Interoperability Update: Red Hat Enterprise Linux 7 beta and Microsoft Windows



Similar documents
Integrating Red Hat Enterprise Linux 6 with Microsoft Active Directory Presentation

Integrating Linux systems with Active Directory

Handling POSIX attributes for trusted Active Directory users and groups in FreeIPA

AD Integration options for Linux Systems

Identity Management: The authentic & authoritative guide for the modern enterprise

Building Open Source Identity Management with FreeIPA. Martin Kosek

FreeIPA 3.3 Trust features

Advancements in Linux Authentication and Authorisation using SSSD

SSSD Active Directory Improvements

Identity Management based on FreeIPA

Red Hat Enterprise Identity (IPA) Centralized Management of Identities & Authentication

Integrating Red Hat Enterprise Linux 6 with Active Directory. Mark Heslin Principal Software Engineer

Red Hat Identity Management

FreeIPA - Open Source Identity Management in Linux

RHEL Clients to AD Integrating RHEL clients to Active Directory

Active Directory and Linux Identity Management

LinuxCon North America

System Security Services Daemon

Allowing Linux to Authenticate to a Windows 2003 AD Domain. Prepared by. Thomas J. Munn, CISSP 11-May-06

Cross-Realm Trust Interoperability, MIT Kerberos and AD

FreeIPA Cross Forest Trusts

CAC AND KERBEROS FROM VISION TO REALITY

SSSD. Client side identity management. LinuxAlt 2012 Jakub Hrozek 3. listopadu 2012

Integration with Active Directory. Jeremy Allison Samba Team

How to build an Identity Management System on Linux. Simo Sorce Principal Software Engineer Red Hat, Inc.

Integrating UNIX and Linux with Active Directory. John H Terpstra

FreeIPA v3: Trust Basic trust setup

Going in production Winbind in large AD domains today. Günther Deschner (Red Hat / Samba Team)

Attunity RepliWeb PAM Configuration Guide

Migration of Windows Intranet domain to Linux Domain Moving Linux to a Wider World

Bring Linux into Microsoft s ADS

Univention Corporate Server. Extended domain services documentation

IPA Identity, Policy, Audit Karl Wirth, Red Hat Kevin Unthank, Red Hat

Authentication in a Heterogeneous Environment

SUSE Manager 1.2.x ADS Authentication

Managing Identity & Access in On-premise and Cloud Environments. Ellen Newlands Identity Management Product Manager Red Hat, Inc

Windows Security and Directory Services for UNIX using Centrify DirectControl

Red Hat Enterprise ipa

Implementing Linux Authentication and Authorisation Using SSSD

Configure Samba with ACL and Active Directory integration Robert LeBlanc BioAg Computer Support, Brigham Young University

Using Single Sign-on with Samba. Appendices. Glossary. Using Single Sign-on with Samba. SonicOS Enhanced

Integrating Lustre with User Security Administration. LAD 15 // Chris Gouge // 2015 Sep

Security with LDAP. Andrew Findlay. February Skills 1st Ltd

Active Directory Integration

Samba. Samba. Samba 2.2.x. Limitations of Samba 2.2.x 1. Interoperating with Windows. Implements Microsoft s SMB protocol

External and Federated Identities on the Web

Installing Squid with Active Directory Authentication

Hadoop Elephant in Active Directory Forest. Marek Gawiński, Arkadiusz Osiński Allegro Group

VINTELA AUTHENTICATION SERVICES

Using Active Directory as your Solaris Authentication Source

Unifying Authorization Models

Fedora 18 FreeIPA: Identity/ Policy Management

Mac OS X Directory Services

SSSD DNS Improvements in AD Environment

(june > this is version 3.025a)

Using SUSE Linux Enterprise Desktop with Microsoft * Active Directory Infrastructure

Fedora 17 FreeIPA: Identity/ Policy Management

Likewise Security Benefits

Network Startup Resource Center

Avaya CM Login with Windows Active Directory Services

Linux Windows Inter-operablity

Windows Enterprise OU Administrator Tips. Integrating RHEL5 Systems with Active Directory

How To Use Directcontrol With Netapp Filers And Directcontrol Together

Unified Authentication, Authorization and User Administration An Open Source Approach. Ted C. Cheng, Howard Chu, Matthew Hardin

How to Use Microsoft Active Directory as an LDAP Source with the Oracle ZFS Storage Appliance

Vintela Authentication from SCO Release 2.2. System Administration Guide

Integrated Approach to User Account Management

FreeIPA Client and Server

Domain Services for Windows Administration Guide

Active Directory and DirectControl

Using Active Directory to Authenticate Linux Users. Using Standard Protocols and Open Source Products

Skyward LDAP Launch Kit Table of Contents

Domain Services for Windows Administration Guide

6.1.2 Installing AD DS 7:45

CONFIGURING ACTIVE DIRECTORY IN LIFELINE

SSSD AD Provider: Access Control

Linuxdays 2005, Samba Tutorial

Intel Entry Storage System SS4200-E Active Directory Implementation and Troubleshooting

R4: Configuring Windows Server 2008 Active Directory

Virtualization Case Study

Configuring Squid Proxy, Active Directory Authentication and SurfProtect ICAP Access

TestOut Course Outline for: Windows Server 2008 Active Directory

ACE Names and UID/GID/SIDs

GL-550: Red Hat Linux Security Administration. Course Outline. Course Length: 5 days

Linux Virtual Desktop. Installation Guide for Red Hat Enterprise Linux. Version 1.0

Configuring and Using the TMM with LDAP / Active Directory

Kerberos Delegation with SAS 9.4

Single sign-on websites with Apache httpd: Integrating with Active Directory for authentication and authorization

Linux/Unix Active Directory Authentication Integration Using Samba Winbind

USING USER ACCESS CONTROL LISTS (ACLS) TO MANAGE FILE PERMISSIONS WITH A LENOVO NETWORK STORAGE DEVICE

Using Kerberos to Authenticate a Solaris TM 10 OS LDAP Client With Microsoft Active Directory

SSSD and OpenSSH Integration

Connect to UW UWWI Active Directory

ICANWK504A Design and implement an integrated server solution

IDENTITIES, ACCESS TOKENS, AND THE ISILON ONEFS USER MAPPING SERVICE

Single Sign-On for Kerberized Linux and UNIX Applications

Domain Services for Windows Administration Guide

Transcription:

Interoperability Update: Red Hat Enterprise 7 beta and Microsoft Windows Mark Heslin Principal Systems Engineer Red Hat Systems Engineering Dmitri Pal Senior Engineering Manager Red Hat Software Engineering

Agenda Integration Overview Building Blocks Integration Options - Red Hat Enterprise 6 Integration Options - Red Hat Enterprise 7 Future Features Q&A Summary

Why Integrate? Simplify, consolidate user account administration Cost savings Flexibility Customization...etc...

Where to start? Much material available (blogs, docs, web articles) Initially appears simple Upon closer examination... Overwhelming number of integration options Most material covers one configuration None present full range The devil is in the details...

What is Needed? Thorough understanding of components, interactions Awareness of technical, non-technical considerations Comparison of configurations, options Best practices, guidelines Assistance in making a selection

How to Integrate? Two options: 1. Direct Integration Connect s directly to Active Directory using native or 3 rd party solutions 2. Indirect Integration Connect s to centralized identity server which integrates to Active Directory

Integration Options Direct Integration Indirect Integration Active Directory Active Directory Central Identity Server

Direct Integration Solutions Native : Samba/Winbind SSSD Legacy (nss_ldap/pam_ldap/pam_krb5) 3 rd Party: Centrify Quest (Dell) Likewise (EMC)

Indirect Integration Solutions LDAP (account sync) Kerberos (cross-realm trust) Identity Management in Red Hat Enterprise (IdM) Account sync Cross-realm Trust

Agenda Integration Overview Building Blocks Integration Options - Red Hat Enterprise 6 Integration Options - Red Hat Enterprise 7 Future Features Q&A Summary

Building Blocks - Overview Integration utilizes both applications and services Applications (e.g. Samba/Winbind, SSSD, etc.) depend on services Services common to both platforms: DNS, Kerberos, LDAP, NTP Differences in options, implementation details Service location can vary i.e. different server, DNS domain, etc. * Services are often the root-cause of integration issues *

Integration Building Blocks Red Hat Enterprise Microsoft Windows Server Samba IdM Active Directory NTP Your goal: NTP Kerberos DNS Seamless Integration Kerberos DNS LDAP LDAP Winbind SSSD IMU/SFU Legacy Third Party * Many options, considerations within each component *

Active Directory Domain Services (AD DS) Suite of directory services Customized versions: Kerberos Domain Name System (DNS) Lightweight Directory Access Protocol (LDAP) Network Time Protocol (NTP) Object hierarchy nodes, trees, forests, domains Renamed in Windows Server 2008 R2 * Included in Windows Server (Server Role) *

Identity Management for UNIX (IMU) Extends Active Directory LDAP schema (UNIX Attributes) Defined by RFC 2307/bis (aka POSIX attributes) Provides more granularity, central control over UNIX accounts: Login Shell Home Directory Activation: Windows Server 2012, 2008 R2: Windows Server 2008, 2003 R2: Windows Server 2003: enable IMU role service enable IMU service enable SFU (services for UNIX)

Kerberos Provides single-sign on (SSO) capabilities Clients request ticket from trusted third party (KDC) Behavior configured by /etc/krb5.conf Applications (services) authenticate via PAM libraries: pam_winbind (Samba), pam_sss (SSSD), pam_krb5 (Kerberos) Users authenticate via 'kinit' * Install krb5-workstation for testing/troubleshooting *

LDAP (Lightweight Directory Access Protocol) Hierarchical directory service based on X.500 Provides information storage/lookup (users, hosts, groups, etc.) Data transmitted securely via SSL, TLS Server implementations: Red Hat Directory Server - enterprise level features and capabilities OpenLDAP may be used for development and small deployments * Install openldap-clients for troubleshooting purposes *

Identity Management in RHEL (IdM) Centralized authentication, identity, policy management Based on FreeIPA (Identity, Policy and Audit) Contains native domain services: Kerberos Domain Name System (DNS) Lightweight Directory Access Protocol (LDAP) Network Time Protocol (NTP) Certificate Authority (CA) * Similar to Active Directory but for /UNIX clients *

Samba Open source suite of programs Provides file and print services Includes two daemons: smbd (file and print services) nmbd (NetBIOS name server) Samba v3.6 is current version (RHEL 6.5) Samba can be configured as client, server or both * Behavior configured by /etc/samba/smb.conf *

Winbind Daemon included with Samba suite Unified logon to Active Directory accounts Minimizes need for separate accounts Primary functions: Authentication of user credentials ( Who ) ID Tracking/Name Resolution via nsswitch ( Where ) ID Mapping of UID/GID <-> SID ( What ) ID Mapping implemented through backends

SSSD (System Security Services Daemon) Access to different identity, authentication providers (e.g. - Active Directory, IdM, LDAP native, LDAP w/kerberos) Extensible (new identity, authentication sources) Supports off-line caching of user credentials (clients) Reduces load on identity servers Does not provide file sharing capabilities (yet) * Extensible, enhanced alternative to Winbind *

Kerberos/LDAP client side (Legacy) NSS and PAM modules nss_ldap pam_ldap/pam_krb5 Limited capabilities Load into the application memory bringing a lot of dependencies * Consider using more advanced solutions *

Agenda Integration Overview Building Blocks Integration Options - Red Hat Enterprise 6 Integration Options - Red Hat Enterprise 7 Future Features Q&A Summary

Direct Integration Options in RHEL 6 Direct Integration Indirect Integration Active Directory Active Directory Central Identity Server

Direct Integration Red Hat Enterprise 6 Identity Store Active Directory Central Identity Server (Config 1,2) (Config 3) (Config 4) Components Samba/ Winbind SSSD Kerberos/LDAP Third Party Client Platform Red Hat Enterprise * Reference Architecture configurations all components available today in Red Hat Enterprise *

Which to choose? Recommended configurations selected based on: Customer, field, partner interest Engineering, Support, Services review Feasibility, practicality for production environments SSSD is the preferred configuration If SSSD does not fit your needs then consider a Samba/Winbind configuration Legacy Kerberos/LDAP configuration is least preferred

Configuration Comparison Configuration Services Provided Features Use Case 1. Samba/Winbind (idmap_rid) 2. Samba/Winbind (idmap_ad) File sharing Login access File sharing Login access Templated shell, home dirs Least intrusive to AD (No user/group ID attribute changes) Algorithmic ID mappings Customizable shell, home dirs Centralized user mgmt Assigned ID mappings User/group ID attributes set in AD (requires IMU) 3. SSSD w/ad provider Login access Advanced authentication User credential caching Reduces client loading on server User/group ID attributes set in AD - optional (IMU - optional; RHEL 6.4+ not required) 4. Kerberos/LDAP Login access No off-line caching user credentials User/group ID attributes set in AD (requires IMU) Template-driven Customizable Enhanced Legacy

Decision Tree Start Y File sharing required? N N User attributes modifiable in AD? Y Y Use enhanced capabilities? N Deploy Recommended Configuration 1 Deploy Recommended Configuration 2 Deploy Recommended Configuration 3 Deploy Recommended Configuration 4 Samba/Winbind (idmap_rid) Template Driven Samba/Winbind (idmap_ad) Customizable SSSD/Kerberos/LDAP Enhanced LDAP/Kerberos Legacy

