System Security Services Daemon



Similar documents
CAC AND KERBEROS FROM VISION TO REALITY

Identity Management based on FreeIPA

SSSD. Client side identity management. LinuxAlt 2012 Jakub Hrozek 3. listopadu 2012

Integration with Active Directory. Jeremy Allison Samba Team

Advancements in Linux Authentication and Authorisation using SSSD

SSSD Active Directory Improvements

Implementing Linux Authentication and Authorisation Using SSSD

Interoperability Update: Red Hat Enterprise Linux 7 beta and Microsoft Windows

Identity Management: The authentic & authoritative guide for the modern enterprise

RHEL Clients to AD Integrating RHEL clients to Active Directory

Going in production Winbind in large AD domains today. Günther Deschner (Red Hat / Samba Team)

Red Hat Enterprise Identity (IPA) Centralized Management of Identities & Authentication

FreeIPA Cross Forest Trusts

Red Hat Identity Management

LinuxCon North America

Integrating Red Hat Enterprise Linux 6 with Microsoft Active Directory Presentation

Integrating Linux systems with Active Directory

External and Federated Identities on the Web

Windows Security and Directory Services for UNIX using Centrify DirectControl

Handling POSIX attributes for trusted Active Directory users and groups in FreeIPA

Hadoop Elephant in Active Directory Forest. Marek Gawiński, Arkadiusz Osiński Allegro Group

SSSD and OpenSSH Integration

SSSD AD Provider: Access Control

How to build an Identity Management System on Linux. Simo Sorce Principal Software Engineer Red Hat, Inc.

Building Open Source Identity Management with FreeIPA. Martin Kosek

FreeIPA - Open Source Identity Management in Linux

External Identity and Authentication Providers For Apache HTTP Server

LDAP-UX Client Services B with Microsoft Windows Active Directory Administrator's Guide

FreeIPA v3: Trust Basic trust setup

Red Hat Enterprise ipa

FreeIPA 3.3 Trust features

SSSD DNS Improvements in AD Environment

FreeIPA Client and Server

Managing Identity & Access in On-premise and Cloud Environments. Ellen Newlands Identity Management Product Manager Red Hat, Inc

Using SUSE Linux Enterprise Desktop with Microsoft * Active Directory Infrastructure

AD Integration options for Linux Systems

Vintela Authentication from SCO Release 2.2. System Administration Guide

High-available Authorization and Authentication

Integrating UNIX and Linux with Active Directory. John H Terpstra

Integrating IBM Cognos 8 BI with 3rd Party Auhtentication Proxies

Chapter Thirteen (b): Using Active Directory Integration

Integrating Red Hat Enterprise Linux 6 with Active Directory. Mark Heslin Principal Software Engineer

Active Directory and Linux Identity Management

Univention Corporate Server. Extended domain services documentation

SUSE Manager 1.2.x ADS Authentication

Embedded Web Server Security

Red Hat Enterprise IPA Identity & Access Management for Linux and Unix Environments. Dragos Manac

Use Enterprise SSO as the Credential Server for Protected Sites

User Management / Directory Services using LDAP

Guide to SASL, GSSAPI & Kerberos v.6.0

Fedora 17 FreeIPA: Identity/ Policy Management

Configuring and Using the TMM with LDAP / Active Directory

Fedora 18 FreeIPA: Identity/ Policy Management

Compiled By: Chris Presland v th September. Revision History Phil Underwood v1.1

Charles Firth Managing Macs in a Windows World

Kerberos. Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, BC. From Italy (?).

How to configure the Panda GateDefender Performa explicit proxy in a Local User Database or in a LDAP server

LDAP User Guide PowerSchool Premier 5.1 Student Information System

VINTELA AUTHENTICATION SERVICES

ACE Management Server Deployment Guide VMware ACE 2.0

CMDBuild Authentication (file auth.conf)

Borderware Firewall Server Version 7.1. VPN Authentication Configuration Guide. Copyright 2005 CRYPTOCard Corporation All Rights Reserved

IceWarp Server - SSO (Single Sign-On)

Authentication Methods

Configuring Integrated Windows Authentication for JBoss with SAS 9.2 Web Applications

Architecture of Enterprise Applications III Single Sign-On

Deploying RSA ClearTrust with the FirePass controller

Active Directory Compatibility with ExtremeZ-IP. A Technical Best Practices Whitepaper

Integrating HP-UX 11.x Account Management and Authentication with Microsoft Windows 2000 White Paper

Configuring Sponsor Authentication

Avatier Identity Management Suite

Security with LDAP. Andrew Findlay. February Skills 1st Ltd

Apple Technical White Paper Best Practices for Integrating OS X with Active Directory

Theorie Practical part Outlook. Kerberos. Secure and efficient authentication and key distribution. Johannes Lötzsch and Meike Zehlike

Security Provider Integration Kerberos Authentication

WirelessOffice Administrator LDAP/Active Directory Support

Identity Federation: Bridging the Identity Gap. Michael Koyfman, Senior Global Security Solutions Architect

How To Use The Gss-Api And Sspi For A Security Reason On A Microsoft Microsoft Server (Or A Microsplatte)

Using Active Directory as your Solaris Authentication Source

Bring Linux into Microsoft s ADS

Authentication Applications

Security. TestOut Modules

Active Directory Integration

Embedded Web Server Security

Unified Authentication, Authorization and User Administration An Open Source Approach. Ted C. Cheng, Howard Chu, Matthew Hardin

