Advancements in Linux Authentication and Authorisation using SSSD



Similar documents
Implementing Linux Authentication and Authorisation Using SSSD

Integrating Linux systems with Active Directory

Red Hat Identity Management

Red Hat Enterprise Identity (IPA) Centralized Management of Identities & Authentication

Interoperability Update: Red Hat Enterprise Linux 7 beta and Microsoft Windows

Integration with Active Directory. Jeremy Allison Samba Team

Handling POSIX attributes for trusted Active Directory users and groups in FreeIPA

CAC AND KERBEROS FROM VISION TO REALITY

Identity Management: The authentic & authoritative guide for the modern enterprise

Integrating Red Hat Enterprise Linux 6 with Microsoft Active Directory Presentation

System Security Services Daemon

Identity Management based on FreeIPA

AD Integration options for Linux Systems

LinuxCon North America

SSSD. Client side identity management. LinuxAlt 2012 Jakub Hrozek 3. listopadu 2012

Integrating UNIX and Linux with Active Directory. John H Terpstra

Managing Identity & Access in On-premise and Cloud Environments. Ellen Newlands Identity Management Product Manager Red Hat, Inc

SSSD Active Directory Improvements

RHEL Clients to AD Integrating RHEL clients to Active Directory

FreeIPA 3.3 Trust features

FreeIPA Cross Forest Trusts

IPA Identity, Policy, Audit Karl Wirth, Red Hat Kevin Unthank, Red Hat

How to build an Identity Management System on Linux. Simo Sorce Principal Software Engineer Red Hat, Inc.

Building Open Source Identity Management with FreeIPA. Martin Kosek

Using SUSE Linux Enterprise Desktop with Microsoft * Active Directory Infrastructure

FreeIPA - Open Source Identity Management in Linux

Red Hat Enterprise ipa

Authentication in a Heterogeneous Environment

Active Directory and Linux Identity Management

identity management in Linux and UNIX environments

Lecture No 01 Novell Products Open Enterprise Server 2 Preview By Haim Malool. Main features Preview

Hadoop Elephant in Active Directory Forest. Marek Gawiński, Arkadiusz Osiński Allegro Group

Going in production Winbind in large AD domains today. Günther Deschner (Red Hat / Samba Team)

Integrated Approach to User Account Management

SUSE Manager 1.2.x ADS Authentication

Red Hat Enterprise IPA Identity & Access Management for Linux and Unix Environments. Dragos Manac

External and Federated Identities on the Web

Samba's AD DC: Samba 4.2 and Beyond. Presented by Andrew Bartlett of Catalyst //

FreeIPA Client and Server

Integrating Red Hat Enterprise Linux 6 with Active Directory. Mark Heslin Principal Software Engineer

Security with LDAP. Andrew Findlay. February Skills 1st Ltd

Open Directory. Apple s standards-based directory and network authentication services architecture. Features

Univention Corporate Server. Extended domain services documentation

Windows Security and Directory Services for UNIX using Centrify DirectControl

SSSD DNS Improvements in AD Environment

Active Directory and DirectControl

Cross-Realm Trust Interoperability, MIT Kerberos and AD

External Identity and Authentication Providers For Apache HTTP Server

Novell File Reporter 2.5 Who Has What?

Domain Services for Windows Administration Guide

ENTERPRISE LINUX SECURITY ADMINISTRATION

SSSD AD Provider: Access Control

Fedora 17 FreeIPA: Identity/ Policy Management

Unified Authentication, Authorization and User Administration An Open Source Approach. Ted C. Cheng, Howard Chu, Matthew Hardin

LDAP-UX Client Services B with Microsoft Windows Active Directory Administrator's Guide

Active Directory Integration

GL-550: Red Hat Linux Security Administration. Course Outline. Course Length: 5 days

SSSD and OpenSSH Integration

Charles Firth Managing Macs in a Windows World

Mac OS X Directory Services

Samba as an Active Directory Domain Controller

FreeIPA v3: Trust Basic trust setup

OnCommand Performance Manager 1.1

WirelessOffice Administrator LDAP/Active Directory Support

Samba. Samba. Samba 2.2.x. Limitations of Samba 2.2.x 1. Interoperating with Windows. Implements Microsoft s SMB protocol

