Integrating Red Hat Enterprise Linux 6 with Microsoft Active Directory Presentation



Similar documents
Interoperability Update: Red Hat Enterprise Linux 7 beta and Microsoft Windows

Integrating Red Hat Enterprise Linux 6 with Active Directory. Mark Heslin Principal Software Engineer

Integrating Linux systems with Active Directory

Integration with Active Directory. Jeremy Allison Samba Team

Advancements in Linux Authentication and Authorisation using SSSD

Integrating UNIX and Linux with Active Directory. John H Terpstra

RHEL Clients to AD Integrating RHEL clients to Active Directory

Going in production Winbind in large AD domains today. Günther Deschner (Red Hat / Samba Team)

CAC AND KERBEROS FROM VISION TO REALITY

Handling POSIX attributes for trusted Active Directory users and groups in FreeIPA

SUSE Manager 1.2.x ADS Authentication

FreeIPA Cross Forest Trusts

Identity Management: The authentic & authoritative guide for the modern enterprise

Active Directory and Linux Identity Management

Building Open Source Identity Management with FreeIPA. Martin Kosek

FreeIPA 3.3 Trust features

Red Hat Identity Management

Identity Management based on FreeIPA

SSSD Active Directory Improvements

Red Hat Enterprise Identity (IPA) Centralized Management of Identities & Authentication

AD Integration options for Linux Systems

Managing Identity & Access in On-premise and Cloud Environments. Ellen Newlands Identity Management Product Manager Red Hat, Inc

Univention Corporate Server. Operation of a Samba domain based on Windows NT domain services

System Security Services Daemon

Using SUSE Linux Enterprise Desktop with Microsoft * Active Directory Infrastructure

LinuxCon North America

Migration of Windows Intranet domain to Linux Domain Moving Linux to a Wider World

How to build an Identity Management System on Linux. Simo Sorce Principal Software Engineer Red Hat, Inc.

CONFIGURING ACTIVE DIRECTORY IN LIFELINE

Allowing Linux to Authenticate to a Windows 2003 AD Domain. Prepared by. Thomas J. Munn, CISSP 11-May-06

Cross-Realm Trust Interoperability, MIT Kerberos and AD

Samba. Samba. Samba 2.2.x. Limitations of Samba 2.2.x 1. Interoperating with Windows. Implements Microsoft s SMB protocol

Implementing Linux Authentication and Authorisation Using SSSD

Windows Security and Directory Services for UNIX using Centrify DirectControl

Active Directory Integration

Samba and Vista with IPv6

Intel Entry Storage System SS4200-E Active Directory Implementation and Troubleshooting

Samba as an Active Directory Domain Controller

Using Single Sign-on with Samba. Appendices. Glossary. Using Single Sign-on with Samba. SonicOS Enhanced

IPA Identity, Policy, Audit Karl Wirth, Red Hat Kevin Unthank, Red Hat

ICANWK504A Design and implement an integrated server solution

Samba on HP StorageWorks Enterprise File Services (EFS) Clustered File System Software

FreeIPA - Open Source Identity Management in Linux

Integrating Lustre with User Security Administration. LAD 15 // Chris Gouge // 2015 Sep

Red Hat Enterprise ipa

Configure Samba with ACL and Active Directory integration Robert LeBlanc BioAg Computer Support, Brigham Young University

Unifying Authorization Models

Integrated Approach to User Account Management

Domain Services for Windows Administration Guide

USING USER ACCESS CONTROL LISTS (ACLS) TO MANAGE FILE PERMISSIONS WITH A LENOVO NETWORK STORAGE DEVICE

Using Samba to play nice with Windows. Bill Moran Potential Technologies

Centrify-Enabled Samba

Bring Linux into Microsoft s ADS

How To Install Ctera Agent On A Pc Or Macbook With Acedo (Windows) On A Macbook Or Macintosh (Windows Xp) On An Ubuntu (Windows 7) On Pc Or Ipad

Quality Center LDAP Guide

Windows Services. Support Windows and mixed-platform workgroups with high-performance, affordable network services. Features

Domain Services for Windows Administration Guide

External and Federated Identities on the Web

Samba's AD DC: Samba 4.2 and Beyond. Presented by Andrew Bartlett of Catalyst //

Attunity RepliWeb PAM Configuration Guide

IBM Cloud Manager with OpenStack

SSSD. Client side identity management. LinuxAlt 2012 Jakub Hrozek 3. listopadu 2012

