Identity Management: The authentic & authoritative guide for the modern enterprise



Similar documents
Integrating Linux systems with Active Directory

AD Integration options for Linux Systems

LinuxCon North America

Managing Identity & Access in On-premise and Cloud Environments. Ellen Newlands Identity Management Product Manager Red Hat, Inc

Red Hat Identity Management

FreeIPA - Open Source Identity Management in Linux

How to build an Identity Management System on Linux. Simo Sorce Principal Software Engineer Red Hat, Inc.

Red Hat Enterprise Identity (IPA) Centralized Management of Identities & Authentication

Interoperability Update: Red Hat Enterprise Linux 7 beta and Microsoft Windows

Handling POSIX attributes for trusted Active Directory users and groups in FreeIPA

Building Open Source Identity Management with FreeIPA. Martin Kosek

External and Federated Identities on the Web

CAC AND KERBEROS FROM VISION TO REALITY

Advancements in Linux Authentication and Authorisation using SSSD

SSSD. Client side identity management. LinuxAlt 2012 Jakub Hrozek 3. listopadu 2012

FreeIPA 3.3 Trust features

Identity Management based on FreeIPA

System Security Services Daemon

Integrating Red Hat Enterprise Linux 6 with Microsoft Active Directory Presentation

Red Hat Enterprise ipa

FreeIPA Cross Forest Trusts

Integration with Active Directory. Jeremy Allison Samba Team

Cross-Realm Trust Interoperability, MIT Kerberos and AD

CA Performance Center

Getting Started with AD/LDAP SSO

FreeIPA v3: Trust Basic trust setup

Cisco ASA Adaptive Security Appliance Single Sign-On: Solution Brief

FreeIPA Client and Server

Windows Security and Directory Services for UNIX using Centrify DirectControl

Integrating VMware Horizon Workspace and VMware Horizon View TECHNICAL WHITE PAPER

INTEGRATION GUIDE. DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server

Single Sign On. SSO & ID Management for Web and Mobile Applications

Perceptive Experience Single Sign-On Solutions

Fedora 18 FreeIPA: Identity/ Policy Management

INTEGRATION GUIDE. DIGIPASS Authentication for Salesforce using IDENTIKEY Federation Server

SAML-Based SSO Solution

Implementing Linux Authentication and Authorisation Using SSSD

VMware Identity Manager Administration

External Identity and Authentication Providers For Apache HTTP Server

Mac OS X Directory Services

Fedora 17 FreeIPA: Identity/ Policy Management

Architecture of Enterprise Applications III Single Sign-On

INTEGRATION GUIDE. DIGIPASS Authentication for VMware Horizon Workspace

IPA Identity, Policy, Audit Karl Wirth, Red Hat Kevin Unthank, Red Hat

FreeIPA Client and Server

GL-275: Red Hat Linux Network Services. Course Outline. Course Length: 5 days

EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES

How To Use Saml 2.0 Single Sign On With Qualysguard

Using SUSE Linux Enterprise Desktop with Microsoft * Active Directory Infrastructure

SSSD DNS Improvements in AD Environment

From centralized to single sign on

Juniper Networks Secure Access Kerberos Constrained Delegation

Securing Administrator Access to Internal Windows Servers

HP Software as a Service. Federated SSO Guide

HOTPin Integration Guide: Salesforce SSO with Active Directory Federated Services

SAP NetWeaver Single Sign-On. Product Management SAP NetWeaver Identity Management & Security June 2011

RHEL Clients to AD Integrating RHEL clients to Active Directory

ENTERPRISE LINUX SECURITY ADMINISTRATION

Protecting Juniper SA using Certificate-Based Authentication. Quick Start Guide

Connecting Web and Kerberos Single Sign On

GL-550: Red Hat Linux Security Administration. Course Outline. Course Length: 5 days

The Top 5 Federated Single Sign-On Scenarios

Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services

ENTERPRISE LINUX NETWORKING SERVICES

Centrify Identity and Access Management for Cloudera

enstratus User Management Copyright 2012 enstratus Networks, Inc.

SAML SSO Configuration

identity management in Linux and UNIX environments

Only LDAP-synchronized users can access SAML SSO-enabled web applications. Local end users and applications users cannot access them.

