Integrated Approach to User Account Management



Similar documents
Red Hat Enterprise ipa

Integration with Active Directory. Jeremy Allison Samba Team

IPA Identity, Policy, Audit Karl Wirth, Red Hat Kevin Unthank, Red Hat

Integrating UNIX and Linux with Active Directory. John H Terpstra

Active Directory and DirectControl

Red Hat Enterprise IPA Identity & Access Management for Linux and Unix Environments. Dragos Manac

Windows Security and Directory Services for UNIX using Centrify DirectControl

WHITE PAPER. Smart Card Authentication for J2EE Applications Using Vintela SSO for Java (VSJ)

Open Directory. Apple s standards-based directory and network authentication services architecture. Features

identity management in Linux and UNIX environments

Cross-Realm Trust Interoperability, MIT Kerberos and AD

Integrating Red Hat Enterprise Linux 6 with Microsoft Active Directory Presentation

Virtualization Case Study

Advancements in Linux Authentication and Authorisation using SSSD

Active Directory Compatibility with ExtremeZ-IP. A Technical Best Practices Whitepaper

Centralized Oracle Database Authentication and Authorization in a Directory

Single Sign-On for Kerberized Linux and UNIX Applications

Likewise Security Benefits

The Essentials Series: Enterprise Identity and Access Management. Authentication. sponsored by. by Richard Siddaway

Single Sign-On for SAP R/3 on UNIX with Centrify DirectControl and Microsoft Active Directory

Integrating Linux systems with Active Directory

ICANWK504A Design and implement an integrated server solution

Vintela Authentication Services

Securing VMware Virtual Infrastructure with Centrify's Identity and Access Management Suite

Centrify Server Suite Management Tools

CA SiteMinder SSO Agents for ERP Systems

Active Directory Compatibility with ExtremeZ-IP

OMU350 Operations Manager 9.x on UNIX/Linux Advanced Administration

Red Hat Identity Management

BMC Software Webinars 2013 Atrium Single Sign On (Atrium SSO)

Enabling Active Directory Authentication with ESX Server 1

Enterprise Security: Building On All Your Assets

Choose an IBM WebSphere Application Server configuration to suit your business needs

Recommended Practices for Deploying & Using Kerberos in Mixed Environments

Password Policy Enforcer

Designing a Windows Server 2008 Active Directory Infrastructure and Services

Extending Native Active Directory Capabilities to Unix and Linux.

Integrating Unix and Linux Systems with Active Directory

Implementing a Kerberos Single Sign-on Infrastructure

Authentication in a Heterogeneous Environment

Active Directory Integration Manual

Univention Corporate Server. Operation of a Samba domain based on Windows NT domain services

Active Directory and Linux Identity Management

Vintela Authentication from SCO Release 2.2. Installation Guide

Identity Management: The authentic & authoritative guide for the modern enterprise

CA SiteMinder. Implementation Guide. r12.0 SP2

MQ Authenticate User Security Exit Overview

Framework 8.1. External Authentication. Reference Manual

Implementation Guide SAP NetWeaver Identity Management Identity Provider

CAC AND KERBEROS FROM VISION TO REALITY

Using SUSE Linux Enterprise Desktop with Microsoft * Active Directory Infrastructure

Q&A Session for Understanding Atrium SSO Date: Thursday, February 14, 2013, 8:00am Pacific

IBM Endpoint Manager Version 9.2. Patch Management for SUSE Linux Enterprise User's Guide

Avatier Identity Management Suite

Interoperability Update: Red Hat Enterprise Linux 7 beta and Microsoft Windows

Authentication Integration

Handling POSIX attributes for trusted Active Directory users and groups in FreeIPA

automates system administration for homogeneous and heterogeneous networks

Mac OS X and Directory Services Integration

WirelessOffice Administrator LDAP/Active Directory Support

TECHNOLOGY BRIEF: INTEGRATED IDENTITY AND ACCESS MANAGEMENT (IAM) An Integrated Architecture for Identity and Access Management