Clustered CIFS For Everybody Clustering Samba With CTDB. LinuxTag 2009

Single Sign-on (SSO) technologies for the Domino Web Server

Mac OS X and Directory Services Integration

identity management in Linux and UNIX environments

Mac OS X Directory Services

Open Directory. Apple s standards-based directory and network authentication services architecture. Features

Domain Services for Windows Administration Guide

Linux Windows Inter-operablity

CSE 265: System and Network Administration

SerNet. Samba Status Update. Linuxkongress Hamburg October 10, Volker Lendecke SerNet Samba Team. Network Service in a Service Network

IDENTITIES, ACCESS TOKENS, AND THE ISILON ONEFS USER MAPPING SERVICE

OVERVIEW OF TYPICAL WINDOWS SERVER ROLES

Centralized Mac Home Directories On Windows Servers: Using Windows To Serve The Mac

WINDOWS 2000 Training Division, NIC

Univention Corporate Server. Extended domain services documentation

Managing Celerra for the Windows Environment

ILIAS SINGLE-SIGN-ON WITH APACHE AND KERBEROS

Configuring Squid Proxy, Active Directory Authentication and SurfProtect ICAP Access

Single Sign On. Configuration Checklist for Single Sign On CHAPTER

Authentication in a Heterogeneous Environment

Hadoop Elephant in Active Directory Forest. Marek Gawiński, Arkadiusz Osiński Allegro Group

This means that any user from the testing domain can now logon to Cognos 8 (and therefore Controller 8 etc.).

Kangaroot SUSE TechUpdate Interoperability SUSE Linux Enterprise and Windows

Collax Active Directory

Red Hat Enterprise IPA Identity & Access Management for Linux and Unix Environments. Dragos Manac

Solaris CIFS Service CIFS. Alan Wright

User-ID Best Practices

Active Directory integration with CloudByte ElastiStor

Active Directory and DirectControl

Installing Squid with Active Directory Authentication

Communication Ports Used by Citrix Technologies. April 2011 Version 1.5

Implementing Microsoft Azure Infrastructure Solutions

Load Balancing and High availability using CTDB + DNS round robin

Communication ports used by Citrix Technologies. July 2011 Version 1.5

FreeIPA v3: Trust Basic trust setup

CIFS/NFS Gateway Product Release Notes. Version May 2015 Revision A0

Skyward LDAP Launch Kit Table of Contents

Transcription:

Integrating Red Hat Enterprise Linux 6 with Microsoft Active Directory Presentation

Agenda Overview Components Considerations Configurations Futures Summary

What is needed? Thorough understanding components, interactions Awareness of technical, non-technical considerations Comparison of configurations, options Best practices, guidelines Assistance in making a selection

Windows Consumer Perception To the cloud...yay cloud

Windows Systems Reality Help!

Overview Components Considerations Configurations Futures Summary

Components - Overview Red Hat Enterprise Linux Windows Server 2008 R2 Active Directory Kerberos LDAP SSSD Samba SMB/CIFS Winbind NSS DNS NTP * Let's examine several core components closer *

Active Directory Domain Services (AD DS) Suite of directory services Customized versions: Kerberos Domain Name System (DNS) Lightweight Directory Access Protocol (LDAP) Object hierarchy nodes, trees, forests, domains Renamed in Windows Server 2008 R2 * Included Windows Server 2008 R2 (Server Role) *

Samba Open source suite of programs Provides file and print services Includes two daemons: smbd (file and print services) nmbd (NetBIOS name server) Samba v3.5 is current version (RHEL 6) * Behavior configured by /etc/samba/smb.conf *

SMB/CIFS Client-server communications protocols Server Message Block (SMB) - IBM developed Common Internet File System (CIFS) MS extended Both protocols used interchangeably SMB older, legacy servers (Windows 2000) * Samba supports both protocols *

Winbind (1) Daemon included with Samba suite Unified logon to Active Directory accounts Minimizes need for separate accounts Primary functions: Authentication of user credentials ( Who ) ID Tracking/Name Resolution via nsswitch ( Where ) ID Mapping of UID/GID <-> SID ( What )

Winbind (2)

Winbind (3) ID Mapping implemented through backends ~8 backends available ID Mappings classified as: Allocating (r/w, local) Algorithmic (r/o, calculated, consistent) Assigned (r/o, assigned in AD, consistent) Each has advantages, disadvantages * See Reference Architecture for further details *

