Integrating Linux systems with Active Directory



Similar documents
AD Integration options for Linux Systems

Red Hat Identity Management

Red Hat Enterprise Identity (IPA) Centralized Management of Identities & Authentication

LinuxCon North America

Identity Management: The authentic & authoritative guide for the modern enterprise

Interoperability Update: Red Hat Enterprise Linux 7 beta and Microsoft Windows

Identity Management based on FreeIPA

CAC AND KERBEROS FROM VISION TO REALITY

Advancements in Linux Authentication and Authorisation using SSSD

How to build an Identity Management System on Linux. Simo Sorce Principal Software Engineer Red Hat, Inc.

SSSD. Client side identity management. LinuxAlt 2012 Jakub Hrozek 3. listopadu 2012

Integrating Red Hat Enterprise Linux 6 with Microsoft Active Directory Presentation

Integration with Active Directory. Jeremy Allison Samba Team

Building Open Source Identity Management with FreeIPA. Martin Kosek

Handling POSIX attributes for trusted Active Directory users and groups in FreeIPA

FreeIPA - Open Source Identity Management in Linux

Managing Identity & Access in On-premise and Cloud Environments. Ellen Newlands Identity Management Product Manager Red Hat, Inc

Cross-Realm Trust Interoperability, MIT Kerberos and AD

Integrating UNIX and Linux with Active Directory. John H Terpstra

FreeIPA 3.3 Trust features

Red Hat Enterprise ipa

IPA Identity, Policy, Audit Karl Wirth, Red Hat Kevin Unthank, Red Hat

SSSD Active Directory Improvements

External and Federated Identities on the Web

Implementing Linux Authentication and Authorisation Using SSSD

Going in production Winbind in large AD domains today. Günther Deschner (Red Hat / Samba Team)

FreeIPA Cross Forest Trusts

SSSD DNS Improvements in AD Environment

FreeIPA Client and Server

System Security Services Daemon

Authentication in a Heterogeneous Environment

Active Directory Integration

RHEL Clients to AD Integrating RHEL clients to Active Directory

FreeIPA v3: Trust Basic trust setup

SUSE Manager 1.2.x ADS Authentication

Active Directory and Linux Identity Management

Setting up a DNS MX Record for mail.corp.com p. 327 Installing Fedora on the Front-End Mail Server with the Postfix and SpamAssassin Packages

SSSD AD Provider: Access Control

Samba's AD DC: Samba 4.2 and Beyond. Presented by Andrew Bartlett of Catalyst //

PKI Made Easy: Managing Certificates with Dogtag. Ade Lee Sr. Software Engineer Red Hat, Inc

NETASQ SSO Agent Installation and deployment

Fedora 17 FreeIPA: Identity/ Policy Management

Fedora 18 FreeIPA: Identity/ Policy Management

FreeIPA Client and Server

Centralized Mac Home Directories On Windows Servers: Using Windows To Serve The Mac

Integrating Red Hat Enterprise Linux 6 with Active Directory. Mark Heslin Principal Software Engineer

Red Hat Enterprise IPA Identity & Access Management for Linux and Unix Environments. Dragos Manac

Mac OS X Directory Services

Allowing Linux to Authenticate to a Windows 2003 AD Domain. Prepared by. Thomas J. Munn, CISSP 11-May-06

Univention Corporate Server. Operation of a Samba domain based on Windows NT domain services

Windows Services. Support Windows and mixed-platform workgroups with high-performance, affordable network services. Features

Open Directory. Apple s standards-based directory and network authentication services architecture. Features

GL550 - Enterprise Linux Security Administration

ENTERPRISE LINUX SECURITY ADMINISTRATION

Windows Security and Directory Services for UNIX using Centrify DirectControl

Open Source Terminal Server Architecture for Enterprise Environment

GL-550: Red Hat Linux Security Administration. Course Outline. Course Length: 5 days

Hadoop Elephant in Active Directory Forest. Marek Gawiński, Arkadiusz Osiński Allegro Group