Fedora 18 FreeIPA: Identity/ Policy Management

Fedora Directory Server FUDCon III London, 2005

Vintela Authentication from SCO Release 2.2. System Administration Guide

OpenVMS Update & OpenVMS Common Internet File System based on SAMBA

ICANWK504A Design and implement an integrated server solution

Open Source Terminal Server Architecture for Enterprise Environment

Novell Open Enterprise Server Administration

Likewise Security Benefits

Mac OS X and Directory Services Integration

Virtualization Case Study

ENTERPRISE LINUX SYSTEM ADMINISTRATION

GL-250: Red Hat Linux Systems Administration. Course Outline. Course Length: 5 days

Domain Services for Windows Administration Guide

Dell PowerVault NAS Systems

File Services. File Services at a Glance

Advanced Authentication

ICANWK401A Install and manage a server

Univention Corporate Server. Operation of a Samba domain based on Windows NT domain services

Installing Squid with Active Directory Authentication

GL550 - Enterprise Linux Security Administration

Best Practices: Integrating Mac OS X with Active Directory. Technical White Paper April 2009

Q&A Session for Understanding Atrium SSO Date: Thursday, February 14, 2013, 8:00am Pacific

IDENTITIES, ACCESS TOKENS, AND THE ISILON ONEFS USER MAPPING SERVICE

ACE Management Server Deployment Guide VMware ACE 2.0

Samba in the Enterprise : Samba 3.0 and beyond

Integrating HP-UX 11.x Account Management and Authentication with Microsoft Windows 2000 White Paper

CLEO NED Active Directory Integration. Version 1.2.0

Single sign-on websites with Apache httpd: Integrating with Active Directory for authentication and authorization

Apache Authentication, Authorization, and Access Control Concepts Version 2.2

Improving Interoperability and Reducing Cost in the Data Centre

Transcription:

Managing an Enterprise Series and Authorisation using SSSD Lawrence Kearney Enterprise Workgroup and Service Analyst e. lawrence.kearney@earthlink.net w. www.lawrencekearney.com

How SSSD came to our infrastructure The answer to all my computer manager's questions was: I Dunno' 2

What's in a name Origins in the freeipa project (Identity, Policy and Audit) There is a freeipa client Red Hat originates a new client project Narrower in scope Provided funding and (2) dedicated developers Commercially viable software base to bubble up from the Cent OS and Fedora projects Thank goodness! A name change opportunity is upon us! 3

What's in a name Seriously?! System Security Services Daemon We would have very happily accepted: Single Sign on Service Daemon Simple Sign on Solution Daemon Even: Simplesmente Sancionar Serviҫos Daemon 4

Moving on What need is SSSD addressing? PAM and NSS frameworks have scaling caveats, and are becoming legacy as identity management frameworks evolve Linux servers currently aren't ideal federation platform candidates as a result LDAP directories are becoming more specialised and are proliferating Better Active Directory integration is more mission critical 5

The usual suspects Local files ticked, next Network Information Service (NIS) ticked, next pam_unix nss_ldap Local authentication, remote user store Password management No session management pam_ldap nss_ldap Secure remote user lookup and authentication Password management No session management 6

The usual suspects pam_ldap pam_krb5 nss_ldap Secure remote user lookup and authentication Password management Session management (SSO capable) MIT kerberos capable MS Windows and Active Directory for Domains capable 7

The usual suspects pam_ldap pam_krb5 pam_winbind nss_ldap Secure remote user lookup and authentication Password management Session management (SSO capable) MIT kerberos capable MS Windows RPC capable MS Windows and Active Directory for Domains capable MS Windows file share participation 8

The usual daemons Name Service Caching daemon (nscd) Next query caching for users, groups, hosts and services No offline authentication but can maintain active sessions Windows Bind daemon (winbindd) Does not require remote posix attributes Requires AD Domain joining Serves as a front end for PAM, NSS and Samba LDAP Name Service daemon (nslcd) Simplified configuration file Requires remote posix attributes Does not require AD Domain joining 9

That'll be enough rabbit holes Large scale deployments become complex Workforce and administrator skill set considerations 10

SSSD advantages Authentication service enhancements Greater extensibility Multiple concurrently available identity stores Single configuration file Reduced server loads Security is required SASL/GSSAPI, kerberos and SSO features ID collision features Offline authentication 11

