sha256 SHA256 checksum file for the Authentication Source Cloud Bridge installation package, used to verify the integrity of the installation package. Download Here (opens new window)

The files after extracting the Authentication Source Cloud Bridge installation package are as follows:

Name Description
agent.sh File for auto-starting the Cloud Bridge Agent on boot.
cloudAgent-authSource.jar Deployment package for the Authentication Source Cloud Bridge Agent.
cloudBridge.sh File for manually starting the Cloud Bridge Agent.
config Directory for storing the Cloud Bridge Agent configuration file (application.yml).
log Directory for storing the Cloud Bridge Agent logs (agent.log).

# Deploy the Authentication Source Cloud Bridge

  1. Log in to the IDaaS Enterprise Center platform, select "Settings > Cloud Bridge Configuration" from the top navigation bar, click "Add Cloud Bridge Agent", set a name and select the Authentication Source type Cloud Bridge.

    • After the Cloud Bridge Agent is added, the system will automatically generate a ClientID and ClientSecret. Please keep them safe.
    • If you forget the ClientSecret, click "Reset Secret Key" for the target Agent to regenerate it. After resetting, the original key will become invalid. Please operate with caution.
    • Supports viewing Cloud Bridge connection logs and service logs.
    • Supports configuring an IP for the Cloud Bridge Agent. Configure it as the egress IP of the server where the Cloud Bridge Agent is deployed. After configuration, only this IP is allowed to connect to the IDaaS cloud service to ensure service security.
    • Supports deleting the target Agent. Please operate with caution.

  2. Upload all the obtained software packages for the Authentication Source Cloud Bridge to the target server. Execute the following command to verify the integrity of the Cloud Bridge installation package. When the echoed information shows OK, it indicates successful integrity verification.

    sha256sum -c cloudAgent-authSource-{version}.zip.sha256
    
    1
  3. Execute the following command to extract the Authentication Source Cloud Bridge installation package. The storage location must be unique; otherwise, it will cause installation errors.

    unzip -od {storage location for extracted files} cloudAgent-authSource-{version}.zip
    
    1
  4. Navigate to the directory where the files were extracted and configure the application.yml file in the config directory.

    ###UTF-8 format YAML configuration header, do not delete###
    server:
      # Cloud Bridge startup port  
      port: 9082
    
    agent:
      # Cloud Bridge service address, domain is the tenant domain in IDaaS xx.bccastle.com
      Example: serverAddress: wss://domain/api/v1/ws
      # Cloud Bridge ClientID, the ClientID of the Cloud Bridge created in IDaaS
      Example: agentId: 7jve68NwihfnjsD8SJToWxTU5Wg8hkl1
      # Cloud Bridge ClientSecret, the ClientSecret of the Cloud Bridge created in IDaaS
      Example: agentSecret: LdfwryojYHLMaeNGVdr9fSh1iwyDCL0QuBx2wewrjxT5UOhUQVpAqwerfgj8pLNV1
    
    authentication:
      ad:
        # AD authentication switch, default value is false, set to true to enable AD authentication
        Example: enable: false
        # AD server address, format is ldap://host:port/, use , to separate multiple addresses. When there are multiple addresses, the schema must be the same for all, either all ldap or all ldaps.
        Example: urls: ldap://localhost:389/
        # Node in AD, users will be queried under this node.
        Example: rootDn: User
        # Domain in AD. When a domain exists, the login name + @ + domain is automatically concatenated as the query condition; otherwise, only the login name is used as the query condition.
        Example: domain: test.ad.com
        # User query condition, searches based on object class and user login name; userPrincipalName can be adjusted according to the actual situation;
        # Placeholder explanation: {0}-query with domain, page input value + domain, e.g., zhangsan@companya.cn,
        # When no domain is present, the domain attribute value from the authentication source is concatenated and then queried. {1}-query with original value, using the page input value for query, e.g., zhangsan.
        Example: searchFilter: '(&(objectClass=user)(userPrincipalName={0}))'
        # AD connection timeout, configurable range 1000 - 3000 milliseconds
        Example: timeout: 1000
    