SSSD (System Security Services Daemon) RHEL systems members of centralized IdM solution (Active Directory, IPA, LDAP, Kerberos) Access to different identity, authentication providers (e.g. - LDAP native, LDAP w/kerberos) Extensible (new identity, authentication sources) Supports off-line caching (clients) Reduces load on identity servers * Extensible, enhanced alternative to Winbind *

Kerberos Current version = V5 Clients request ticket from trusted third party (KDC) Key distribution center (KDC) = AD server Behavior configured by /etc/krb5.conf Managed by PAM libraries: pam_winbind (Samba), pam_sss (SSSD), pam_krb5 Integration best practice: * Install krb5-workstation for testing/troubleshooting *

Overview Components Considerations Configurations Futures Summary

Non-technical Considerations Organizational Alignment Expertise Levels Scope/Complexity Prototype Project Deployment

Technical Considerations File Sharing File sharing required? Yes = Samba based configuration No = Samba or non-samba ok Where are file shares located? Client side? Server side? * Red Hat Enterprise Linux supports both roles *

Technical Considerations Login Access Red Hat Enterprise Linux login access required? Command Line Interface (CLI) Graphical Display Manager (GDM) Local vs. Active Directory accounts Local accounts = more administration Active Directory = centralized administration * Active Directory accounts require AD integration *

Technical Considerations AD ID Attributes RFC2307/bis Extends UNIX ID attributes via LDAP Provides more flexibility, control (home dir, shell) Enabling in Windows Server 2008 R2 => Identity Management for UNIX (IMU) role 2008, 2003 R2 => Identity Management for UNIX (IMU) service 2003 and earlier => Windows Services for UNIX (SFU) service * Organizational policy may restrict use *

Technical Considerations Enumeration Winbind listing of users, groups in AD domain Default behavior during user login, authentication More users = longer login time Integration best practice: * Disable in environments 20,000+ users * /etc/samba/smb.conf [global] winbind enum users = no winbind enum groups = no

Technical Considerations LDAP Referrals LDAP in Active Directory scales out over time Objects relocate across multiple domain controllers LDAP referral Responding domain controller can't find object Clients contact multiple controllers to complete lookup Integration best practice: * Disable for performance (if no partial replication) * /etc/sssd/sssd.conf ldap_disable_referrals = true

Overview Components Considerations Configurations Futures Summary

Recommended Configurations - Overview Configuration 1. Samba/Winbind (idmap_rid) 2. Samba/Winbind (idmap_ad) 3. SSSD/Kerberos/ LDAP 4. Kerberos/LDAP Services Provided Features File sharing Login access File sharing Login access Login access Login access Templated shell, home dirs Least intrusive to AD (No user/group ID attribute changes) Algorithmic ID mappings Customizable shell, home dirs Centralized user mgmt Assigned ID mappings User/group ID attributes set in AD (requires IMU) Advanced authentication, caching Reduces client loading on server User/group ID attributes set in AD (requires IMU) No off-line caching user credentials User/group ID attributes set in AD (requires IMU) Use Case Template-driven Customizable Enhanced Legacy * See Reference Architecture for details *

Configuration 1 (winbind idmap_rid) Template-driven

Configuration 1 (Authentication and ID Components )

Configuration 2 (winbind - idmap_ad) Customizable

Configuration 2 (Authentication and ID Components )

Configuration 3 (SSSD/Kerberos/LDAP) Enhanced

Configuration 3 (Authentication and ID Components )

Configuration 4 (Kerberos/LDAP) Legacy

Configuration 4 (Authentication and ID Components )

Overview Components Considerations Configurations Futures Summary

Futures Winbind idmap_autorid New backend for Samba 3.6/RHEL 6.4 Automatically allocates domain ranges SSSD Active Directory domain trust support (RHEL 6.4) New AD integration capabilites - ID Mapping, etc. (RHEL 6.4+) Fully featured, enhanced alternative to Winbind Red Hat Enterprise Linux 7 Windows interoperability remains high focus

Overview Components Considerations Configurations Futures Summary

Summary (1) First glance deceptively simple Second glance appears overwhelming Many variables, components, interactions Reference Architecture simplifies selection, deployment and integration: https://www.redhat.com/resourcelibrary/reference-architectures/ integrating-red-hat-enterprise-linux-6-with-active-directory See Customer Portal for additional materials: https://access.redhat.com/knowledge/

Summary (2) Select best configuration for your environment, organizational goals Hybrid configurations ok to consider Third-party products viable alternatives Prototype, test in advance Most issues have simple causes Red Hat Enterprise Linux integrates well with Windows Active Directory