SSSD AD Provider: Access Control



Similar documents
System Security Services Daemon

AD Integration options for Linux Systems

Integrating Linux systems with Active Directory

SSSD DNS Improvements in AD Environment

Owner of the content within this article is Written by Marc Grote

Configuring User Identification via Active Directory

SSSD Active Directory Improvements

Interoperability Update: Red Hat Enterprise Linux 7 beta and Microsoft Windows

Advancements in Linux Authentication and Authorisation using SSSD

Getting Started with Clearlogin A Guide for Administrators V1.01

Active Directory Manager Pro New Features

Introduction to Directory Services

Identity Management based on FreeIPA

SSSD. Client side identity management. LinuxAlt 2012 Jakub Hrozek 3. listopadu 2012

CAC AND KERBEROS FROM VISION TO REALITY

Protected Trust Directory Sync Guide


CISNTWK-492e. Microsoft Exchange Server 2003 Administration. Chapter Five Managing Addresses

Group Management Server User Guide

FreeIPA 3.3 Trust features

Admin Report Kit for Active Directory

FreeIPA Client and Server

Configuring and Using the TMM with LDAP / Active Directory

Red Hat Identity Management

Integrating Webalo with LDAP or Active Directory

FreeIPA Cross Forest Trusts

QUESTION: 1 What is purpose of the File Based Search in Symantec Clearwell ediscovery Platform 7.x?

SSSD and OpenSSH Integration

Integrating LANGuardian with Active Directory

Active Directory Integration

Using LDAP for User Authentication

CA Performance Center

LDAP and Active Directory Guide

Group Policy and Organizational Unit Re-Structuring Template

Hadoop Elephant in Active Directory Forest. Marek Gawiński, Arkadiusz Osiński Allegro Group

FreeIPA - Open Source Identity Management in Linux

SHARING FILE SYSTEM RESOURCES

How to build an Identity Management System on Linux. Simo Sorce Principal Software Engineer Red Hat, Inc.

Using different Security Policies on Group Level for AD within one Portal. SSL-VPN Security on Group Level. Introduction

SecureAware on IIS8 on Windows Server 2008/- 12 R2-64bit

Websense Support Webinar: Questions and Answers

External and Federated Identities on the Web

RHEL Clients to AD Integrating RHEL clients to Active Directory

Identity Management: The authentic & authoritative guide for the modern enterprise

Active Directory Requirements and Setup

Open Directory. Contents. Before You Start 2. Configuring Rumpus 3. Testing Accessible Directory Service Access 4. Specifying Home Folders 4

Getting Started With Delegated Administration

Administering Group Policy with Group Policy Management Console

Configuring Sponsor Authentication

Summer Webinar Series

Active Directory LDAP

Using LDAP Authentication in a PowerCenter Domain

CA Nimsoft Monitor. Probe Guide for Active Directory Response. ad_response v1.6 series

Tool Tip. SyAM Management Utilities and Non-Admin Domain Users

How to Audit the 5 Most Important Active Directory Changes

360 Online authentication

ECAT SWE Exchange Customer Administration Tool Web Interface User Guide Version 6.7

Managing Identity & Access in On-premise and Cloud Environments. Ellen Newlands Identity Management Product Manager Red Hat, Inc

How To - Implement Clientless Single Sign On Authentication in Single Active Directory Domain Controller Environment

Blending FreeIPA in a Certificate Infrastructure

Configuring Web services

Active Directory 2008 Implementation. Version 6.410

How to configure the Panda GateDefender Performa explicit proxy in a Local User Database or in a LDAP server

Executive Summary. What is Authentication, Authorization, and Accounting? Why should I perform Authentication, Authorization, and Accounting?

Desktop Web Access Single Sign-On Configuration Guide

Handling POSIX attributes for trusted Active Directory users and groups in FreeIPA

LinuxCon North America

Microsoft. Jump Start. M11: Implementing Active Directory Domain Services

UPGRADING TO XI 3.1 SP6 AND SINGLE SIGN ON. Chad Watson Sr. Business Intelligence Developer

In this topic we will cover the security functionality provided with SAP Business One.

Microsoft Project Server 2010 Administrator's Guide

Secrets of Event Viewer for Active Directory Security Auditing Lepide Software

SchoolBooking LDAP Integration Guide

Administration Guide. WatchDox Server. Version 4.8.0

How to Implement the X.509 Certificate Based Single Sign-On Solution with SAP Netweaver Single Sign-On

Core Protection Suite

Cross-Realm Trust Interoperability, MIT Kerberos and AD

Configuring CQ Security

Important Information

LDAP Implementation AP561x KVM Switches. All content in this presentation is protected 2008 American Power Conversion Corporation

ADFS for. LogMeIn and join.me authentication

Managing User Accounts

Monitoring Windows Event Logs

Dashboard Admin Guide

InfoRouter LDAP Authentication Web Service documentation for inforouter Versions 7.5.x & 8.x

DHCP Server. Heng Sovannarith

Field Description Example. IP address of your DNS server. It is used to resolve fully qualified domain names

Centrify Cloud Connector Deployment Guide

Create, Link, or Edit a GPO with Active Directory Users and Computers

Configuring Sites and Understanding AD replication. Dante Villarroel Saavedra

Owner of the content within this article is Written by Marc Grote

<Insert Picture Here> PeopleTools Security, What's New in PeopleTools 8.50

TechJam Active Directory Auditing Presenter Matt Warburton Professional Services

Admin Quick Start Guide Protection Service Anti-Virus & Anti-Spam

Lesson Plans LabSim for Microsoft s Implementing a Server 2003 Active Directory Infrastructure