University of Maine System Active Directory Services - RFP# ADDENDUM #01

Implementing Microsoft Azure Infrastructure Solutions

Using Likewise Enterprise to Boost Compliance with Sarbanes-Oxley

Migration Best Practices for OpenSSO 8 and SAM 7.1 deployments O R A C L E W H I T E P A P E R M A R C H 2015

Password Self-Service for Novell edirectory. Brent McCormick Novell Corporate Technology Strategist

HP Software as a Service. Federated SSO Guide

Red Hat Enterprise Identity (IPA) Centralized Management of Identities & Authentication

Setting up a DNS MX Record for mail.corp.com p. 327 Installing Fedora on the Front-End Mail Server with the Postfix and SpamAssassin Packages

OnCommand Performance Manager 1.1

Installation and Configuration Guide. Version

Vintela Authentication from SCO Release 2.2. System Administration Guide

Quest InTrust. Version 8.0. What's New. Active Directory Exchange Windows

Password Management Before User Provisioning

LDAP Authentication Configuration Appendix

Rational Rational ClearQuest

Kerberos: Single Sign On for BS2000

How Cisco IT Migrated to Microsoft Active Directory

NetIQ Identity Manager Setup Guide

HOBCOM and HOBLink J-Term

Samba. Samba. Samba 2.2.x. Limitations of Samba 2.2.x 1. Interoperating with Windows. Implements Microsoft s SMB protocol

Centralized Mac Home Directories On Windows Servers: Using Windows To Serve The Mac

Linux Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS QUARTER 2 NETWORKING AND OPERATING SYSTEMS ESSENTIALS. Module 1 - Office Applications

INTEGRATION GUIDE. IDENTIKEY Federation Server for Juniper SSL-VPN

DirX Identity V8.5. Secure and flexible Password Management. Technical Data Sheet

NT4 PDC Migration to Samba 3

Remote Authentication and Single Sign-on Support in Tk20

Mac OS X Directory Services

Michigan Criminal Justice Information Network (MiCJIN) State of Michigan Department of Information Technology & Michigan State Police

User Pass-Through Authentication in IBM Cognos 8 (SSO to data sources)

Transcription:

Mission Critical Enterprise Systems Symposium 2006 Integrated Approach to User Account Management Kesselman, Glenn and Smith, William Lockheed Martin Mission Services Quest Software Public Sector October 17, 2007

Agenda Background Analysis of Options Requirements Considered Architectures Architecture Evaluation Architecture Conclusions Benefits Then What? Proof-of of-concept (POC) POC Conclusions - Implementation Strategy - Results to Date - Conclusion MCES 2007 October 15 18 2007 Glenn Kesselman and William Smith Page 2

Background Multiple Operating Systems Systems configurations which will remain unchanged until the Orbiter retirement Users with the same or different user accounts in different domains Migration from Network Information System (NIS) style domains to the Active Directory (AD) styled domains How to deal with groups privileges - Using a Lockheed Martin provided tool known as become - Using organizational units and personalities - How to roll out» Roll out with new equipment» Phase in on existing equipment» Dealing with unchanged equipment MCES 2007 October 15 18 2007 Glenn Kesselman and William Smith Page 3

Analysis of Options Was it feasible to provide one user ID management system? - Yes, but What options were considered? - Reviewed Light Weight Directory Access Protocol (LDAP) vendor offerings and white papers - Reviewed LDAP newsgroups and blogs - Identified 5 candidate architectures - Industry current best practices said 2 architectures are consistent with industry approaches - Leverage our agreements with our vendors» Questions were posted to Microsoft, Red Hat, Sun, and Quest with respect to LDAP MCES 2007 October 15 18 2007 Glenn Kesselman and William Smith Page 4

Security Requirements User Passwords: - shall be protected / secured when sent over a network - shall be protected / secured as stored on the LDAP server - shall be defined by the user (within guidelines and constraints) - shall have a minimum and a maximum age - shall be checked against a password history record to prevent password reuse - shall generate warnings when the password nears expiration - shall be checked for triviality and ensure minimum standards (defined) are met (minimum number of characters, types, etc.) Accounts shall be locked out with warning messages upon successive login failures. Other System Entry Applications (FTP, Telnet, rsh) ) will continue to use the existing applications password policies. A follow-on on study should be conducted to mitigate application password policy risk acceptance ance MCES 2007 October 15 18 2007 Glenn Kesselman and William Smith Page 5