Reference Architecture Simplifies selection, deployment, integration Details components, considerations Integrating Red Hat Enterprise 6 with Active Directory Compares landscape of configurations, options Mark Heslin Principal Software Engineer Provides best practices, guidelines, decision tree Version 1.5 March 2014 https://www.redhat.com/resourcelibrary/reference-architectures/ integrating-red-hat-enterprise-linux-6-with-active-directory

Indirect Integration Options in RHEL 6 Direct Integration Indirect Integration Active Directory Active Directory Central Identity Server

Indirect Integration Red Hat Enterprise 6 Identity Store Active Directory Central Identity Server IdM LDAP Kerberos Third Party Product Components SSSD LDAP Kerberos Legacy NSS PAM/NSS/LDAP SSSD PAM/Kerberos SSSD Third Party Client Platform Red Hat Enterprise * All components available today in Red Hat Enterprise *

IdM Benefits infrastructure is managed via native concepts and protocols Centralized: Host Based Access Control, SUDO, SSH keys, automount maps, SE user mappings, host groups, netgroups and more Separation of duties between different IT departments Reduced cost

Agenda Integration Overview Building Blocks Integration Options - Red Hat Enterprise 6 Integration Options - Red Hat Enterprise 7 Future Features Q&A Summary

Direct Integration Improvements in RHEL 7 Direct Integration Indirect Integration Active Directory Active Directory Central Identity Server

Direct Integration Improvements The majority of new features involved the AD provider SSSD is now able to retrieve users and groups from trusted domains in the same forest NetBIOS domain name can be used to qualify names DNS updates and scavenging DNS site discovery Improved access control using AD access control provider The recommended way of setting up the AD provider is using realmd

Joining the AD domain with realmd realmd is a package that manages discovery and enrollment to several centralized directories including AD or IPA Easy to use By default, realmd sets up SSSD's AD provider Advanced features available one-time password for join, custom OUs, etc

realmd Examples To discover all domains (requires NetworkManager) realm discover To discover a particular domain realm discover ad.example.com To join a domain realm join ad.example.com

SSSD vs. Winbind in RHEL 7 Feature SSSD with AD Provider Winbind Requires POSIX attributes No (default) No Supports ID mapping One method Multiple methods AD specific optimizations Yes Yes CIFS integration Not yet (available upstream) Yes DNS site support Yes Yes DNS dynamic updates Yes Yes (requires manual configuration) Enrollment with realmd Yes (default) Yes (must be explicitly selected)

Indirect Integration Improvements in RHEL 7 Direct Integration Indirect Integration Active Directory Active Directory Central Identity Server

IdM AD Integration Improvements IdM now supports cross realm Kerberos trusts with AD Users from AD realm can access hosts and services on side IdM can trust different forests IdM recognizes domain structure inside AD forest ID mapping: Dynamic SID <-> POSIX mapping similar to how Samba did it If you had POSIX attributes in AD they are respected Legacy clients can be exposed to AD users (Tech Preview) Configure clients to use LDAP compatibility tree in IdM

Cross-realm Deployment Identity Store Active Directory Active Directory Trust Trust Central Identity Server IdM in RHEL 7 Components SSSD SSSD SSSD Platform RHEL 6.6+/7.0+ (Full trust capabilities) RHEL 6.4/6.5 (Limited trust capabilities) RHEL 5/6.3 + earlier (No trust capabilities) Non-RHEL (No trust capabilities)

Client Support with Cross-realm Trusts Feature/Client Information look-up Password auth Kerberos auth HBAC SE user mapping SUDO rules RHEL 7 (main tree) + + + + + + RHEL 6.5 (main tree) + + + + +/- + RHEL 6.4 (main tree) + + + + - - RHEL 6.3 (compat tree) + + - - - - RHEL 5.10 (compat tree) + + - - - -

Direct vs. Indirect Integration Use Case Direct Integration Trust-based Integration Number of Clients Small, less than 30 Large, 30 or more Policy Management Requires separate solution Included with IdM in RHEL Cost Grows with # of clients(cals) Fixed at one connection Feature set free in RHEL Best Investment Profile Short-term Long-term

Agenda Integration Overview Building Blocks Integration Options - Red Hat Enterprise 6 Integration Options - Red Hat Enterprise 7 Future Features Q&A Summary

Features Targeted for Follow up Releases Direct Integration: GPO access control provider SSSD CIFS integration Indirect Integration: Qualification of the legacy client support IdM users accessing AD resources Global Catalog Samba FS as a member server in the trust based deployment Samba DC and IdM in cross forest trust relationships

Questions?