Enabling single sign-on for Cognos 8/10 with Active Directory

Integrated Approach to User Account Management

GL-275: Red Hat Linux Network Services. Course Outline. Course Length: 5 days

TIBCO Spotfire Platform IT Brief

Installing Squid with Active Directory Authentication

identity management in Linux and UNIX environments

Active Directory and DirectControl

Samba in the Enterprise : Samba 3.0 and beyond

ENTERPRISE LINUX NETWORKING SERVICES

IBM Endpoint Manager Version 9.1. Patch Management for Red Hat Enterprise Linux User's Guide

Linux Operating System Security

CONFIGURING ACTIVE DIRECTORY IN LIFELINE

Securing VMware Virtual Infrastructure with Centrify's Identity and Access Management Suite

GL275 - ENTERPRISE LINUX NETWORKING SERVICES

Centrify-Enabled Samba

Designing and Implementing a Server Infrastructure

Designing a Windows Server 2008 Applications Infrastructure

Oracle Linux Advanced Administration

Implementing and Administering Security in a Microsoft Windows Server 2003 Network

Domain Services for Windows: Best Practices Guide

SSSD and OpenSSH Integration

Centrify Server Suite Management Tools

Domain Services for Windows Administration Guide

Collax Active Directory

8.0 for LINUX UNIX. What s New Document. Expand 2.1. Learn more at

Websense Support Webinar: Questions and Answers

GL254 - RED HAT ENTERPRISE LINUX SYSTEMS ADMINISTRATION III

Migration of Windows Intranet domain to Linux Domain Moving Linux to a Wider World

Network operating systems typically are used to run computers that act as servers. They provide the capabilities required for network operation.

MCSA: Windows Server 2008

Using SUSE Linux Enterprise Desktop with Microsoft * Active Directory Infrastructure

Q&A Session for Understanding Atrium SSO Date: Thursday, February 14, 2013, 8:00am Pacific

Unifying Authorization Models

Security with LDAP. Andrew Findlay. February Skills 1st Ltd

Using Red Hat Enterprise Linux with Georgia Tech's RHN Satellite Server Installing Red Hat Enterprise Linux

Charles Firth Managing Macs in a Windows World

ENTERPRISE LINUX SECURITY ADMINISTRATION

Apple Pro Training Series. OS X Server. Essentials. Arek Dreyer. and Ben Greisler

Microsoft Active Directory and Windows Security Integration with Oracle Database

Fedora Directory Server FUDCon III London, 2005

Centrify Identity and Access Management for Cloudera

Transcription:

Integrating Linux systems with Active Directory Dmitri Pal Engineering Director, Red Hat, Inc. Security Camp at BU

Agenda Problem statement Aspects of integration Integration options Recommendations Security Camp at Boston University: August 20th, 2015 2

Problem Statement For most companies AD is the central hub of the user identity management inside the enterprise All systems that AD users can access (including Linux) need (in some way, i.e. directly or indirectly) to have access to AD to perform authentication and identity lookups In some cases the AD is the only allowed central authentication server due to compliance requirements In some cases DNS is tightly controlled by the Windows side of the enterprise and non Windows systems need to adapt to this Security Camp at Boston University: August 20th, 2015 3

Aspects of Integration Authentication User logs into a Linux system, how is he authenticated? Identity lookup How system knows about the right accounts? How AD accounts are mapped to POSIX? Name resolution and service discovery How system knows where is its authentication and identity server? Policy management How other identity related policies are managed on the system? Security Camp at Boston University: August 20th, 2015 4

Integration Options Direct Integration Indirect Integration Active Directory Active Directory Central Identity Server Linux system Linux system Linux system Linux system Linux system Linux system Security Camp at Boston University: August 20th, 2015 5

Direct Integration Options 3 rd party Legacy (pam_krb5, pam_ldap, nss_ldap, nslcd) Traditional winbind Contemporary SSSD (with realmd) Security Camp at Boston University: August 20th, 2015 6