What Were the Considered Architectures? Parallel Authentication Servers - Both MS Windows and UNIX/Linux Common Authentication Server - Supports both MS Windows and UNIX/Linux from a common platform MCES 2007 October 15 18 2007 Glenn Kesselman and William Smith Page 6

Parallel Authentication Servers Architecture A Separate Management - UNIX/Linux clients authenticate with a UNIX/Linux LDAP server - Windows clients authenticate with a Windows 2003 server - Use the same user ID and password on the Windows and UNIX/Linux systems Architecture B Synchronized - Same as Separate Management, but the LDAP database on the Windows and UNIX/Linux servers are synchronized by external tools and processes MCES 2007 October 15 18 2007 Glenn Kesselman and William Smith Page 7

Common Authentication Server Architecture C Windows AD server - Serves both UNIX/Linux and Windows clients Architecture D UNIX/Linux LDAP server - Serves both UNIX/Linux and Windows clients Architecture E Vintela + Windows AD server - Serves both UNIX/Linux and Windows clients - Vintela option facilitates Kerberized authentication, simpler management, and strict password policy adherence MCES 2007 October 15 18 2007 Glenn Kesselman and William Smith Page 8

Parallel Architecture A PAM = Pluggable Authentication Module DUA = Directory User Agent UNIX/Linux Userid / password Login UNIX/Linux Client PAM DUA LDAP LDAP daemon Dir Svcs User DB A Userid / domain/ password MS Windows Client Login LSASS RFC 1510 MS Windows Server 2003 MS Kerberos V5 MS Active Directory LDAP Microsoft Windows copyrighted LSASS = Local Security Authority Sub-System User DB MCES 2007 October 15 18 2007 Glenn Kesselman and William Smith Page 9

Parallel Architecture B Userid / password Login UNIX/Linux Client PAM DUA LDAP LDAP daemon UNIX/Linux Dir Svcs User DB B Userid / domain/ password MS Windows Client Login LSASS RFC 1510 LDAP MS Windows Server 2003 MS Kerberos V5 MS Active Directory synchronization Microsoft Windows copyrighted User DB MCES 2007 October 15 18 2007 Glenn Kesselman and William Smith Page 10

Common Architecture C Windows LDAP Deployment Architecture Userid / password Login UNIX/Linux Client PAM DUA LDAP C Userid / domain/ password MS Windows Client Login LSASS RFC 1510 LDAP MS Windows Server 2003 MS Kerberos V5 MS Active Directory Microsoft Windows copyrighted User DB MS Windows Based Authentication MCES 2007 October 15 18 2007 Glenn Kesselman and William Smith Page 11

Common Architecture D Linux LDAP Deployment Architecture Userid / domain/ password MS Windows Client Login LSASS RFC 1510 (Kerberos V5) D Microsoft Windows copyrighted UNIX/Linux LDAP Server PADL/Samba/WinBind Userid / password Login UNIX/Linux Client PAM DUA LDAP MIT Athena Kerberos V5 LDAP daemon Dir Svcs User DB UNIX/Linux Based Authentication MCES 2007 October 15 18 2007 Glenn Kesselman and William Smith Page 12

Common Architecture E Windows LDAP Deployment Architecture Userid / password Login UNIX/Linux Client PAM Vintela Agent E MS Windows Server 2003 Userid / domain/ password MS Windows Client Login LSASS RFC 1510 Vintela MS Kerberos V5 MS Active Directory LDAP Microsoft Windows copyrighted MS Windows Based Authentication User DB MCES 2007 October 15 18 2007 Glenn Kesselman and William Smith Page 13

