Skip to content

thebyrdman-git/laptop-enterprise-automation

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

2 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

πŸ§™β€β™‚οΈβš‘ Enterprise Laptop Automation Suite

Seamless Red Hat Corporate Authentication & VPN Integration

Transform your corporate laptop into an enterprise automation powerhouse with zero manual authentication!

License: MIT Red Hat Kerberos


πŸš€ What This Does

Before This Suite:

  • Manual kinit every few hours
  • Typing Kerberos passwords constantly
  • VPN connection + authentication friction
  • Remembering to renew tickets
  • Authentication failures disrupting workflow

After Installation:

  • βœ… Connect VPN β†’ Everything Else Automated
  • βœ… Never touch kinit again
  • βœ… Desktop notifications for all auth events
  • βœ… 30-minute auto-renewal = never-expiring tickets
  • βœ… Secure encrypted password storage
  • βœ… Enterprise-grade security and logging

🎯 Features

πŸ” Secure Credential Management

  • AES-256-CBC encryption with OpenSSL
  • GPG-based advanced vault (optional)
  • Secure file permissions (600)
  • Memory-safe password handling

🌐 VPN Integration

  • NetworkManager dispatcher integration
  • Automatic Red Hat VPN detection
  • Desktop notifications for connection events
  • Multi-VPN endpoint support

⚑ Automatic Kerberos Management

  • VPN-triggered authentication
  • 30-minute automatic renewal
  • Self-healing ticket management
  • Fallback to manual auth if needed

🌐 Browser SSO Integration

  • Automatic Red Hat website login
  • Chrome, Firefox, and Chromium support
  • Desktop launcher integration
  • Zero password prompts for authenticated sites

🏰 Enterprise Integration

  • Red Hat corporate Kerberos (IPA.REDHAT.COM)
  • Active Directory trust support
  • Multi-factor authentication ready
  • Comprehensive audit logging

πŸ“‹ Requirements

Operating System

  • Fedora 40+ (primary target)
  • RHEL 8/9 (fully supported)
  • CentOS Stream (compatible)
  • Other Linux (may work with modifications)

Network Access

  • Red Hat VPN access configured
  • Corporate network connectivity
  • Kerberos realm access (IPA.REDHAT.COM)

System Packages

# Required packages (installed by setup script)
sudo dnf install -y krb5-workstation openssl NetworkManager

πŸš€ Quick Start

1. Clone Repository

git clone https://github.com/YOUR_USERNAME/laptop-enterprise-automation.git
cd laptop-enterprise-automation

2. Run Installation Script

chmod +x install.sh
./install.sh

3. Store Your Password Securely

pai-simple-credential-store --store
# Enter your Red Hat Kerberos password when prompted

4. Test Automatic Authentication

pai-simple-credential-store --test
# Should show: βœ… Automatic kinit successful!

5. Connect Red Hat VPN

# Use your usual VPN connection method
# Watch for desktop notification: "πŸ” Enterprise authentication complete!"

6. Set Up Browser SSO

pai-browser-kerberos-setup --install
# Configures Chrome and Firefox for Red Hat SSO

7. Test Red Hat SSO

# Launch Chrome with automatic Red Hat authentication
google-chrome-kerberos

# Or launch Firefox with SSO
firefox-kerberos

# Navigate to any Red Hat site - automatic login!
# Try: https://access.redhat.com, https://console.redhat.com

8. Verify Ultimate Seamless Workflow

pai-vpn-kerberos-integration --status
# Should show all green checkmarks βœ…

πŸ› οΈ Manual Installation

Step 1: Install Scripts

# Copy scripts to user bin directory
cp bin/* ~/.local/bin/
chmod +x ~/.local/bin/pai-*

# Ensure ~/.local/bin is in PATH
echo 'export PATH="$HOME/.local/bin:$PATH"' >> ~/.bashrc
source ~/.bashrc

Step 2: Install Systemd Services

# Copy systemd user services
mkdir -p ~/.config/systemd/user
cp systemd/* ~/.config/systemd/user/

# Enable and start automatic renewal
systemctl --user daemon-reload
systemctl --user enable pai-kerberos-renewal.timer
systemctl --user start pai-kerberos-renewal.timer

