Implementing Linux Authentication and Authorisation Using SSSD



Similar documents
Advancements in Linux Authentication and Authorisation using SSSD

Advanced Systems Management with Machinery

Build Platform as a Service (PaaS) with SUSE Studio, WSO2 Middleware, and EC2 Chris Haddad

Relax-and-Recover. Johannes Meixner. on SUSE Linux Enterprise 12.

Configuration Management in SUSE Manager 3

We are watching SUSE

Using SUSE Linux Enterprise to "Focus In" on Retail Optical Sales

Operating System Security Hardening for SAP HANA

Running SAP HANA One on SoftLayer Bare Metal with SUSE Linux Enterprise Server CAS19256

SUSE Storage. FUT7537 Software Defined Storage Introduction and Roadmap: Getting your tentacles around data growth. Larry Morris

Challenges Implementing a Generic Backup-Restore API for Linux

TUT5605: Deploying an elastic Hadoop cluster Alejandro Bonilla

SUSE Linux uutuudet - kuulumiset SUSECon:sta

SUSE Linux Enterprise 12 Security Certifications

Data Center Automation with SUSE Manager Federal Deployment Agency Bundesagentur für Arbeit Data Center Automation Project

SUSE Linux Enterprise 12 Security Certifications Common Criteria, EAL, FIPS, PCI DSS,... What's All This About?

HO15982 Deploy OpenStack. The SUSE OpenStack Cloud Experience. Alejandro Bonilla. Michael Echavarria. Cameron Seader. Sales Engineer

Using btrfs Snapshots for Full System Rollback

Installing, Tuning, and Deploying Oracle Database on SUSE Linux Enterprise Server 12 Technical Introduction

kgraft Live patching of the Linux kernel

SUSE Customer Center Roadmap

Public Cloud. Build, Use, Manage. Robert Schweikert. Public Cloud Architect

Big Data, SAP HANA. SUSE Linux Enterprise Server for SAP Applications. Kim Aaltonen

Deploying Hadoop with Manager

Ceph Distributed Storage for the Cloud An update of enterprise use-cases at BMW

Securing Your System: Security Hardening Techniques for SUSE Linux Enterprise Server

System Security Services Daemon

How To Make A Cloud Work For You

High Availability Storage

Workflow und Identity Management - Genehmigungsprozesse, Role Mining, Role Design und Compliance Management

DevOps and SUSE From check-in to deployment

Wicked A Network Manager Olaf Kirch

Software Defined Everything

How SUSE Is Helping You Rock The Public Cloud

Kangaroot SUSE TechUpdate Interoperability SUSE Linux Enterprise and Windows

SUSE Enterprise Storage Highly Scalable Software Defined Storage. Gábor Nyers Sales

Using SUSE Cloud to Orchestrate Multiple Hypervisors and Storage at ADP

SUSE Cloud 5 Private Cloud based on OpenStack

Wicked Trip into Wicked Network Management

High Availability and Disaster Recovery for SAP HANA with SUSE Linux Enterprise Server for SAP Applications

Integrating Linux systems with Active Directory

How an Open Source Cloud Will Help Keep Your Cloud Strategy Options Open

Apache LDAP Configuration

Btrfs and Rollback How It Works and How to Avoid Pitfalls

Oracle Products on SUSE Linux Enterprise Server 11

Of Pets and Cattle and Hearts

CAS18543 Migration from a Windows Environment to a SUSE Linux Enterprise based Infrastructure Liberty Christian School

Novell Collaboration Vibe OnPrem

SUSE OpenStack Cloud 4 Private Cloud Platform based on OpenStack. Gábor Nyers Sales gnyers@suse.com

Linux w chmurze publicznej SUSE na platformie Microsoft Azure

Integrating UNIX and Linux with Active Directory. John H Terpstra

HO5604 Deploying MongoDB. A Scalable, Distributed Database with SUSE Cloud. Alejandro Bonilla. Sales Engineer abonilla@suse.com

Identity Management based on FreeIPA

SSSD. Client side identity management. LinuxAlt 2012 Jakub Hrozek 3. listopadu 2012

Integrating Red Hat Enterprise Linux 6 with Microsoft Active Directory Presentation

Red Hat Identity Management

Identity Management: The authentic & authoritative guide for the modern enterprise

File Management Suite. Novell. Intelligently Manage File Storage for Maximum Business Benefit. Sophia Germanides

Leveraging Wikis to Manage SCP Documentation TWiki Novell Technical Services

Interoperability Update: Red Hat Enterprise Linux 7 beta and Microsoft Windows

CAC AND KERBEROS FROM VISION TO REALITY

Hadoop Elephant in Active Directory Forest. Marek Gawiński, Arkadiusz Osiński Allegro Group

RHEL Clients to AD Integrating RHEL clients to Active Directory

Managing Identity & Access in On-premise and Cloud Environments. Ellen Newlands Identity Management Product Manager Red Hat, Inc

Open Source High Availability Writing Resource Agents for your own services. Lars Marowsky-Brée Team Lead SUSE Labs

Handling POSIX attributes for trusted Active Directory users and groups in FreeIPA

Red Hat Enterprise Identity (IPA) Centralized Management of Identities & Authentication

SUSE Manager 1.2.x ADS Authentication

Integration with Active Directory. Jeremy Allison Samba Team

AD Integration options for Linux Systems

SSSD Active Directory Improvements

Active Directory and Linux Identity Management

Lecture No 01 Novell Products Open Enterprise Server 2 Preview By Haim Malool. Main features Preview

NIST ITL July 2012 CA Compromise

SMB in the Cloud David Disseldorp

Introducing Director 11

TUT19344 Managing RH/CentOS with SUSE Manager

Using SUSE Linux Enterprise Desktop with Microsoft * Active Directory Infrastructure