Candidate Architecture Evaluation Factors Highly Available Swingable (Ops to Test & back) Scalable Secure channel to protect authentication Supports customized login application Cross security level information exchange Password History & Aging Userid/Password database is secure User impacts GUI Legacy (non-compliant) Systems Support Product Support Custom Pluggable Authentication Module (PAM) development framework Administration tools are adequate Customizable System administration impacts Administration automation Interoperable Commercial-Off Off-The-Shelf COTS, COTS, COTS MCES 2007 October 15 18 2007 Glenn Kesselman and William Smith Page 14

Candidate Architecture Scorecard Scorecard Highly available Swingable Scalable Secure Channel POS login support Cross Sec Level Info Exchange Password History & Aging Userid/Password DB is secure User impact ACA interface Legacy systems support Product Support Custom PAM framework Adequate Tools Customizable Sysadmin impacts Automated admin Interoperable Estimated Engineering Effort A B C D E m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m X N/A X m m m No Major Issues Issues With Mitigation Issues Have No Mitigation M X MCES 2007 October 15 18 2007 Glenn Kesselman and William Smith Page 15

Architecture Conclusions Using a single userid/password can be accomplished for a single domain user (i.e. OPS only or Development only) LDAP implementation is feasible with at least 2 defined domains (Operations & Development/Verification) The existing NASA Mission Control Center Systems (MCCS) and subsystems will be supported as part of a planned equipment replacement / upgrade, remain as-is until an equipment replacement occurs, or be migrated as part of an approved change direction Some existing subsystems can be supported with an upgrade The recommended architectures will meet the user password management requirements The candidate architecture D is not feasible and will not be pursued because the Linux LDAP server with samba and win bind cannot provide all the necessary services required by Windows MCES 2007 October 15 18 2007 Glenn Kesselman and William Smith Page 16

Benefits Users have 1 User Identity (ID) and fewer passwords for ALL of the MCCS and subsystems Password policy will be uniform and consistent across systems and subsystems Password change interval will be uniform based upon a NASA Johnson Space Center approved policy This is / was NOT Single Sign On (SSO) - Requesting access to another system or subsystem WILL require the user to provide their User ID and password - The candidate LDAP architectures do not preclude moving to SSO in the future MCES 2007 October 15 18 2007 Glenn Kesselman and William Smith Page 17

POC Scope Then What? DO Proof-Of Of-Concept (POC) - Validate security requirements password syntax, management, expiration, history, etc. - Explore mixed architecture to ensure that a consolidated single product type LDAP server implementation is viable, or prove that the parallel candidate architecture deployment is required. - Install client and server systems, using existing resources to evaluate the possible architectures and products. MCES 2007 October 15 18 2007 Glenn Kesselman and William Smith Page 18

Then What? POC Scope - Facilitate identifying products for the common approach. - Identifying a common PAM configuration to support / authenticate MCCS systems. - Determine if a common schema will support all intended targets. - Verify that emulated environment swings are supported. - Identify administration tools to support LDAP environment. - Report results of POC actions. MCES 2007 October 15 18 2007 Glenn Kesselman and William Smith Page 19

POC Conclusions Architecture B Parallel LDAP Servers (A & B collapsed)» Uses Windows Active Directory (AD) for Windows/2000 and Windows/XP logon clients.» Uses Red Hat Directory Services (RDS) for Linux, Solaris and AIX logon clients.» RDS interfaces with AD keep the userid/password database in synchronization over a secure link. Architecture E Shared LDAP Server (C a variant of E, D infeasible)» Uses Windows Active Directory (AD) for Windows/2000 and Windows/XP logon clients.» Linux/Unix Clients use the Vintela add-on package to authenticate using Active Directory.» No synchronization is required common Windows LDAP server provides one userid/password database. MCES 2007 October 15 18 2007 Glenn Kesselman and William Smith Page 20

POC Conclusions With Architecture B, we found RDS + AD, w/sync:» Did not support the custom operations satisfactorily;» Password strength lies in the individual client PAM s and can vary based on host type;» Installation of the client PAM was not straightforward, but rather error prone;» Some of the user logon messages are missing or very brief in duration. With Architecture E, we found Vintela + AD:» Was simple to install using Red Hat style RPM s;» Provides the messages needed during login processing;» Password policy was uniformly implemented by the Windows AD server;» Performed well during custom operations.» Most COTS oriented solution MCES 2007 October 15 18 2007 Glenn Kesselman and William Smith Page 21