Identity Management in Liferay Overview and Best Practices. Liferay Portal 6.0 EE

Course 6425C: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services

GL275 - ENTERPRISE LINUX NETWORKING SERVICES

DocuSign Single Sign On Implementation Guide Published: March 17, 2016

Leveraging SAML for Federated Single Sign-on:

SAP Single Sign-On 2.0 Overview Presentation

Configuring and Troubleshooting Windows Server 2008 Active Directory Domain MOC 6425

Single Sign On In A CORBA-Based

OnCommand Performance Manager 1.1

70-417: Upgrading Your Skills to MCSA Windows Server 2012

Open Directory. Apple s standards-based directory and network authentication services architecture. Features

Q&A Session for Understanding Atrium SSO Date: Thursday, February 14, 2013, 8:00am Pacific

GL550 - Enterprise Linux Security Administration

CA Single Sign-On r12.x (CA SiteMinder) Implementation Proven Professional Exam

Securing WebFOCUS A Primer. Bob Hoffman Information Builders

Password Power 8 Plug-In for Lotus Domino Single Sign-On via Kerberos

Agenda. How to configure

Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services

Enabling Federation and Web-Single Sign-On in Heterogeneous Landscapes with the Identity Provider and Security Token Service Supplied by SAP NetWeaver

Apache Server Implementation Guide

SAML 2.0 SSO Deployment with Okta

SAML-Based SSO Solution

6425C - Windows Server 2008 R2 Active Directory Domain Services

Single Sign-on (SSO) technologies for the Domino Web Server

NE-6425C Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services

INTEGRATION GUIDE. DIGIPASS Authentication for SimpleSAMLphp using IDENTIKEY Federation Server

SAML Authentication Quick Start Guide

Federation At Fermilab. Al Lilianstrom National Laboratories Information Technology Summit May 2015

v7.8.2 Release Notes for Websense Content Gateway

Single Sign-On for SAP R/3 on UNIX with Centrify DirectControl and Microsoft Active Directory

Transcription:

Identity Management: The authentic & authoritative guide for the modern enterprise Ellen Newlands, Product Manager Dmitri Pal, Director, Engineering 06-26-15

Goals of the Presentation Introduce Identity Management problem space Give you an overview of the identity management components in the Red Hat portfolio Provide examples of some real-world use cases that can be solved with the identity management capabilities Red Hat offers Show that these solutions are cost effective 2

Identity Management Problem Space 3

What is Identity Management? What does this mean to you? What issues are you running into in this area? 4

Wikipedia as the authoritative source for definitions: Identity Management - (noun) Identity management (IdM) describes the management of individual principals, their authentication, authorization, and privileges within or across and enterprise boundaries with the goal of increasing security and productivity while decreasing cost, downtime and repetitive tasks. Wikipedia 5

Identity Management Problem Space Identities Where are my users stored? What properties do they have? How is this data made available to s and applications? Authentication What credentials do my users use to authenticate? Passwords? Smart Cards? Special devices? Is there SSO? How can the same user access file stores and web applications without requiring re-authentication? Access control Which users have access to which s, services, applications? What commands can they run on those s? What SE context is a user is mapped to? Policies What is the strength of the password? What are the automount rules? What are Kerberos ticket policies? 6

Overview of the Identity Management Components 7

Components of the Portfolio Identity Management in Red Hat Enterprise (IdM) SSSD Certmonger Ipsilon IdP Apache modules 8

Identity Management Domain controller for /UNIX environments Combines LDAP, Kerberos, DNS and certificate management capabilities Provides centralized authentication, authorization and identity information for /UNIX infrastructure Enables centralized policy and privilege escalation management Integrates with Active Directory on the server-to-server level 9

SSSD: (The System Security Services Daemon) Client-side component Part of Red Hat Enterprise and many other distributions Allows connecting a to the identity and authentication source of your choice Caches identity and policy information for offline use Capable of connecting to different sources of identity data at the same time 10

Certmonger Client side component Connects to central Certificate Server and requests certificates Tracks and auto renews the certificates it is tracking 11

Ipsilon IdP Identity Provider implementation Allows federation between different applications using SAML based SSO 12

Apache Modules Modules that can be integrated with Apache server Modules that support forms-based, Kerberos or SAML authentication Authorization and identity data lookups are also possible using corresponding modules 13

Example Architecture Trust Trust Active ActiveDirectory Directory IdM IdM Server Server Business BusinessApplication Application IdP IdP Modules Modules SSSD SSSD Certmonger Certmonger 14

Solving Real World Identity Management Challenges 15

Use Cases and Challenges How can I provide centralized authentication? Can I define access control to hosts without copying configuration files? Can I manage SSH keys for users and hosts? Can I provide centralized SUDO, automount, SE user mappings? Is there a cost effective solution that provides strong authentication using OTP? Can I provide a smooth SSO experience for my users inside the enterprise? How can I integrate my applications into the same identity space? How to address Active Directory interoperability challenges? 16