KVM, OpenStack and the Open Cloud SUSECon November 2015

SUSE Virtualization Technologies Roadmap

LinuxCon North America

Directory Integration in LANDesk Management Suite

Version 9. Active Directory Integration in Progeny 9

FreeIPA Cross Forest Trusts

Enabling Active Directory Authentication with ESX Server 1

TUT8155 Best Practices: Linux High Availability with VMware Virtual Machines

Manage Oracle Database Users and Roles Centrally in Active Directory or Sun Directory. Overview August 2008

An Oracle White Paper March Integrating Microsoft SharePoint Server With Oracle Virtual Directory

How To Secure An Rsa Authentication Agent

Web Security Firewall Setup. Administrator Guide

Boundary Encryption.cloud Deployment Process Overview

Oracle Directory Services Integration with Database Enterprise User Security O R A C L E W H I T E P A P E R F E B R U A R Y

Transcription:

Implementing Linux Authentication and Authorisation Using SSSD Lawrence Kearney Enterprise Service and Integration Specialist Technology Transfer Partnership (TTP) lawrence.kearney@earthlink.net Mark Robinson Trainer and Consultant mrlinux training & consultancy mark@mrlinux.co.uk

What is SSSD? SSSD package description: Provides a set of daemons to manage access to remote directories and authentication mechanisms. Provides an NSS and PAM interface toward the system and a pluggable backend system to connect to multiple different account sources. 2

What's In a Name? Seriously?! System Security Services Daemon We would have very happily accepted: Single Sign on Service Daemon Simple Sign on Solution Daemon Even: Simplesmente Autenticação Serviҫos Daemon 3

Moving On (There is Lab Work To Do...) What need is SSSD addressing? PAM and NSS frameworks have scaling caveats Specialised directories stores are proliferating Linux platforms as viable federation candidates Better Active Directory integration is more mission critical 4

SSSD Advantages Authentication service enhancements Greater extensibility Multiple concurrently available identity stores ID collision management features SSL/TLS or SASL/GSSAPI is required Single configuration file Reduced server loads Offline authentication 5

SSSD Disadvantages Microsoft Windows or Samba file shares Still require winbindd be configured and used (for now) NFS file shares May still require nscd but without user and group caching Migrating from configurations using id mapping can be more complex 6

The SSSD Configuration File SSSD Domain = Identity Provider + Authentication provider [sssd] services = domains = [nss], [pam], [sudo] reconnection_retries = filter_users = [domain/name] id_provider = auth_provider = chpass_provider = access_provider = Global parameters Service parameters SSSD domain parameters 7

SSSD Providers Local LDAP Kerberos AD Accounts are kept in a local database Relies on installed extensions of target directory Relies on installed extensions of target directory Supports many native Active Directory features ipa IdM Proxy Supports trusts with Active Directory domains Integrates tightly with IdM implementations Permits integration of other provider modules 8

SSSD Provider Roles Id, Authentication, Access Control and Changing Passwords id_provider = ldap, ipa, krb5, ad, proxy auth_provider = ldap, ipa, krb5, ad, proxy access_provider = permit, deny, ldap, ipa, ad, simple chpass_provider = ldap, ipa, krb5, ad, proxy, none Most providers fulfill multiple roles Different providers can, and often are combined 9

SSSD Processes SSSD uses a parent/child process monitoring model [sssd] Parent process, Monitor [nss] Child process, Responder [domain/ldap] Child process, Provider 10

SSSD Processes SSSD process example: ps -eaf grep sssd root 1476 1 0 /usr/sbin/sssd root 1478 1476 0 /usr/libexec/sssd/sssd_nss root 41279 1476 0 /usr/libexec/sssd/sssd_be --domain LDAP pstree -A -p 1476 sssd (1476) - + - sssd_be (41279) - sssd_nss (1478) 11

12 SSSD Architecture

Deploying SSSD Determine how posix attributes will be provided Provided by directory service or Linux ID mapping Install software on your platform Typically samba and kerberos are required for initial setups Not all distributions package SSSD similarly Configure transport security TLS/SSL for edirctory and Active Directory over LDAP SASL/GSSAPI for Active Directory over LDAP/kerberos Configure SSSD identity providers (and access providers?) 13

14 LDAP ID and Kerberos Auth Providers

SUSE Linux Enterprise 11 SSSD LDAP and Kerberos Providers

16 Active Directory ID and Auth Providers

SUSE Linux Enterprise 12 SSSD Active Directory Provider

Corporate Headquarters Maxfeldstrasse 5 90409 Nuremberg Germany +49 911 740 53 0 (Worldwide) www.suse.com Join us on: www.opensuse.org 18

Unpublished Work of SUSE LLC. All Rights Reserved. This work is an unpublished work and contains confidential, proprietary and trade secret information of SUSE LLC. Access to this work is restricted to SUSE employees who have a need to know to perform tasks within the scope of their assignments. No part of this work may be practiced, performed, copied, distributed, revised, modified, translated, abridged, condensed, expanded, collected, or adapted without the prior written consent of SUSE. Any use or exploitation of this work without authorization could subject the perpetrator to criminal and civil liability. General Disclaimer This document is not to be construed as a promise by any participating company to develop, deliver, or market a product. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. SUSE makes no representations or warranties with respect to the contents of this document, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. The development, release, and timing of features or functionality described for SUSE products remains at the sole discretion of SUSE. Further, SUSE reserves the right to revise this document and to make changes to its content, at any time, without obligation to notify any person or entity of such revisions or changes. All SUSE marks referenced in this presentation are trademarks or registered trademarks of Novell, Inc. in the United States and other countries. All third-party trademarks are the property of their respective owners.