Red Hat Identity Management

Similar documents
Red Hat Enterprise Identity (IPA) Centralized Management of Identities & Authentication

LinuxCon North America

Identity Management based on FreeIPA

Integrating Linux systems with Active Directory

AD Integration options for Linux Systems

Managing Identity & Access in On-premise and Cloud Environments. Ellen Newlands Identity Management Product Manager Red Hat, Inc

How to build an Identity Management System on Linux. Simo Sorce Principal Software Engineer Red Hat, Inc.

Identity Management: The authentic & authoritative guide for the modern enterprise

CAC AND KERBEROS FROM VISION TO REALITY

Advancements in Linux Authentication and Authorisation using SSSD

Handling POSIX attributes for trusted Active Directory users and groups in FreeIPA

PKI Made Easy: Managing Certificates with Dogtag. Ade Lee Sr. Software Engineer Red Hat, Inc

FreeIPA - Open Source Identity Management in Linux

Integration with Active Directory. Jeremy Allison Samba Team

Building Open Source Identity Management with FreeIPA. Martin Kosek

IPA Identity, Policy, Audit Karl Wirth, Red Hat Kevin Unthank, Red Hat

Red Hat Enterprise ipa

Interoperability Update: Red Hat Enterprise Linux 7 beta and Microsoft Windows

FreeIPA Client and Server

Fedora 17 FreeIPA: Identity/ Policy Management

FreeIPA 3.3 Trust features

Fedora 18 FreeIPA: Identity/ Policy Management

SSSD. Client side identity management. LinuxAlt 2012 Jakub Hrozek 3. listopadu 2012

Red Hat Enterprise IPA Identity & Access Management for Linux and Unix Environments. Dragos Manac

Integrating Red Hat Enterprise Linux 6 with Microsoft Active Directory Presentation

FreeIPA Cross Forest Trusts

System Security Services Daemon

Authentication in a Heterogeneous Environment

FreeIPA Client and Server

Cross-Realm Trust Interoperability, MIT Kerberos and AD

SSSD DNS Improvements in AD Environment

Implementing Linux Authentication and Authorisation Using SSSD

External and Federated Identities on the Web

RHEL Clients to AD Integrating RHEL clients to Active Directory

Security with LDAP. Andrew Findlay. February Skills 1st Ltd

OnCommand Performance Manager 1.1

This module explains how to configure and troubleshoot DNS, including DNS replication and caching.

Training Name Installing and Configuring Windows Server 2012

SSSD Active Directory Improvements

TIBCO Spotfire Platform IT Brief

Administering Windows Server 2012

IBM Cloud Manager with OpenStack

ACE Management Server Deployment Guide VMware ACE 2.0

Administering Windows Server 2012

identity management in Linux and UNIX environments

Creating the Conceptual Design by Gathering and Analyzing Business and Technical Requirements

MS 20413A: Designing and Implementing a Server Infrastructure

Table of Contents. Red Hat Summit Labs. Lab Overview... 3 Background... 3

RH033 Red Hat Linux Essentials or equivalent experience with Red Hat Linux..

Security Provider Integration Kerberos Authentication

Zimbra Collaboration 8.X. System Administration Overview

Mac OS X Directory Services

MCSA Instructor-led Live Online Training Program. Course Outline MCSA Deploying and Managing Windows Server 2012

MCSE Objectives. Exam : TS:Exchange Server 2007, Configuring

Windows Security and Directory Services for UNIX using Centrify DirectControl

Configuring Sponsor Authentication

FreeIPA v3: Trust Basic trust setup

Active Directory and Linux Identity Management

The Bomgar Appliance in the Network

Designing and Implementing a Server Infrastructure

Course Outline: 6436 _ Designing a Windows Server 2008 Active Directory Infrastructure and Services Learning Method: Instructor-led Classroom Learning

Small Systems Solutions is the. Premier Red Hat and Professional. VMware Certified Partner and Reseller. in Saudi Arabia, as well a competent

MCSA Objectives. Exam : TS:Exchange Server 2007, Configuring

Administering Windows Server 2012

Active Directory Integration

GL-275: Red Hat Linux Network Services. Course Outline. Course Length: 5 days

Administering Windows Server 2012

Juniper Networks Secure Access Kerberos Constrained Delegation

Administering Windows Server 2012

70-647: Windows Server Enterprise Administration

Open Source Terminal Server Architecture for Enterprise Environment

GL-550: Red Hat Linux Security Administration. Course Outline. Course Length: 5 days