Step 3: Install NetworkManager Integration

# Install VPN integration (requires sudo)
pai-vpn-kerberos-integration --install

πŸ“– Usage Guide

πŸ” Credential Management

# Store password securely
pai-simple-credential-store --store

# Test automatic authentication  
pai-simple-credential-store --kinit

# Check credential status
pai-simple-credential-store --status

# Remove stored credentials
pai-simple-credential-store --remove

🌐 VPN Integration

# Check VPN integration status
pai-vpn-kerberos-integration --status

# Test authentication when on corporate network
pai-vpn-kerberos-integration --test-auth

# Monitor VPN events (interactive)
pai-vpn-kerberos-integration --monitor

⚑ Automatic Renewal

# Check renewal service status
systemctl --user status pai-kerberos-renewal.timer

# Manual renewal test
pai-kerberos-auto-renew --renew

# View renewal logs
journalctl --user -u pai-kerberos-renewal.service -f

πŸ”§ Configuration

πŸŽ›οΈ Customization Options

Change Renewal Frequency

# Edit timer (default: 30 minutes)
systemctl --user edit pai-kerberos-renewal.timer

# Add override:
[Timer]
OnUnitActiveSec=15min  # Change to 15 minutes

Disable Desktop Notifications

# Edit scripts and comment out notify-send lines:
# - pai-vpn-kerberos-integration
# - pai-kerberos-auto-renew

Advanced GPG Vault (Optional)

# Use GPG-based credential storage instead
pai-credential-vault --init
pai-credential-vault --store

πŸ›‘οΈ Security Features

πŸ”’ Credential Protection

  • AES-256-CBC encryption with user-unique keys
  • Secure file permissions (600 - only user readable)
  • Memory-safe password handling (variables cleared after use)
  • No plain-text storage anywhere in the system

πŸ” Audit & Logging

  • Comprehensive logging in /tmp/pai-*.log
  • Systemd journal integration for service events
  • Authentication event tracking for security auditing
  • Error logging for troubleshooting

🌐 Network Security

  • Corporate network detection before authentication attempts
  • VPN-only authentication (no authentication on untrusted networks)
  • Kerberos ticket encryption (standard Kerberos security)

🚨 Troubleshooting

Common Issues

"No VPN Connected" but VPN is active

# Check VPN connection name detection
nmcli connection show --active | grep vpn

# Verify Red Hat VPN naming in script
pai-vpn-kerberos-integration --status

"Automatic kinit failed"

# Check stored password
pai-simple-credential-store --status

# Test manual kinit
kinit your_username@IPA.REDHAT.COM

# Re-store password if changed
pai-simple-credential-store --store

"Kerberos server unreachable"

# Test network connectivity
timeout 3 nc -z kerberos.corp.redhat.com 88
ping kerberos.corp.redhat.com

# Check VPN connection to corporate network

Systemd service not running

# Check service status
systemctl --user status pai-kerberos-renewal.timer

# Restart if needed
systemctl --user restart pai-kerberos-renewal.timer

# View logs
journalctl --user -u pai-kerberos-renewal.service

πŸ”§ Debug Mode

# Enable verbose logging
export PAI_DEBUG=1

# Run manual tests
pai-simple-credential-store --test
pai-vpn-kerberos-integration --test-auth

🀝 Contributing

🎯 Areas for Contribution

  • Additional VPN providers (Cisco AnyConnect, OpenVPN, etc.)
  • Multi-platform support (macOS, Windows WSL)
  • Enhanced MFA integration (FIDO2, smart cards)
  • Advanced credential backends (HashiCorp Vault, etc.)
  • GUI management interface

πŸ“ Contribution Guidelines

  1. Fork the repository
  2. Create feature branch: git checkout -b feature/amazing-feature
  3. Test thoroughly on Fedora/RHEL
  4. Update documentation for new features
  5. Submit pull request with detailed description

πŸ“„ License

MIT License - see LICENSE for details.


πŸ† Acknowledgments

  • Red Hat Corporation - For excellent enterprise infrastructure
  • MIT Kerberos Team - For robust authentication protocols
  • Fedora Project - For outstanding Linux distribution
  • NetworkManager Team - For reliable network integration

πŸ“ž Support

πŸ› Issues

πŸ’¬ Discussion


🎯 Roadmap

πŸš€ Planned Features

  • Multi-realm support (REDHAT.COM + IPA.REDHAT.COM)
  • Browser SSO integration (Firefox/Chrome Kerberos)
  • SSH key automation (Kerberos-based SSH)
  • Certificate management (automated SSL cert deployment)
  • Mobile integration (smartphone notifications)
  • Team deployment (organization-wide rollout tools)

πŸ§™β€β™‚οΈ Transform your corporate laptop experience from authentication friction to seamless enterprise power! ⚑🏰✨

About

πŸ§™β€β™‚οΈβš‘ Seamless Red Hat Corporate Authentication & VPN Integration

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors