FreeIPA Client and Server



Similar documents
How to build an Identity Management System on Linux. Simo Sorce Principal Software Engineer Red Hat, Inc.

FreeIPA - Open Source Identity Management in Linux

FreeIPA 3.3 Trust features

Building Open Source Identity Management with FreeIPA. Martin Kosek

Handling POSIX attributes for trusted Active Directory users and groups in FreeIPA

Red Hat Enterprise Identity (IPA) Centralized Management of Identities & Authentication

FreeIPA Client and Server

FreeIPA v3: Trust Basic trust setup

Identity Management based on FreeIPA

Red Hat Identity Management

PKI Made Easy: Managing Certificates with Dogtag. Ade Lee Sr. Software Engineer Red Hat, Inc

Managing Identity & Access in On-premise and Cloud Environments. Ellen Newlands Identity Management Product Manager Red Hat, Inc

FreeIPA Cross Forest Trusts

Blending FreeIPA in a Certificate Infrastructure

Identity Management: The authentic & authoritative guide for the modern enterprise

LinuxCon North America

AD Integration options for Linux Systems

Fedora 18 FreeIPA: Identity/ Policy Management

Integrating Linux systems with Active Directory

Fedora 17 FreeIPA: Identity/ Policy Management

CAC AND KERBEROS FROM VISION TO REALITY

SSSD Active Directory Improvements

Single sign-on websites with Apache httpd: Integrating with Active Directory for authentication and authorization

Kerberos and Active Directory symmetric cryptography in practice COSC412

Kerberos on z/os. Active Directory On Windows Server William Mosley z/os NAS Development. December Interaction with.

Big Data Operations Guide for Cloudera Manager v5.x Hadoop

ENABLING SINGLE SIGN-ON: SPNEGO AND KERBEROS Technical Bulletin For Use with DSView 3 Management Software

Red Hat Enterprise ipa

Interoperability Update: Red Hat Enterprise Linux 7 beta and Microsoft Windows

SSSD. Client side identity management. LinuxAlt 2012 Jakub Hrozek 3. listopadu 2012

Configuring Integrated Windows Authentication for Oracle WebLogic with SAS 9.2 Web Applications

CipherMail Gateway Upgrade Guide

Theorie Practical part Outlook. Kerberos. Secure and efficient authentication and key distribution. Johannes Lötzsch and Meike Zehlike

External and Federated Identities on the Web

Single Sign On. Configuration Checklist for Single Sign On CHAPTER

Setting up Single Sign-On (SSO) with SAP HANA and SAP BusinessObjects XI 4.0

System Security Services Daemon

Administering the Web Server (IIS) Role of Windows Server

RHEL Clients to AD Integrating RHEL clients to Active Directory

Configuring Integrated Windows Authentication for JBoss with SAS 9.3 Web Applications

Prerequisites and Configuration Guide

Cross-Realm Trust Interoperability, MIT Kerberos and AD

Avatier Identity Management Suite

RSA Authentication Manager 7.1 to 8.1 Migration Guide: Upgrading RSA SecurID Appliance 3.0 On Existing Hardware

Digipass Plug-In for IAS. IAS Plug-In IAS. Microsoft's Internet Authentication Service. Installation Guide

Extending Microsoft Windows Active Directory Authentication to Access HP Service Health Reporter

Best Practices: Integrating Mac OS X with Active Directory. Technical White Paper April 2009

Entrust Managed Services PKI

AVG Business SSO Connecting to Active Directory

Integrating Mac OS X 10.6 with Active Directory. 1 April 2010

Security Provider Integration Kerberos Authentication

Configuring Integrated Windows Authentication for JBoss with SAS 9.2 Web Applications

Table of Contents. Red Hat Summit Labs. Lab Overview... 3 Background... 3

Active Directory Adapter with 64-bit Support Installation and Configuration Guide

VERITAS Backup Exec TM 10.0 for Windows Servers

Best Practices: Integrating Mac OS X with Active Directory. Technical White Paper September 2007

/ Preparing to Manage a VMware Environment Page 1

1 Introduction. Ubuntu Linux Server & Client and Active Directory. Page 1 of 14

qliqdirect Active Directory Guide

CA Performance Center

Enabling single sign-on for Cognos 8/10 with Active Directory

Using Kerberos tickets for true Single Sign On

Hadoop Elephant in Active Directory Forest. Marek Gawiński, Arkadiusz Osiński Allegro Group

Exchange 2010 PKI Configuration Guide

NetIQ Identity Manager Setup Guide

Integrating Red Hat Enterprise Linux 6 with Microsoft Active Directory Presentation

MongoDB Security Guide

Troubleshooting Kerberos Errors

freeipa Administration Guide IPA Solutions from the IPA Experts

The following process allows you to configure exacqvision permissions and privileges for accounts that exist on an Active Directory server:

Use Enterprise SSO as the Credential Server for Protected Sites

Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services

Single Sign On. Configuration Checklist for Single Sign On CHAPTER

UPGRADING TO XI 3.1 SP6 AND SINGLE SIGN ON. Chad Watson Sr. Business Intelligence Developer

This document contains information about the ElectricAccelerator integration with Kerberos. Topics include: Overview 2.

Password Power 8 Plug-In for Lotus Domino Single Sign-On via Kerberos

Windows Advanced Audit Policy Configuration

White Paper. Fabasoft on Linux - Preparation Guide for Community ENTerprise Operating System. Fabasoft Folio 2015 Update Rollup 2

Configuring Integrated Windows Authentication for IBM WebSphere with SAS 9.2 Web Applications

SSSD and OpenSSH Integration

Course 6425C: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services

John D. Bonam Disaster Recovery Architecture Session # 2841

Single Sign-On for Kerberized Linux and UNIX Applications

Windows Security and Directory Services for UNIX using Centrify DirectControl

Cloudera Backup and Disaster Recovery

Leverage Active Directory with Kerberos to Eliminate HTTP Password

Course 6425C: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services

Ensure that your environment meets the requirements. Provision the OpenAM server in Active Directory, then generate keytab files.

MongoDB Security Guide

Installing, Configuring, and Managing a Microsoft Active Directory

Dell Compellent Storage Center

WhatsUp Gold v16.3 Installation and Configuration Guide

freeipa Installation and Deployment Guide IPA Solutions from the IPA Experts

Integrating OpenShift Enterprise with Identity Management (IdM) in Red Hat Enterprise Linux

Cloudera Backup and Disaster Recovery

Performing Administrative Tasks

Active Directory Integration

ILTA HAND 6B. Upgrading and Deploying. Windows Server In the Legal Environment

ACS 5.x and later: Integration with Microsoft Active Directory Configuration Example

Transcription:

FreeIPA 3.3 Training Series FreeIPA Client and Server Improvements in FreeIPA 3.3 Martin Košek <mkosek@redhat.com> 2014-04-03

Focus of FreeIPA 3.x versions FreeIPA 3.3 introduced cross-realm Trusts with Active Directory Since then, several stabilization versions released with following main themes: FreeIPA 3.1: Migration to new PKI server - Dogtag 10 FreeIPA 3.2: CA-less installation, dropped --selfsign option (covered in other presentation) FreeIPA 3.3: Supporting subdomains in AD forest (covered in other presentation) This slide deck introduces FreeIPA Server and Client changes not covered in specialized presentations 2 FreeIPA 3.3 Training Series

Dogtag 10 FreeIPA 3.3 Training Series

Introduction FreeIPA integrates Dogtag PKI as a Certificate System of the choice FreeIPA 3.0 PKI was based on Dogtag 9 FreeIPA 3.1 introduced Dogtag 10 with major changes: Infrastructure changes PKI running on Tomcat 7, installers rewritten to Python, major code refactoring and cleanup REST interface planned to be leveraged by FreeIPA in the future, currently it is only used by cert-find command CLI pki command New directory layout enabling future configuration of multiple PKI subsystem on FreeIPA server (CA, KRA, TKS) 4 FreeIPA 3.3 Training Series

Migrating from Dogtag 9 to Dogtag 10 Dogtag 10 does not allow migration from Dogtag 9 Thus, FreeIPA servers with PKI cannot be automatically upgraded from 3.0 to 3.1, they need to be migrated Easiest way to upgrade FreeIPA PKI servers is to follow a migration procedure. In a nutshell: Install a FreeIPA 3.3 replica with CA Test that replica and CA works Configure FreeIPA replica as primary one and decommission the old Dogtag 9 replica 5 FreeIPA 3.3 Training Series

Migrating from Dogtag 9 to Dogtag 10 (2) FreeIPA prior to 3.3.5 needs a manual change before migration can start (Red Hat Bug #1083978): Open /etc/httpd/conf.d/ipa-pki-proxy.conf Locate section titled matches for ee port Update LocationMatch and add /ca/ee/ca/profilesubmit URI: <LocationMatch "^/ca/ee/ca/checkrequest ^/ca/ee/ca/getcertchain ^/ca/ee/ca/gettokeninfo ^/ca/ee/ca/tokenauthenticate ^/ca/ocsp ^/ca/ee/ca/updatenumberrange ^/ca/ee/ca/getcrl ^/ca/ee/ca/profilesubmit"> Restart httpd service Proceed with migration 6 FreeIPA 3.3 Training Series

FreeIPA 3.3 Training Series Command System Changes

Dropped CSV support FreeIPA 3.0 supported CSV in multivalue options: ipa dnsrecord-add example.com --a-rec=10.0.0.1,10.0.0.2 However, CSV parsing was suboptimal and caused limitations it was therefore removed Use multiple arguments or BASH expansions instead: ipa dnsrecord-add example.com --a-rec=10.0.0.1 --a-rec=10.0.0.2 ipa dnsrecord-add example.com --a-rec={10.0.0.1,10.0.0.2} 8 FreeIPA 3.3 Training Series

New command cert-find Utilizes new Dogtag 10 REST interface Searches for all FreeIPA certificates, based on given criteria passed as cert-find options Simply run ipa cert-find command and see the results: Serial number (hex): 0x9 Serial number: 9 Status: VALID Subject: CN=ipa.example.com,O=EXAMPLE.COM Serial number (hex): 0xB Serial number: 11 Status: REVOKED Subject: CN=oldipa.example.com,O=EXAMPLE.COM Certificates can be also searched in Web UI page 9 FreeIPA 3.3 Training Series

Kerberos flags for Services and Hosts Under special circumstances, admin may want to set special Kerberos flags for service principals FreeIPA framework now allows 2 flags to be set: OK_AS_DELEGATE: service tickets trusted for delegation AD will forward TGT only to services with this flag set With the flag set, SSSD can add AD user TGT to the default Kerberos credentials cache on the FreeIPA client machine REQUIRES_PRE_AUTH: pre-authentication is required Can be used to disable pre-authentication for selected services or hosts (lowers the load on KDC, slightly increases possibility of a brute force attack on a long term key) 10 FreeIPA 3.3 Training Series

Kerberos flags for Services and Hosts (2) Example - adding OK_AS_DELEGATE flag for test/ipa.example.com@example.com principal: Focus on the O flag for this principal in klist output $ ipa service-mod test/ipa.example.com ok-as-delegate=1 $ kvno test/ipa.example.com@example.com $ klist -f Ticket cache: KEYRING:persistent:0:0 Default principal: admin@example.com Valid starting Expires Service principal 02/19/2014 09:59:02 02/20/2014 08:21:33 test/ipa.example.com@example.com Flags: FATO... 11 FreeIPA 3.3 Training Series

Additional resources Upstream feature pages: http://www.freeipa.org/page/v3/drop_csv http://www.freeipa.org/page/v3/cert_find http://www.freeipa.org/page/v3/kerberos_flags Kerberos protocol tutorial: http://www.kerberos.org/software/tutorial.html 12 FreeIPA 3.3 Training Series

FreeIPA 3.3 Training Series Host provisioning and installation

Host provisioning userclass attribute FreeIPA 3.0 did not offer a host attribute suitable annotating hosts according to their class The only option was to misuse the description attribute Host annotation is useful for host provisioning tools to set class of the machine in FreeIPA realm FreeIPA 3.3 introduces userclass attribute to be assigned The attribute can be used with Directory Server Automatic Membership plugin to automatically assign annotated host to hostgroups Hostgroups can be used in HBAC rules, SELinux user mapping rules or SUDO and thus applying the right policy for the new host according to it's class 14 FreeIPA 3.3 Training Series