Transcription:

FreeIPA 3.3 Training Series SSSD AD Provider: Access Control Pavel Reichl February 2014

Contents of presentation 1.Need for access control 2.Simple Access Provider 3.LDAP Access Provider 4.Active Directory Access Provider 5.Group nesting example 6.Summary 7.Sources of further information 2 FreeIPA 3.3 Training Series

Need for access control (AC) Default configuration of the Active Directory provider enables only checking for an account expiration Admins need more power to specify AC, namely: Define access for: Users Groups of users Use a custom filtering mechanism: Restrict permitted values of user's attributes (e.g. user's home directory) Use a combination of multiple conditions 3 FreeIPA 3.3 Training Series

Existing solutions FreeIPA 3.3 Training Series

Simple Access Provider Granting or denying access for objects is based on a content of allow and deny lists: simple_allow_users/simple_deny_users list of allowed/denied users simple_allow_groups/simple_deny_groups list of allowed/denied groups Simple rules providing access control: If any "allow" list is provided, all users are denied unless they appear in the list If any "deny" list is provided, all users are granted access unless they appear in the list. It is an error to define both simple_allow_users and simple_deny_users 5 FreeIPA 3.3 Training Series

Simple Access Provider: example Setting environment: Membership Cats Pets jerry X X spike X member tom member member Example SSSD rules: access_provider = simple simple_allow_users = jerry, tom simple_allow_groups = pets simple_deny_groups = cats Results: Granted access to: jerry and spike Denied access to: tom (denying rules take precedence over allowing rules) 6 FreeIPA 3.3 Training Series

Simple Access Provider: example cont. While logging it may be necessary to use Fully Qualified Names su jerry@ad.domain e.g. Instead of simple su jerry This depends on configuration option use_fully_qualified_names By default set to FALSE If AD domain was joined using realmd it is explicitly set to TRUE 7 FreeIPA 3.3 Training Series

Simple Access Provider: pros & cons Pros: Easy to configure realmd support Cons: Account expiration is not checked Limited expressiveness: No way to combine several clauses Does not align with the LDAP structure the Active Directory uses 8 FreeIPA 3.3 Training Series

LDAP Access Provider (deprecated) Good things: Allows to base AC on a custom LDAP filter Possible to combine several conditions Conditions are not limited to user names or group membership 9 FreeIPA 3.3 Training Series

LDAP Access Provider (deprecated) cont. Bad things: Nontrivial and clumsy configuration (beats the whole purpose of the AD provider) The admin needs to combine AD and LDAP providers Combining different providers can have strange side effects An account expiration check must be configured separately, which is not obvious No support for users from trusted AD domains No realmd integration 10 FreeIPA 3.3 Training Series

New Access Provider FreeIPA 3.3 Training Series

Active Directory Access Provider New access filter option to AD access provider Greatly simplified configuration when compared to the LDAP access control The very same expressiveness as ldap_access_filter More advanced format can be used to restrict the filter to a specific domain or a specific forest Supersedes LDAP Access Provider 12 FreeIPA 3.3 Training Series

Comparison of configuration LDAP Access Provider access_provider = ldap ldap_access_order = filter, expire ldap_account_expire_policy = ad ldap_access_filter = (&(memberof=cn=admins,ou=groups,dc=example,dc=com)(unixhomedirectory=*)) ldap_sasl_mech = GSSAPI ldap_sasl_authid = CLIENT_SHORTNAME$@EXAMPLE.COM ldap_schema = ad Active Directory Access Provider access_provider = ad ad_access_filter = (&(memberof=cn=admins,ou=groups,dc=example,dc=com)(unixhomedirectory=*)) 13 FreeIPA 3.3 Training Series

Active Directory Access Provider: pros & cons Pros Easy and intuitive configuration. Only one provider type is configured Cons Sane defaults - always checks for expiration No realmd integration 14 FreeIPA 3.3 Training Series

Group nesting: example Example environment: Goal User bob is member of professors Group research_staff is member of group staff Group professors is member of group research_staff Limit access only to members of staff Simple Access Provider (SAP): access_provider = simple simple_allow_groups = staff Access will be GRANTED for user bob because SAP supports indirect membership 15 FreeIPA 3.3 Training Series

Group nesting: example cont. Active Directory Access Provider: access_provider = ad ad_access_filter = (memberof=cn=staff,cn=users,dc=ad-example,dc=test) Access for Bob will be DENIED, because indirect membership is not supported by AD Access Provider To grant access for indirect members the filter must be expanded for all indirect groups access_provider = ad ad_access_filter = ( ( (memberof=cn=research_staff,cn=users,dc=ad-example,dc=test) (memberof=cn=staff,cn=users,dc=ad-example,dc=test)) (memberof=cn=professors,cn=users,dc=ad-example,dc=test)) 16 FreeIPA 3.3 Training Series

SSSD AD Provider Access Control: Summary Simple Access Provider LDAP Access Provider AD Access Provider Configuration difficulty Nested group membership Easy Hard Medium Supported Not supported Not supported Expressiveness Limited to allowed/denied lists of users and groups Complex queries Complex queries When to use When allow/deny lists are sufficient If AD Access Provider is not available If Simple Access Provider is not enough 17 FreeIPA 3.3 Training Series

Sources for further reading Design Docs: Active Directory Access Control https://fedorahosted.org/sssd/wiki/designdocs/activedirectoryaccesscontrol How to: Configure SSSD with AD server https://fedorahosted.org/sssd/wiki/configuring_sssd_with_ad_server Manual pages: sssd-ad sssd-ldap sssd-simple 18 FreeIPA 3.3 Training Series