Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Feature: Kerberos credential configuration in AMT #769

Open
matt-primrose opened this issue Nov 7, 2022 · 0 comments
Open

Feature: Kerberos credential configuration in AMT #769

matt-primrose opened this issue Nov 7, 2022 · 0 comments
Labels
enhancement New feature or request

Comments

@matt-primrose
Copy link
Contributor

Describe the bug 🪲
We want a way to configure Kerberos credentials into AMT so that we can manage AMT devices using Microsoft Active Directory accounts directly with the AMT device through our local network management console. Need to be able to configure groups and group access to AMT features based on AMT realms

Expected behavior
RPS is able to set specific Microsoft Active Directory group access to specific AMT permission realms during configuration.

Service Deployment (please complete the following information): ⛈️

  • Deployment Type: Enterprise
  • Component & Version: RPS

Additional context
N/A

@matt-primrose matt-primrose added the enhancement New feature or request label Nov 7, 2022
@matt-primrose matt-primrose moved this to 📋 Backlog in Feature Backlog Nov 7, 2022
@matt-primrose matt-primrose moved this to 🆕 New in Feature Backlog Nov 9, 2022
@matt-primrose matt-primrose moved this from 🆕 New to 📋 Backlog in Feature Backlog Nov 9, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
Status: No status
Development

No branches or pull requests

1 participant