Host provisioning Example Any host attribute can be used (userclass, FQDN,...) in the rule the example below will use the new userclass attribute Prepare an automember rule to place all hosts with webserver class to specific host group If there are more than one matching rules, all are applied $ ipa hostgroup-add webservers --desc "Web Servers" $ ipa automember-add --type=hostgroup webservers $ ipa automember-add-condition webservers --key=userclass --type=hostgroup \ --inclusive-regex=^webserver$ $ ipa automember-show webservers --type=hostgroup Automember Rule: webservers Inclusive Regex: userclass=^webserver$ $ ipa host-add web.example.com --class webserver $ ipa hostgroup-show webservers Host-group: webservers Description: Web Servers Member hosts: web.example.com 15 FreeIPA 3.3 Training Series

Host re-enrollment Previously installed client may be re-enrolled Can be used to reset a system to a known state Can be used after a restore from a backup/snapshot Existent FreeIPA client need to be uninstalled first 2 options to authenticate: Host keytab: Use --keytab option and pass path to backed up /etc/krb5.keytab Administrator credentials/otp: Use --principal and --password options 16 FreeIPA 3.3 Training Series

Host re-enrollment (2) Use --force-join option in ipa-clientinstall if the host was not properly uninstalled and host entry is still active on the server --force-join effects: New certificate is generated, old certificate is revoked New keytab is generated Public SSH keys are re-uploaded on the server ipauniqueid of the host entry stays the same 17 FreeIPA 3.3 Training Series

Additional resources Upstream feature pages: http://www.freeipa.org/page/v3/forced_client_re-enrollment http://www.freeipa.org/page/v3/integration_with_a_provisioning_systems 18 FreeIPA 3.3 Training Series

FreeIPA 3.3 Training Series DNA range management

Introduction to DNA FreeIPA users Distributed Number Assignment (DNA) plugin to automatically manage UID/GID assignment Per server configuration: cn=posix IDs,cn=Distributed Numeric Assignment Plugin,cn=plugins,cn=config Replicated DNA plugin status: cn=posixids,cn=dna,cn=ipa,cn=etc,suffix Plugin manages the ranges across all replicas On-deck range actively used by the replica (dnanextvalue, dnamaxvalue in per server configuration) Next range used when on-deck range is depleted (dnanextrange in per server configuration) 20 FreeIPA 3.3 Training Series

Introduction to DNA (2) DNA makes sure there are no duplicates even when replication link is down by allocating different Achieved by reserving different ranges for different replicas New range assigned when a number is assigned for the first time on given replica When a replica is deleted, it's range was not recovered 21 FreeIPA 3.3 Training Series

Use cases Live replica is being deleted Free number range can be still retrieved from the replica ipa-replica-manage is capable of saving the range Range is depleted or lost Assigned range was exhausted, there is no free range in other replicas Replica may have died for any reason and was deleted It's range or a range of a replica connected only to the dead replica is lost Administrator will need to assign a new range 22 FreeIPA 3.3 Training Series

Use case: Live replica is being deleted Previously, it's range was simply lost In FreeIPA 3.3, ipa-replica-manage del was enhanced: Connects to removed replica before deleting it Makes it read only Retrieves the dead ranges (on-deck and next range) Tries to add the ranges as a next range to available FreeIPA replicas Useful commands: ipa-replica-manage dnarange-show ipa-replica-manage dnanextrange-show 23 FreeIPA 3.3 Training Series

Use case: Range is depleted or lost Range needs to be set or extended manually Useful commands: ipa-replica-manage dnarange-set ipa-replica-manage dnanextrange-set Be cautious when extending the range manually: Make sure that FreeIPA ID range contains the extended range (check ipa idrange-find) Make sure that no number from the recovered range was never used (audit UID/GID of existent users and groups) Duplicate UID/GID could be assigned otherwise. 24 FreeIPA 3.3 Training Series

Additional resources Upstream feature page: http://www.freeipa.org/page/v3/recover_dna_ranges Man page: man ipa-replica-manage 25 FreeIPA 3.3 Training Series