Jump to content
Main menu
Main menu
move to sidebar
hide
Navigation
Main page
Recent Changes
Live Chat
commons-linode-stage
Search
Search
Create account
Log in
Personal tools
Create account
Log in
Pages for logged out editors
learn more
Contributions
Talk
Editing
FreedomTunnelCall04/05/2012
Page
Discussion
English
Read
Edit
View history
Tools
Tools
move to sidebar
hide
Actions
Read
Edit
View history
General
What links here
Related changes
Special pages
Page information
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
Initial conference call to kick of FreedomTunnel work. Participants: * Ed * Isaac * Charles * Dana Overview: * Ed talked about occupy.net web properties needing an LDAP back end. Not sure how much coding is needed. * Single source of authentication is acceptable. * Share a domain (occupy.net) so trust can be shared via cookies. * nycga.net site (separate) * Potential federation between web properties * occupy.net is a platform (internationalizing and generic platform) * occupy.net being a CA? (consider down the line) * Creating a system image (openvz) is essence of FNF / Occupy collaboration * Asked about occupy.net infrastructure (is it containers?) * occupy.net runs on openvz vps instances * federated, decentralized, distributed infrastrucutre to avoid SPOF * system image is one way to go, most likely will use chef to provision on top of whatever bare image is available . much easier to put a recipe together, keep it in git and then all you need is a bare image and run a single chef command to get SSO provisioned * it's key to keep data separated from the binaries/recipe * occupy tech ops has full control over infrastructure (root access) * division of labor? * goal is to produce a chef recipe to produce an ldap/ssl/kerberos backend workable on any Debian based VM (regardless of VmWare/Vbox/OpenVZ underneath) * ed is familiar with LDAP/Kerberos and will explore them in more detail * looking for development resources (chef,ldap,kerberos experts) * Dana will followup with potential development resources Components: * Setup chef infrastructure * Install LDAP * Install kerberos * Configure them * Test across distros * Replication between masters for HA * Keep data separate * Handling data transport security Milestone targets: *Magic iterative releases here *September 17th beta target
Summary:
Please note that all contributions to commons-linode-stage may be edited, altered, or removed by other contributors. If you do not want your writing to be edited mercilessly, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource (see
Commons-linode-stage:Copyrights
for details).
Do not submit copyrighted work without permission!
Cancel
Editing help
(opens in new window)
Toggle limited content width