Third Party Direct Integration 3 rd rd party plugin Active Directory Policies via via GPO GPO ID mapping is implementation specific or uses SFU/IMU extensions in AD DNS DNS LDAP KDC KDC Linux system 3 rd rd party client Policies Authentication sudo sudo Identities Identities hbac hbac Client may use native AD protocols Authentication can be LDAP or Kerberos Name Name Resolution Resolution automount automount selinux selinux Security Camp at Boston University: August 20th, 2015 7

Pros and Cons of the 3rd Party Option Pros Everything is managed in one place including policies Cons Requires third party vendor Extra cost per system (adds up) Limits UNIX/Linux environment independence Requires software on AD side Security Camp at Boston University: August 20th, 2015 8

Legacy Integration Option AD can be extended to serve basic sudo and automount Active Directory ID mapping uses SFU/IMU extensions in AD Policies are delivered via configuration files and managed locally or via a config server like Satellite or Puppet. DNS DNS LDAP KDC KDC Linux system LDAP/Kerberos Policies Authentication sudo sudo Identities Identities hbac hbac automount automount Authentication can be LDAP or Kerberos Name Name Resolution Resolution selinux selinux Security Camp at Boston University: August 20th, 2015 9

Pros and Cons of the Legacy Option Pros: Free No third party vendor is needed Intuitive Cons: Requires SFU/IMU AD extension Policies are not centrally managed Hard to configure securely Security Camp at Boston University: August 20th, 2015 10

Traditional Integration Option Active Directory AD can be extended to serve basic sudo and automount Can map AD SID to POSIX attributes or use SFU/IMU Can join system into AD domain (net join or realmd) Leverages native AD protocols and LDAP/Kerberos Policies are delivered via configuration files and managed locally or via a config server like Satellite or Puppet. DNS DNS LDAP KDC KDC Linux system Samba Winbind Policies Authentication sudo sudo Identities Identities hbac hbac automount automount Authentication can use LDAP, Kerberos or NTLM Name Name Resolution Resolution selinux selinux Security Camp at Boston University: August 20th, 2015 11

Pros and Cons of the Traditional Option Pros: Well known Does not require third party Does not require SFU/IMU Supports trusted domains Cons: Can connect only to AD and very MSFT focused Has some perceived stability issues Policies are not centrally managed Security Camp at Boston University: August 20th, 2015 12

Introducing SSSD SSSD is a service used to retrieve information from a central identity management system. SSSD connects a Linux system to a central identity store: Active Directory FreeIPA Any other directory server Provides authentication and access control Top technology in the evolution chain of the client side IdM components Security Camp at Boston University: August 20th, 2015

SSSD Features Multiple parallel sources of identity and authentication domains All information is cached locally for offline use Remote data center use case Laptop or branch office system use case Advanced features for FreeIPA integration AD integration Security Camp at Boston University: August 20th, 2015

Identity Source Integration with SSSD Client NSS Responder Identity Provider Identity Server Client Cache SSSD Domain Provider Network Boundary Client PAM Responder Auth Provider Authentication Server Security Camp at Boston University: August 20th, 2015

Why SSSD is our choice? Supports everything that previous UNIX solutions support and more Brings architecture to the next level Supports multiple sources domains Supports IdM specific features Supports trusts between AD and IdM Has a feature parity with windbind in core areas 16

Contemporary Integration Option Active Directory AD can be extended to serve basic sudo and automount Can map AD SID to POSIX attributes or use SFU/IMU Can join system into AD domain (realmd) Leverages native AD protocols and LDAP/Kerberos GPO support for HBAC is available. Other policies are delivered via configuration files and managed locally or via a config server like Puppet. DNS DNS LDAP KDC KDC Linux system SSSD Policies Authentication sudo sudo Identities Identities hbac hbac automount automount Authentication can use LDAP or Kerberos Name Name Resolution Resolution selinux selinux Security Camp at Boston University: August 20th, 2015 17

