AD Integration options for Linux Systems



Similar documents
Integrating Linux systems with Active Directory

Red Hat Identity Management

Identity Management: The authentic & authoritative guide for the modern enterprise

Red Hat Enterprise Identity (IPA) Centralized Management of Identities & Authentication

Identity Management based on FreeIPA

LinuxCon North America

How to build an Identity Management System on Linux. Simo Sorce Principal Software Engineer Red Hat, Inc.

Interoperability Update: Red Hat Enterprise Linux 7 beta and Microsoft Windows

FreeIPA 3.3 Trust features

Cross-Realm Trust Interoperability, MIT Kerberos and AD

SSSD. Client side identity management. LinuxAlt 2012 Jakub Hrozek 3. listopadu 2012

Handling POSIX attributes for trusted Active Directory users and groups in FreeIPA

Managing Identity & Access in On-premise and Cloud Environments. Ellen Newlands Identity Management Product Manager Red Hat, Inc

Advancements in Linux Authentication and Authorisation using SSSD

SSSD Active Directory Improvements

Integration with Active Directory. Jeremy Allison Samba Team

FreeIPA Client and Server

CAC AND KERBEROS FROM VISION TO REALITY

Building Open Source Identity Management with FreeIPA. Martin Kosek

FreeIPA - Open Source Identity Management in Linux

FreeIPA v3: Trust Basic trust setup

SSSD DNS Improvements in AD Environment

Integrating Red Hat Enterprise Linux 6 with Microsoft Active Directory Presentation

FreeIPA Cross Forest Trusts

External and Federated Identities on the Web

SSSD AD Provider: Access Control

Red Hat Enterprise ipa

IPA Identity, Policy, Audit Karl Wirth, Red Hat Kevin Unthank, Red Hat

SUSE Manager 1.2.x ADS Authentication

Samba's AD DC: Samba 4.2 and Beyond. Presented by Andrew Bartlett of Catalyst //

RHEL Clients to AD Integrating RHEL clients to Active Directory

FreeIPA Client and Server

System Security Services Daemon

Active Directory Integration

Implementing Linux Authentication and Authorisation Using SSSD

Fedora 18 FreeIPA: Identity/ Policy Management

Centrify Server Suite Management Tools

Integrating UNIX and Linux with Active Directory. John H Terpstra

Going in production Winbind in large AD domains today. Günther Deschner (Red Hat / Samba Team)

Fedora 17 FreeIPA: Identity/ Policy Management

Mac OS X Directory Services

Designing and Implementing a Server Infrastructure

Setting up a DNS MX Record for mail.corp.com p. 327 Installing Fedora on the Front-End Mail Server with the Postfix and SpamAssassin Packages

Allowing Linux to Authenticate to a Windows 2003 AD Domain. Prepared by. Thomas J. Munn, CISSP 11-May-06

Enabling single sign-on for Cognos 8/10 with Active Directory

SSSD and OpenSSH Integration

Migration of Windows Intranet domain to Linux Domain Moving Linux to a Wider World

Authentication in a Heterogeneous Environment

Designing and Implementing a Server Infrastructure MOC 20413

Collax Active Directory

Active Directory and Linux Identity Management

Unifying Authorization Models

PKI Made Easy: Managing Certificates with Dogtag. Ade Lee Sr. Software Engineer Red Hat, Inc

Centralized Mac Home Directories On Windows Servers: Using Windows To Serve The Mac

How To Use 1Bay 1Bay From Awn.Net On A Pc Or Mac Or Ipad (For Pc Or Ipa) With A Network Box (For Mac) With An Ipad Or Ipod (For Ipad) With The

Centrify Identity and Access Management for Cloudera

Security and Rights Delegations for the Password Reset PRO Master Service Applies to software versions 2.x.x and 3.x.x

Coveo Platform 7.0. Microsoft SharePoint Connector Guide

Implementing Domain Name Service (DNS)

VNLINFOTECH JOIN US & MAKE YOUR FUTURE BRIGHT. mcsa (70-413) Microsoft certified system administrator. (designing & implementing server infrasturcure)

Microsoft Active Directory and Windows Security Integration with Oracle Database

Domain Services for Windows: Best Practices Guide

identity management in Linux and UNIX environments

RH033 Red Hat Linux Essentials or equivalent experience with Red Hat Linux..

Mod 2: User Management

Univention Corporate Server. Operation of a Samba domain based on Windows NT domain services

MS 20413A: Designing and Implementing a Server Infrastructure

Designing and Implementing a Server Infrastructure

Managing Your Microsoft Windows Server Fleet with AWS Directory Service. May 2015

Synology NAS Server Windows ADS FAQ

The Definitive Guide. Active Directory Troubleshooting, Auditing, and Best Practices Edition Don Jones

Presto User s Manual. Collobos Software Version Collobos Software, Inc!

ACE Management Server Deployment Guide VMware ACE 2.0

Designing and Implementing a Server Infrastructure

Charles Firth Managing Macs in a Windows World

Oracle Linux Advanced Administration

Integrating Red Hat Enterprise Linux 6 with Active Directory. Mark Heslin Principal Software Engineer

Security Provider Integration Kerberos Authentication

8.0 for LINUX UNIX. What s New Document. Expand 2.1. Learn more at

Designing and Implementing a Server Infrastructure

Best Practices: Integrating Mac OS X with Active Directory. Technical White Paper April 2009

Application Note: Cisco Integration with Onsight Connect

NETASQ SSO Agent Installation and deployment

insync Installation Guide

Georgia Tech Active Directory Policy

V Series Rapid Deployment Version 7.5

File Services. File Services at a Glance

Open Directory. Apple s standards-based directory and network authentication services architecture. Features

Integrated Approach to User Account Management

Intel Entry Storage System SS4200-E Active Directory Implementation and Troubleshooting

Security Provider Integration Kerberos Server

Polycom RealPresence Resource Manager System Getting Started Guide

Cloud Services. Sharepoint. Admin Quick Start Guide

How to Configure Active Directory based User Authentication

Transcription:

AD Integration options for Linux Systems Overview Dmitri Pal Developer Conference. Brno. 2013

Agenda Problem statement Aspects of integration Options Questions

Problem Statement For most companies AD is the central hub of the user identity management inside the enterprise All systems that AD users can access (including Linux) need (in some way, i.e. directly or indirectly) to have access to AD to perform authentication and identity lookups In some cases the AD is the only allowed central authentication server due to compliance requirements In some cases DNS is tightly controlled by the Windows side of the enterprise and non Windows systems need to adapt to this

Aspects of integration Authentication Identity lookup User logs into a Linux system, how he is authenticated? How system knows about the right accounts? How AD accounts are mapped to POSIX? Name resolution and service discovery How system knows where is its authentication and identity server? Policy management How other identity related policies are managed on the system?

Third Party Integration Option AD 3 rd Party Plugin Policies via GPO DNS KDC ID mapping is implementation specific or uses SFU/IMU extensions in AD Linux System Client may also use native AD protocols Authentication can use or Kerberos 3 rd party client Authentication Identities Name resolution Policies sudo hbac automount selinux

Pros and Cons of the 3 rd Party Option Pros Everything is managed in one place including policies Cons Requires third party vendor Extra cost per system (adds up) Limits UNIX/Linux environment independence Requires software on AD side

Legacy Integration Option AD AD can be extended to serve basic sudo and automount DNS KDC ID mapping uses SFU/IMU extensions in AD Policies are delivered via configuration files managed locally or via a config server like Puppet Linux System Authentication can use or Kerberos /KRB Authentication Identities Name resolution Policies sudo hbac automount selinux

Pros and Cons of the Legacy Option Pros: Free No third party vendor is needed Intuitive Cons: Requires SFU/IMU AD extension Policies are not centrally managed Hard to configure securely

Traditional Integration Option AD AD can be extended to serve basic sudo and automount DNS KDC Map AD SID to POSIX attributes Join system into AD domain Uses native AD protocols Policies are delivered via configuration files managed locally or via a config server like Puppet Linux System Authentication can use or Kerberos Winbind Authentication Identities Name resolution Policies sudo hbac automount selinux

Pros and Cons of the Traditional Option Pros: Well known Does not require third party Does not require SFU/IMU Supports trusted domains Cons: Can connect only to AD and very MSFT focused Has some perceived stability issues Community is hard to deal with

Contemporary Integration Option AD AD can be extended to serve basic sudo and automount DNS KDC Can map AD SID to POSIX attributes Can join system into AD domain Policies are delivered via configuration files managed locally or via a config server like Puppet Linux System Authentication can use or Kerberos SSSD Authentication Identities Name resolution Policies sudo hbac automount selinux