Kerberos and Single Sign-On with HTTP

Enabling Active Directory Authentication with ESX Server 1

Using LDAP for User Authentication

ACE Names and UID/GID/SIDs

Open Directory. Apple s standards-based directory and network authentication services architecture. Features

OFFICE OF KNOWLEDGE, INFORMATION, AND DATA SERVICES (KIDS) DIVISION OF ENTERPRISE DATA

Installing Squid with Active Directory Authentication

SUSE Linux Enterprise Server in an Active Directory Domain

Single Sign-On for Kerberized Linux and UNIX Applications

CYAN SECURE WEB HOWTO. NTLM Authentication

ICANWK504A Design and implement an integrated server solution

MongoDB Security Guide

FreeIPA Client and Server

Training module 2 Installing VMware View

Transcription:

System Security Services Daemon

System Security Services Daemon Manages communication with centralized identity and authentication stores Provides robust, predictable caching for network accounts Can cache authentication credentials locally to allow local updates Can handle multiple domains of user data and authentication

SSSD Use Cases Corporate Laptop Traditional problem: users maintain a separate local account on the laptop to log into when out of the office With SSSD providing cached credentials, the user can keep the same account (UID and all) when logging in remotely Datacenter Datacenters that require highly-available authentication can take advantage of SSSDs caching to ride out temporary internal service outages (such as an LDAP or Kerberos server outage)

Network Boundary Identity lookups without SSSD Identity Authentication

Network Boundary Identity lookups with SSSD NSS Responder Identity Identity Cache SSSD Domain PAM Responder Auth Authentication

SSSD Data s Network Boundary Identity Auth SSSD NSS Responder PAM Responder Auth Cache Domain 2 Identity Domain 1 Auth Identity Domain N Auth Identity Domain... Auth Identity Identity Auth Identity Auth Identity Auth

Traditional Authentication NSS PAM Directory 1 Auth 1 Request Directory 2... Auth 2... Directory N Auth N

Copyright Dbarefoot, used under Attribution-NonCommercial License

SSSD Authentication NSS PAM Directory 1 Auth 1 Request Directory 2... Auth 2... Directory N Auth N

nscd Improvements over nscd and pam_ccreds SSSD user and group cache expiration is more predictable When cached in the SSSD, user identity entries will not expire while offline SSSD operates closer to the backends, so it can be aware of backendspecific temporary failures that nscd would report as missing entries pam_ccreds SSSD can be configured to perform offline expiration of cached credentials (requiring clients to 'check in' with the central server regularly) SSSD will inform the user when authenticating with cached credentials, and will warn of approaching offline expiration

Differences from traditional authentication SSSD requires the use of transport layer encryption when performing simple bind authentication against LDAP LDAPS, TLS or GSSAPI SSSD enforces a one-to-one relationship between user identities and authentication services Offline authentication against a Kerberos server can be configured to automatically perform a kinit when the server becomes available

To Infinity and Beyond Developer environment Build custom identity and authentication backends Better ActiveDirectory Support Integrate with ActiveDirectory using winbind InfoPipe Advanced authentication interface over D-BUS system bus Provide access to extended directory information such as keyboard and language preferences

Configuration Basic configuration can be most easily managed with authconfig Version 6.1.4 or later of authconfig Properly configures the following standard configuration files for use with SSSD: /etc/nsswitch.conf /etc/pam.d/system-auth /etc/pam.d/password-auth /etc/sssd/sssd.conf /etc/krb5/krb5.conf (when using Kerberos for auth) SSSD 1.2.x supports LDAP for identities and either LDAP or Kerberos for authentication

Advanced Configuration Many more complicated configuration settings are available Advanced options be set manually in /etc/sssd/sssd.conf For a complete listing of these options, see: sssd.conf(5) sssd-ldap(5) sssd-krb5(5) Options that may be of interest: enumerate Whether to allow a complete listing of all users in a domain. Default: False ldap_tls_reqcert How strict SSSD should be when validating the certificate for an LDAP server krb5_store_password_if_offline Whether to store a user's password (securely) until the SSSD becomes online. When this occurs, the SSSD will perform a kinit on behalf of the user with this password to acquire a TGT

Identity s LDAP Supports LDAP servers using RFC2307 or RFC2307bis schema SSSD 1.2 supports users and groups Upcoming versions will also support netgroups IPA Support for the upcoming FreeIPA v2 identity store Uses (and requires) GSSAPI/KRB5 encrypted communication with the FreeIPA LDAP server Proxy Can support identity data from an existing

Authentication s LDAP Password authentication through LDAP simple bind KRB5 IPA Proxy Password authentication through the Kerberos protocol Authentication through this backend will perform a kinit and acquire a Kerberos ticket-granting ticket for network single-sign-on Password authentication to FreeIPA through the Kerberos protocol or LDAP simple bind (during password migration only) Can handle password migrations from LDAP -> FreeIPA migrations Invokes a custom PAM stack to perform authentication against a tradition PAM module (or series of modules)

Access s Permit Always allows access to any user that succeeded at authentication Default if no access_provider is specified Deny Always denies access, regardless of authentication success Simple Grants access to users in a list LDAP IPA Grants access to users whose user entry matches a particular LDAP search query Grants access based on complex host-based access control (HBAC) rules configured on a FreeIPA server

Chpass s LDAP KRB5 Proxy Change password using the password change extended operation of the LDAP protocol Change password through the Kerberos protocol to a kadmin server