Centralized Authentication Steps: Consolidate your user accounts Load your user data into a IdM Connect you /UNIX s to IdM IdM IdM ipa-client-install Why would I use IdM? Different authentication methods: LDAP, Kerberos, OTP, Certificates Integrated solution Easy to install and manage Integrates with AD Has a lot of other valuable capabilities 17

Use Cases and Challenges How can I provide centralized authentication? Can I define access control to hosts without copying configuration files? Can I manage SSH keys for users and hosts? Can I provide centralized SUDO, automount, SE user mappings? Is there a cost effective solution that provides strong authentication using OTP? Can I provide a smooth SSO experience for my users inside the enterprise? How can I integrate my applications into the same identity space? How to address Active Directory interoperability challenges? 18

Host Based Access Control Which users or group of users can access Which hosts or groups of hosts Using which login services console, ssh, sudo, ftp, sftp, etc. IdM IdM You define rules centrally Rules are enforced on the client Rules are cached There is a test tool to help you 19

Use Cases and Challenges How can I provide centralized authentication? Can I define access control to hosts without copying configuration files? Can I manage SSH keys for users and hosts? Can I provide centralized SUDO, automount, SE user mappings? Is there a cost effective solution that provides strong authentication using OTP? Can I provide a smooth SSO experience for my users inside the enterprise? How can I integrate my applications into the same identity space? How to address Active Directory interoperability challenges? 20

SSH Key Management Host public keys uploaded at the client installation time User can upload his public key to IdM manually When user SSHs from a A the public key of to the target B is delivered to A (no need to validate digest) User public key is automatically delivered to B IdM IdM Digest System System AA User public key SSH System System BB 21

Use Cases and Challenges How can I provide centralized authentication? Can I define access control to hosts without copying configuration files? How I can manage SSH keys for users and hosts? Can I provide centralized SUDO, automount, SE user mappings? Is there a cost effective solution that provides strong authentication using OTP? Can I provide a smooth SSO experience for my users inside the enterprise? How can I integrate my applications into the same identity space? How to address Active Directory interoperability challenges? 22

SUDO Integration IdM IdM Commands Commands ABC ABC Commands Commands KLM KLM Centrally define commands and groups of commands Define which groups of users can run these commands or groups of commands on which hosts or groups of hosts Rules are enforced on client Rules are cached Capability is integrated into the sudo utility Commands Commands XYZ XYZ 23

SE User Mapping IdM IdM Unprivileged Unprivileged Privileged Privileged Mappings can be defined centrally Allow different users on different s have different SE context Default SE labels are available in IPA configuration Mappings are enforced on the client Mappings are cached Super Super privileged privileged 24

Automount Maps for US location IdM IdM Maps for Japan location Systems Systems (US) (US) Systems Systems (Japan) (Japan) File File Server Server (US) (US) File File Server Server (Japan) (Japan) Define direct or indirect maps Associate maps with a particular location Configure clients to pull data from that location (part of the LDAP tree) Maps are defined centrally Maps are applied on the client Maps are cached Maps are integrated with autofs 25

Use Cases and Challenges How can I provide centralized authentication? Can I define access control to hosts without copying configuration files? How I can manage SSH keys for users and hosts? Can I provide centralized SUDO, automount, SE user mappings? Is there a cost effective solution that provides strong authentication using OTP? Can I provide a smooth SSO experience for my users inside the enterprise? How can I integrate my applications into the same identity space? How to address Active Directory interoperability challenges? 26

Two Factor Authentication External External OTP OTP server server IdM IdM Native 2FA Yubikey, FreeOTP, Google authenticator HOTP/TOTP compatible Over LDAP or Kerberos Proxied over RADIUS Any third party that has RADIUS support Kerberos only Easy migration 27

Use Cases and Challenges How can I provide centralized authentication? Can I define access control to hosts without copying configuration files? How I can manage SSH keys for users and hosts? Can I provide centralized SUDO, automount, SE user mappings? Is there a cost effective solution that provides strong authentication using OTP? Can I provide a smooth SSO experience for my users inside the enterprise? How can I integrate my applications into the same identity space? How to address Active Directory interoperability challenges? 28

Kerberos Based SSO Kerberized Kerberized application application ST NFS NFSClient Client 4 2 ST NFS NFS Server Server 5 TGT Key Key 1 3 IdM/AD/Kerberos IdM/AD/Kerberos 29