Pros and Cons of the Contemporary Option Pros: Does not require SFU/IMU but can use them Can be used with different identity sources Support transitive trusts in AD domains and trusts with FreeIPA Supports CIFS client and Samba FS integration GPO for Windows based HBAC Cons: No NTLM support, no support for AD forest trusts (yet) Security Camp at Boston University: August 20th, 2015 18

Option Comparison Feature LDAP/KRB Winbind SSSD Authenticate using Kerberos or LDAP Yes Yes Yes Identities are looked up in AD Yes Yes Yes Requires SFU/IMU Yes No No ID mapping None Multiple ways Most popular way System is joined into AD Manual Has join utility Realmd Supports trusts for AD domains No Yes Yes Supports heterogeneous domains and advanced features No No Yes Support file sharing No Yes Yes HBAC GPO No No Yes NTLM support No Yes 1.14 (spring 2016) Security Camp at Boston University: August 20th, 2015 19

Bottom Line of the Direct Integration SSSD is the way to go Winbind is the fallback option: if you rely on NTLM (please do not, it is very insecure) If you have multiple forests and need users from different forests to access the Linux system Security Camp at Boston University: August 20th, 2015 20

Limitations of the Direct Integration Options Policy management is mostly left out Per system CALs add to cost Linux/UNIX administrators do not have control over the environment All these limitations prevent growth of the Linux environment inside your organization! Security Camp at Boston University: August 20th, 2015 21

FreeIPA Based Integration Option (Trust) User domain Domain for Linux resources Active Directory Domain trust is established on the Kerberos level. DNS zone can be delegated to FreeIPA, can be a subdomain FreeIPA DNS DNS LDAP KDC KDC Linux system KDC KDC LDAP DNS DNS SSSD Policies Authentication sudo sudo Identities Identities hbac hbac Client software connects to the right server depending on the information it needs Name Name Resolution Resolution automount automount selinux selinux Policies are managed centrally Security Camp at Boston University: August 20th, 2015 22

Pros and Cons of the FreeIPA Trust Pros: Reduces cost no CALs or 3rd party Policies are centrally managed Gives control to Linux admins Enabled independent growth of the Linux environment No synchronization required Authentication happens in AD Requirement: Proper DNS setup Security Camp at Boston University: August 20th, 2015 23

Terminology FreeIPA open source project and technology IdM Identity Management in Red Hat Enterprise Linux or CentOS IdM is a stable version of the FreeIPA project Security Camp at Boston University: August 20th, 2015 24

Direct vs. Indirect Use Case Direct Integration Trust-based Integration Number of Linux Clients Small, less than 30 Large, 30 or more Policy Management Requires separate solution Included with FreeIPA Cost Grows with # of clients(cals) Fixed at one connection Free in Fedora/RHEL/CentOS Best Investment Profile Short-term Long-term If you think environment is big enough for a content management system it is big enough for FreeIPA! Security Camp at Boston University: August 20th, 2015 25

Summary Consider direct integration for a small deployment Consider SSSD as a main solution for direct integration Use winbind as a fallback alternative Consider IdM/FreeIPA trust based solution for a bigger or growing environment Use Fedora to discover, CentOS to prepare and RHEL to deploy your central identity management solution Security Camp at Boston University: August 20th, 2015 26

Resources FreeIPA Project wiki: www.freeipa.org Project trac: https://fedorahosted.org/freeipa/ Code: http://git.fedorahosted.org/git/?p=freeipa.git Mailing lists: freeipa-users@redhat.com freeipa-devel@redhat.com freeipa-interest@redhat.com SSSD: https://fedorahosted.org/sssd/ Mailing lists: sssd-devel@lists.fedorahosted.org sssd-users@lists.fedorahosted.org Certmonger: https://fedorahosted.org/certmonger/ Security Camp at Boston University: August 20th, 2015 27

Questions? Security Camp at Boston University: August 20th, 2015 28

THANK YOU! Security Camp at Boston University: August 20th, 2015 29