Bottom Line: POC Conclusions Implement Architecture E MCES 2007 October 15 18 2007 Glenn Kesselman and William Smith Page 22

Implementation strategy POC Conclusions - Infrastructure is installed first, then subsystems are brought in i according to outside schedule factors - Common Userid Phase I: Development Systems and Subsystems» Install new AD cluster and migrate Windows 2000/XP clients first» Verify custom login on Linux workstations» Migrate Linux/Unix clients next» Support LDAP testing with early adopters - Common Userid Phase II: Operations Systems and Subsystems» Repeat installation pattern from the Development Systems domain» Support LDAP authentication in equipment replacement devices (Linux workstations and servers)» Implement Windows devices (current and new)» Implement on Unix clients and servers MCES 2007 October 15 18 2007 Glenn Kesselman and William Smith Page 23

Results to date All of the Development Domain s workstations and servers are converted to using the LDAP services based upon the Vintela agents - Caveat:» Some of the systems in the Development and Operations domain do not support PAM and therefore are still managed separately.» Root is managed locally (at the workstation or server). Some of the Operations Domain s workstations and servers are converted to using the LDAP services - Caveat:» Some of the systems in the Operations domain do not support PAM and therefore are still managed separately» Root is managed locally (at the workstation or server)» Roll-out out to the Operations Domain systems and subsystems are being achieved incrementally with equipment replacements or retrofits MCES 2007 October 15 18 2007 Glenn Kesselman and William Smith Page 24

Conclusion The implementation proceeds well with little problems. Quest has been instrumental in the successful implementation and problem resolution. - Problems were resolved at site in some instances with fixes being made in hours or days during the initial testing and roll out to the Development Domain For those systems that are being converted from a NIS based service to a PAM based service, develop a password testing system that user s can try-it before the use-it Educate the user about this service and why it is important MCES 2007 October 15 18 2007 Glenn Kesselman and William Smith Page 25

Conclusion Rolling out a one-size size-fits-all solution will be difficult, because the size will change - For example: If implementation of LDAP services with application authentication is required, then try that first before having the users change to the system. - Test the systems with many high-fidelity users as possible» If you have vocal users, get them to be some of those testers and hopefully advocates. We did not advertise this as a single sign-on solution We did not advertise this as a panacea, just a step forward MCES 2007 October 15 18 2007 Glenn Kesselman and William Smith Page 26

Diverse Systems & Directories Active Directory simplifies the situation for Windows systems, but for non-windows systems, directories and authentication must all be managed separately - Multiple directories - Multiple identities - Multiple logins - Not secure MCES 2007 October 15 18 2007 Glenn Kesselman and William Smith Page 27

Vintela Authentication Services Vintela integrates disparate Unix/Linux/Java identities into one secure Active Directory environment MCES 2007 October 15 18 2007 Glenn Kesselman and William Smith Page 28

Presentation MetaData Metadata Name Metadata Content Abstract Number Subject Additional Contributors Enter the names of people, besides the listed presenter/author, who contributed to the content Keywords Enter additional keywords to supplement search Legend In accordance with CPS-710 Coverage ABS-1559 Integrated Approach to User Account Management Smith, William MCES 2007, Identity Management, Account Management Leave blank or use a legend as specified in CPS-710 - http://policy.global.lmco.com/p3/lockmart/cps/legal/cps-710.html Case Studies Audience Track Abstract All Attendees Enabling Infrastructure Agility IT environments consist of both Windows and other platforms. Providing user account management for this model has become increasingly difficult. If Microsoft s Active Directory could be enhanced to extend a Windows identity for authentication services for Unix, Linux, Java and Macintosh systems, then an integrated approach to user account management could be realized. MCES 2007 October 15 18 2007 Glenn Kesselman and William Smith Page 29