SSSD advantages Configuration consolidation Backward compatible with legacy PAM / NSS stacks Legacy PAM / NSS / winbindd¹ modules not required Integrated service configurations (ssh, sudo, autofs etc.) Integrates with windbindd if necessary Reduced complexity 12

SSSD disadvantages MS Windows or Samba file shares Still require winbindd be configured and used NFS file shares May still require nscd but without user and group caching Interactions with some older linux applications Those that aren't flexible concerning case Those that will only talk to legacy PAM and NSS modules Migrating from configurations using id mapping can be more complex 13

SSSD disadvantages Seriously, if I type: SSSH or SSSL One more time I may scream!! 14

SSSD processes SSSD uses a parent/child process monitoring model /etc/sssd/sssd.conf file [sssd] Parent process, Monitor [nss] Child process, Responder [domain/ldap] Child process, Provider 15

SSSD processes SSSD process example: ps -eaf grep sssd root 1476 1 0 /usr/sbin/sssd root 1478 1476 0 /usr/libexec/sssd/sssd_nss root 41279 1476 0 /usr/libexec/sssd/sssd_be --domain LDAP pstree -A -p 1476 sssd (1476) - + - sssd_be (41279) - sssd_nss (1478) 16

SSSD architecture overview 17

The SSSD configuration file [sssd] services = domains = [nss], [pam], [sudo] reconnection_retries = filter_users = [domain/name] id_provider = auth_provider = chpass_provider = access_provider = Global parameters Service parameters SSSD domain parameters SSSD Domain = Identity Provider + Authentication provider 18

SSSD Identity Providers Local LDAP Accounts are kept in a ldb database Relies on installed extensions of target directory Kerberos AD ipa IdM Proxy Supports many native Active Directory features Supports trusts with Active Directory domains Integrates tightly with RHEL IdM implementations Permits integration of other providers 19

SSSD identity providers Local Enhanced local account features Familiar local user management tools LDAP Flexible attribute mapping capabilities Kerberos SASL/GSSAPI support improves application support AD Login performance improvements Trust and domain auto-discovery features Native schema, DNS update and security support 20

The other SSSD providers auth_provider = ldap, ipa, krb5, ad, proxy, none chpass_provider = ldap, ipa, krb5, ad, proxy, none access_provider = permit, deny, ldap, ipa, ad, simple Different providers can and often are be combined 21

SSSD deployment Many linux distributions are now SSSD aware Auto-configuration using native distribution utilities Enterprise linux distributions include Red Hat Enterprise Linux 5.6: SSSD 1.5 Red Hat Enterprise Linux 6: SSSD 1.9 Red Hat Enterprise Linux 7: SSSD 1.11 Suse Linux Enterprise Server 11.2: SSSD 1.9 Suse Linux Enterprise Server 12: SSSD 1.11 Identify existing services that should be modified PAM LDAP and NSS LDAP configurations NSCD user, group, host or service caching 22

SSSD deployment Determine how posix attributes will be provided Provided by directory service or linux ID mapping Install software on your platform Typically samba and kerberos are required for initial setup² Not all distributions package SSSD uniformly Configure transport security TLS/SSL for edir over LDAP TLS/SSL for AD over LDAP SASL/GSSAPI for AD over LDAP/kerberos Configure SSSD identity providers and access control Identity and access control providers can be mixed 23

Futures Suse and Red Hat are aligning with AD integration maturity Would like to see the AD id provider included in SLES 11.3 SSSD 1.11 Realmd utility will auto-configure AD id provider Expanded AD access control provider NetBIOS/DNS domain name auto-discovery Beyond 1.11 AD access control provider will include group policy support SSSD CIFS integration 24

Wrap up and hugs if deserved Thank you for attending! Come to the SSSD workshop later this week RHEL and SLES deployment examples and labs Edirectory and Active Directory for Domains configurations Basic and advanced SSSD configurations Basic and advanced LDAP configurations Implementing SSL/TLS and SASL/GSSAPI security 25

Managing an Enterprise Series Questions Lawrence Kearney Enterprise Workgroup and Service Analyst e. lawrence.kearney@earthlink.net w. www.lawrencekearney.com