Summary (1) Viable AD integration options exist in the shipping software Decide which approach best fits your needs Direct vs. Indirect Red Hat Enterprise 6 Reference Architecture is available covers direct integration options

Summary (2) Red Hat Enterprise 7 RHEL 7 introduces new options and opportunities IdM with trusts: Brings integration to the next level Simplifies heterogeneous architectures New Reference Architecture is forthcoming Improving interoperability is an ongoing effort spanning multiple releases Follow our efforts in the Open Source communities - SSSD, FreeIPA, Kerberos, 389, Dogtag and others

Thank you! Please complete an evaluation form!

Supporting Slides Detailed configuration examples

Configuration 1 (winbind idmap_rid) # cat /etc/samba/smb.conf [global] workgroup = REFARCH AD password server = WIN SRV1.REFARCH AD.REDHAT.COM realm = REFARCH AD.REDHAT.COM security = ads idmap uid = 10000 19999 <--- Integration Best Practice: idmap gid = 10000 19999 * Set uid/gid defaults for troubleshooting purposes * idmap config REFARCH AD:backend = rid idmap config REFARCH AD:range = 10000000 19999999 winbind enum users = no winbind enum groups = no winbind separator = + winbind use default domain = yes template homedir = /home/%d/%u template shell = /bin/bash

Configuration 1 - alternative (winbind idmap_autorid) New backend introduced in Samba 3.6/RHEL 6.4 Automatically allocates ID ranges when no domain is specified # cat /etc/samba/smb.conf [global] workgroup = EXAMPLE AD password server = WIN SRV1.EXAMPLE AD.REDHAT.COM realm = EXAMPLE AD.REDHAT.COM security = ads idmap config * : backend = autorid idmap config * : range = 1000000 19999999 idmap config * : rangesize = 1000000 idmap config REFARCH AD:backend = ad idmap config REFARCH AD:range = 20000000 29999999

Configuration 2 (winbind idmap_ad) # cat /etc/samba/smb.conf [global] workgroup = REFARCH AD password server = WIN SRV1.REFARCH AD.REDHAT.COM realm = REFARCH AD.REDHAT.COM security = ads idmap uid = 20000 29999 <--- Integration Best Practice: idmap gid = 20000 29999 * Set uid/gid defaults for troubleshooting purposes * idmap config REFARCH AD:backend = ad idmap config REFARCH AD:range = 20000000 29999999 idmap config REFARCH AD:default = yes idmap config REFARCH AD:schema_mode = rfc2307 winbind nss info = rfc2307 winbind enum users = no winbind enum groups = no winbind separator = + winbind use default domain = yes winbind nested groups = yes

Configuration 3 (SSSD/Kerberos/LDAP w/ad provider) # cat /etc/sssd/sssd.conf [sssd] config_file_version = 2 debug_level = 0 domains = refarch ad.cloud.lab.eng.bos.redhat.com services = nss, pam # Uncomment/adjust as needed if IMU is not used: #override_homedir = /home/%d/%u #default_shell = /bin/bash [domain/refarch ad.cloud.lab.eng.bos.redhat.com] id_provider = ad access_provider = ad # Permits offline logins: # cache_credentials = true # Use when service discovery not working: # ad_server = win srv1.refarch ad.cloud.lab.eng.bos.redhat.com # Enables use of POSIX UIDs and GIDs: ldap_id_mapping = false

Configuration 4 (Kerberos/LDAP) # cat /etc/nslcd.conf binddn cn=ad LDAP Bind,cn=users,dc=refarch ad,dc=redhat,dc=com bindpw LDAPBind!! pagesize 1000 referrals off filter passwd (&(objectclass=user)(!(objectclass=computer)) \ (uidnumber=*)(unixhomedirectory=*)) map passwd uid samaccountname map passwd homedirectory unixhomedirectory map passwd gecos displayname filter shadow (&(objectclass=user)(!(objectclass=computer)) \ (uidnumber=*)(unixhomedirectory=*)) map shadow uid samaccountname map shadow shadowlastchange pwdlastset filter group (objectclass=group) map group uniquemember member uid nslcd gid ldap uri ldap://win srv1.refarch ad.redhat.com base dc=refarch ad,dc=redhat,dc=com

Configuration 4 (Kerberos/LDAP) continued PAM library configuration files (/etc/pam.d/password-auth, /etc/pam.d/-auth) Before auth sufficient pam_sss.so use_first_pass account [default=bad success=ok user_unknown=ignore] pam_sss.so password sufficient pam_sss.so use_authtok session optional pam_sss.so After auth sufficient pam_krb5.so use_first_pass account [default=bad success=ok user_unknown=ignore] pam_krb5.so password sufficient pam_krb5.so use_authtok session optional pam_krb5.so