Pros and Cons of the Contemporary Option Pros: Does not require third party Does not require SFU/IMU (SSSD 1.9) Supports trusted domains with FreeIPA (SSSD 1.9) Supports heterogeneous environments Cons: Does not support transitive trusts in AD domains (1.10) Does not support some advance AD optimizations (1.10)

Option Comparison Feature /KRB Winbind SSSD Authenticate using Kerberos or Yes Yes Yes Identities are looked up in AD Yes Yes Yes Requires SFU/IMU Yes No No ID mapping None Multiple ways One way starting SSSD 1.9 Domain ranges System is joined into AD Manual Has join utility Samba join utility needs to be used (realmd project makes it easy) Supports transitive trusts for AD domains Supports heterogeneous domains No Yes Will in SSSD 1.10 No No Yes Support advanced AD features No Yes Some

Current Plan Evolve SSSD to get in full feature parity with Winbind and bypass it in some areas (SSSD 1.10 and after) Do not reinvent the wheel, rather package elements of samba winbind as libraries and consume those libraries in SSSD Augment SSSD with realmd for easier enrollment into AD or FreeIPA (Fedora 18/19)

Limitations of the Direct Integration Options Policy management is left out Per system CALs add to cost Linux/UNIX administrators do not have control of the environment All these limitations prevent growth of the Linux environment inside the enterprise!

FreeIPA Based Integration (sync) AD Users are synchronized from AD to IdM FreeIPA Policies are centrally managed over DNS KDC DNS KDC A DNS zone is delegated by AD to IdM to manage Linux environment Linux System Name resolution and service discovery queries are resolved against IdM SSSD Authentication Identities Name resolution Policies sudo hbac automount selinux

Pros and Cons of the FreeIPA Integration Pros: Reduces cost no CALs or 3 rd party Policies are centrally managed Gives control to Linux admins Enabled independent growth of the Linux environment Cons: Requires user and password sync Authentication does not happen in AD Requires proper DNS setup

FreeIPA Based Integration (split brain) AD Users are synchronized from AD to IdM FreeIPA Policies are centrally managed over DNS KDC DNS KDC A DNS zone is delegated by AD to IdM to manage Linux environment Requires changes to config files after installation and initial client enrollment Name resolution and service discovery queries are resolved against IdM Linux System SSSD Policies Authentication sudo Identities hbac automount Name resolution selinux

Pros and Cons of the Split Brain Solution Pros: All authentication happens against AD Cons: We can t do clean upgrades from this configuration It is a manual configuration We do not recommend this configuration.

FreeIPA Based Integration (AD DNS) AD Users are synchronized from AD to IdM FreeIPA Policies are centrally managed over DNS KDC DNS KDC Requires changes to config files after installation and initial client enrollment (will be automated Name in RHEL 6.4) resolution queries are resolved against AD, no service discovery, all services are configured explicitly Linux System SSSD Policies Authentication sudo Identities hbac automount Name resolution selinux

Pros and Cons of Integration without FreeIPA DNS Pros: AD DNS is used Cons: Either each client needs to be explicitly configured with the list of the servers or AD DNS needs to configure a subdomain and clients should be configured to use this subdomain The service discovery is turned off or discovery is done via subdomain This option effectively more work for Linux admins because AD admins rule the environment.

FreeIPA AD Trust Integration Option AD Domains trust each other. Users stay where they are, no synchronization needed FreeIPA Policies are centrally managed over DNS KDC A DNS zone is delegated by AD to IdM to manage Linux systems or IdM has an independent namespace DNS KDC Linux System Client software connects to the right server depending on the information it needs SSSD Authentication Identities Name resolution Policies sudo hbac automount selinux

Pros and Cons of the FreeIPA Trust Integration Pros: Reduces cost no CALs or 3 rd party Policies are centrally managed Gives control to Linux admins Enabled independent growth of the Linux environment No synchronization required Authentication happens in AD Cons: Requires proper DNS setup Requires SSSD 1.9

Summary While direct integration is possible and in some cases required the FreeIPA based integration option is the most cost efficient and feature rich option that is currently available so it is recommended as a preferred choice for the integration of the Linux infrastructure into existing AD environments.

Questions?