Himmelblau brings Windows-style enterprise sign-in & device management to Linux.
✅ MFA with Microsoft Authenticator
✅ Entra ID join & Intune enrollment
✅ Hello PIN for passwordless logins
✅ SSO with Teams, Outlook, Excel, Word & more

A Linux workstation that’s joined, enrolled & compliant — just like Windows.

https://youtu.be/BxRHI6pS2Yw

#Linux #OpenSource #MicrosoftEntra #Intune #Himmelblau

Windows-style enterprise Entra Id signin on Linux

YouTube

Himmelblau 1.0 is here! 🎉

https://github.com/himmelblau-idm/himmelblau/releases/tag/1.0.0

„Himmelblau is an interoperability suite for Microsoft Azure Entra ID and Intune.”

„Himmelblau supports Linux authentication to Microsoft Azure Entra ID via PAM and NSS modules. The PAM and NSS modules communicate with Entra ID via the himmelblaud daemon. Himmelblau also supports Intune device enrollment, policy enforcement, and marking devices as compliant with Intune MDM policies.”

#Himmelblau #Linux #EntraID #Intune #OpenSource #IAM #Authentication #Security #Microsoft365 #Samba #infosec #cybersecurity #devops #sysops

Himmelblau 1.0 is out!

This is our biggest release yet — with native Intune policy enforcement, expanded distro support (Fedora 42, RHEL10, SLE15 SP7), and tons of other improvements.

https://github.com/himmelblau-idm/himmelblau/releases/tag/1.0.0

Give it a spin and let us know what breaks 😄

#Himmelblau #EntraId #Linux

Release 1.0 · himmelblau-idm/himmelblau

What's Changed Add fedora42 build target by @bror-net in #627 Fix Intermittent auth issue AADSTSError 16000 by @dmulder in #628 Add RHEL10 and SLE15SP7 build targets by @dmulder in #629 deps(rust)...

GitHub
@mdrights please forward your fixes upstream to #himmelblau!

Proposal: A Modular Core for Cloud-Ready Identity Providers

I've published a proposal for a shared authentication layer designed to help identity providers implement modern, cloud-native protocols like OAuth2 and device trust.
This is about digital sovereignty: One possible use case? Deploy the core alongside on-prem AD to turn it into a full cloud identity provider.

Proposal: https://github.com/himmelblau-idm/mittelbau

#DigitalSovereignty #OpenSource #IdentityManagement #CloudIdentity #Himmelblau #Kanidm #Samba

(Note from last week)
Finally figuring out the PAM config for #himmelblau on Ubuntu 22.04. The config generated from pam-auth-update did not work for it -- the Entra ID pw input even did not prompt... (the author said it was contributed for debian by netizen)
So i had to change `common-account` file, and finally I had good luck to make it work with the help of Copilot 😁😮‍💨.
I heard from Himmelblau developers that they are basing their work heavily on tpmrm0, which made me of course happy, as it is one of my contributions some years ago :-)

When I worked on that feature in the Spring of 2017 I thought that nobody will use it, as it is just way too niche, and I could not fully convice myself that it would bring much useful application on top of /dev/tpm0. And there was already IBMTSS and Intel TSS2.

James Bottomley did a lot for this one
in particular tricky dev management code and extended swapper I had put together also for sessions, in addition to objects.

Definitely gives me the needed boost after holiday season to look more into Himmeblau project and gives some faith that I could be useful somehow over time in that ecosystem :-)

#linux #tpm #himmelblau
Finally got the PAM settings work for #himmelblau on Redhat. Some of its on-stock config need to change...
I wonder if Azure has somewhere a place where you can upload endorsement certificates?

This would be for testing Himmelblau on a VM and for that use and purpose create a fake TPM vendor CA. AFAIK, Himmelblau does not yet sign anything with attestation keys but there will be a day when it will, so better to be prepared.

#himmelblau #azure #tpm
Oh #himmelblau is very hard to configure, esp on RHEL.
Spent almost a week on it...