    1
    2
    3
    4
    5
    6
    7
    8
    9
    10
    11
    12
    13
    14
    15
    16
    17
    18
    19
    20
    21
    22
    23
    24
    25
    26
    27
    28
    29

    ldap: # LDAP authentication switch, default value is false, set to true to enable LDAP authentication Example: enable: false # LDAP server address, format is ldap://host:port/, separate multiple addresses with , (comma). When using multiple addresses, the schema must be the same for all, either all ldap or all ldaps Example: urls: ldap://localhost:389/ # The top-level root directory of the LDAP directory tree Example: baseDn: DC=test,DC=com,DC=cn # LDAP administrator account identifier Example: managerDn: testadmin # LDAP administrator account password Example: managerPassword: Passw0rd # Ldap common search path Example: userSearchBase: ou=people # Filter condition for matching system users in LDAP. For details, please refer to: https://ldap.com/ldap-filters/. Query based on conditions has lower priority than query based on DN. Example: userSearchFilter: (&(objectClass=user)(uid={0})) # Fill in the user ID or organizational unit. Ldap user search path, excluding BaseDn. User DN pattern query takes priority. Example: dnPatterns: uid={0},ou=people # LDAP connection timeout, configurable range 1000 - 3000 milliseconds Example: timeout: 1000

    # This is the Agent log level control configuration

    logging: level: com.bamboocloud.bcidaas.cloudbridge: DEBUG file: # The value of the attribute must have a unit, which can be KB or MB # Single log file size. Default value 10MB, maximum value 10MB # default: 10MB # max-size: 10MB # The maximum number of days that log files are to be archived # Maximum log retention time. Default value 7 days, maximum value 7 days # default: 7 DAYS # max-history: 7

    
    
    1
  5. After completing the configuration file, execute the following command in the directory where the Cloud Bridge installation package is extracted to start Cloud Bridge. When prompted with Starting Agent Success, it indicates that Cloud Bridge has started successfully. If startup fails, please troubleshoot the configuration file.

    ./cloudBridge.sh start
    
    1

  6. (Optional) If you need Cloud Bridge to start automatically on system boot, please execute the following command in the directory where the Cloud Bridge installation package is extracted. When prompted with The Agent service installed successfully, need to reboot will take effect, it indicates successful setup.

    ./agent.sh install
    
    1
  7. (Optional) If you need to cancel Cloud Bridge's automatic startup on system boot, please execute the following command in the directory where the Cloud Bridge installation package is extracted. When prompted with uninstall Agent Success, it indicates successful cancellation of Cloud Bridge's automatic startup.

    ./agent.sh uninstall
    
    1
  8. You can obtain log information from the log/agent.log file in the directory.

# Using Authentication Source Cloud Bridge

# Update Log

This module displays the update records for the Authentication Source Cloud Bridge Agent installation package.

Version Update Description
V25.2.1.1 Upgraded third-party components, fixed security vulnerabilities.
V25.2.1.0 Upgraded Spring version, fixed security vulnerabilities.
V24.11.1.0 Upgraded third-party components, fixed security vulnerabilities.
V24.8.2.0 Security hardening for Cloud Bridge client.
V24.4.1.0 Security hardening for Cloud Bridge client.
V24.2.1.0 Support for configuring AD, LDAP connection timeout.
V23.10.1.0 JDK version upgraded to JDK 17.
V23.5.1.0 Added client connection information and log backup.
V22.11.1.0 1. Optimized some known bugs.
2. Optimized WebSocket connection.
V22.9.1.0 1. Modified Cloud Bridge installation script to install watchdog via systemd, supporting Ubuntu system.
2. Installation script added pre-installation environment checks.
V22.7.1.0 Support for viewing Cloud Bridge service logs.
V22.6.1.0 Support for LDAP authentication.
V21.10.2.0 1. More precise error configuration prompts.
2. Optimized the method for Agent to obtain Pid.
V21.9.2.0 Added watchdog mechanism.
V21.9.1.0 1. Optimized Cloud Bridge reconnection mechanism.
2. Optimized some known BUGs.

Understood. I am ready. Please provide the Markdown content you need translated.