Kerberos SSO Flow User logs into the that is connected to a Kerberos server It can be: Kerberos KDC, Active Directory or IdM User authenticates (1) and receives a ticket granting ticket (TGT) from Kerberos server User accesses a resource (2), for example NFS client Kerberos library will request a service ticket from KDC on behalf of the user (3) Ticket is presented to the service, for example NFS server (4) Server or service decrypts using using its Kerberos key Keys are distributed at the configuration time, IdM provides a command to get the Kerberos keys for the client s 30

SAML Based SSO Application Application Framework Framework Apache Apache User Attributes 2 SAML SAML module module 6 1 7 3 5 Application Application 4 Identity Identity Provider Provider (IdP) (IdP) Identity Identity Source Source 31

SAML Flow 1. User starts browser and navigates to a resource or application 2. SAML component checks the presence of the assertion and redirects to IdP 3. IdP prompts user for authentication methods it supports 4. IdP uses some identity source to perform the authentication 5. IdP creates a SAML assertion and redirects browser back to the resource 6. SAML component checks the assertion and extracts user data from it 7. Data is passed to the application user is authenticated 32

Use Cases and Challenges How can I provide centralized authentication? Can I define access control to hosts without copying configuration files? How I can manage SSH keys for users and hosts? Can I provide centralized SUDO, automount, SE user mappings? Is there a cost effective solution that provides strong authentication using OTP? Can I provide a smooth SSO experience for my users inside the enterprise? How can I integrate my applications into the same identity space? How to address Active Directory interoperability challenges? 33

Application Integration Application Application Framework Framework Apache Apache with with modules modules Authentication Authentication Kerberos Kerberos SSO SSO User Attributes Application Application SAML, SAML, OpenID,... OpenID,... Identity Identity Platform Platform SSSD SSSD Identity Identity Source Source 34

Use Cases and Challenges How can I provide centralized authentication? Can I define access control to hosts without copying configuration files? How I can manage SSH keys for users and hosts? Can I provide centralized SUDO, automount, SE user mappings? Is there a cost effective solution that provides strong authentication using OTP? Can I provide a smooth SSO experience for my users inside the enterprise? How can I integrate my applications into the same identity space? How to address Active Directory interoperability challenges? 35

AD Integration Options Direct Integration Active Active Directory Directory Indirect Integration Central Central Identity Identity Server Server Active Active Directory Directory 36

Direct Integration AD can be extended to serve basic sudo and automount Active Active Directory Directory DNS DNS LDAP LDAP Policies are delivered via configuration files and managed locally or via a config server like Satellite or Puppet. GPO support for HBAC is implemented since 7.1. Can map AD SID to POSIX attributes or use SFU/IMU Can join into AD domain (realmd) Leverages native AD protocols and LDAP/Kerberos KDC KDC SSSD SSSD Policies Policies Authentication Authentication sudo sudo Identities Identities hbac hbac automount automount Name NameResolution Resolution Authentication can use LDAP or Kerberos selinux selinux 37

Indirect Integration User domain Domain for resources Domain trust is established on the Kerberos level. DNS zone can be delegated to IdM, can be a subdomain Active Active Directory Directory DNS DNS LDAP LDAP KDC KDC IdM IdM KDC KDC SSSD SSSD Policies Policies Authentication Authentication sudo sudo Identities Identities hbac hbac LDAP LDAP DNS DNS automount automount Client software connects to the right server depending on the information it needs Name NameResolution Resolution Policies are managed centrally selinux selinux 38

Example Architecture Trust Trust Active ActiveDirectory Directory IdM IdM Server Server Business BusinessApplication Application IdP IdP Modules Modules SSSD SSSD Certmonger Certmonger 39

Cost Effectiveness 40

What is the cost? All mentioned components and solutions are provided using Red Hat Enterprise without extra charge No third party vendors involved Deployment is easy and integrated saves time The main cost is server side subscriptions, but one server can serve about 2-3K clients 41

Use Cases in Works 42

Use Cases in the Pipeline Integration of different products in Red Hat portfolio Smart Card authentication Central key store User lifecycle management One-way trusts DNSSEC 43

Future considerations Global catalog support Authentication indicator in tickets Integration with Samba 4 DC Full smart card management capabilities IdM to IdM trusts 44

Pointers and Resources 45

Resources Blog: http://rhelblog.redhat.com/author/dpalsecam/ Red Hat Documentation: https://access.redhat.com/documentation/en-us/red_hat_enterprise_/ Demo community instance of IdM (FreeIPA): http://www.freeipa.org/page/demo Demo community instance of Ipsilon: https://saml.redhat.com/idp/ 46

Questions! What use cases do you want us to address? What challenges do you have in your environment that we did not discuss in this presentation? 47

48