Designing a Windows Server 2008 Active Directory Infrastructure and Services

Designing and Implementing a Server Infrastructure MOC 20413

Open Directory. Apple s standards-based directory and network authentication services architecture. Features

ENTERPRISE LINUX NETWORKING SERVICES

6436: Designing a Windows Server 2008 Active Directory Infrastructure and Services (5 Days)

External Identity and Authentication Providers For Apache HTTP Server

Windows 2000 Security Architecture. Peter Brundrett Program Manager Windows 2000 Security Microsoft Corporation

Course 20411B: Administering Windows Server 2012

Administering Windows Server 2012

GL275 - ENTERPRISE LINUX NETWORKING SERVICES

Administering Windows Server 2012

IT SYSTEMS ADMINISTRATOR PROGRAM

Integrating OpenShift Enterprise with Identity Management (IdM) in Red Hat Enterprise Linux

Administering Windows Server 2012

411-Administering Windows Server 2012

Microsoft Windows Server 2008: MS-6435 Designing Network and Applications Infrastructure MCITP 6435

GL550 - Enterprise Linux Security Administration

GL254 - RED HAT ENTERPRISE LINUX SYSTEMS ADMINISTRATION III

ENTERPRISE LINUX SECURITY ADMINISTRATION

Implementing Microsoft Azure Infrastructure Solutions

CLEO NED Active Directory Integration. Version 1.2.0

SINGLE COURSE. 136 Total Hours. After completing this course, students will be able to:

Synology NAS Server Windows ADS FAQ

Implementing Domain Name Service (DNS)

Implementing and Administering Security in a Microsoft Windows Server 2003 Network

Integrated Approach to User Account Management

VNLINFOTECH JOIN US & MAKE YOUR FUTURE BRIGHT. mcsa (70-413) Microsoft certified system administrator. (designing & implementing server infrasturcure)

Monitoring Clearswift Gateways with SCOM

Transcription:

Red Hat Identity Management Overview Thorsten Scherf Senior Consultant Red Hat Global Professional Services

Agenda What is Red Hat Identity Management? Main values Architecture Features Active Directory Integration Resources 2

What is Red Hat Identity Management? Red Hat Identity Management is a solution based on FreeIPA (or just IPA) open source technology IPA stands for Identity, Policy, Audit FreeIPA open source project was started in 2007 FreeIPA v1 was released in 2008 FreeIPA v3 RC is available

Main values IPA is a domain controller for Linux/UNIX environment Think Active Directory but for Linux Central server that stores identity information, policies related to identities and performs authentication

High Level Architecture Unix/Linux PKI KDC DNS LDAP CLI/GUI Admin

Why IPA? Identity and authentication is a complex problem many disjoint technologies exist We want to make it more simple to deploy and use With the growth of the Linux share of servers in the enterprises there should be a server that has needs of Linux clients in its heart

Features Centralized authentication via Kerberos or LDAP Identity management: users, groups, hosts, host groups, netgroups, services Manageability: Simple installation scripts for server and client Rich CLI and web-based user interface Pluggable and extensible framework for UI/CLI Flexible delegation and administrative model

Features (Continued) Certificate provisioning for hosts and services Serving sets of automount maps to different clients Advanced features: Host-based access control Centrally-managed SUDO Group-based password policies Automatic management of private groups Can act as NIS server for legacy systems Painless password migration Managed hosts

Features (Continued) SELinux policy management SSH key management Cross Kerberos-Trust for mixed IdM <-> AD setups Optional integrated DNS server managed by IPA Replication: Supports multi-server deployment based on the multimaster replication User replication with MS Active Directory Separate topology for CAs Compatibility with broad set of clients

Under the Hood NTP CA IPA Core Kerberos KDC Directory Server DNS Management framework Authentication Users, Groups, Netgroups, HBAC Name lookups and service discovery Cert tracking & provisioning Other maps SSSD Certmonger Enrollment & un-enrollment Managed host (client) Management Station CLI Configures Configures ipa-client nss_ldap Management WEBUI Browser

Under the Hood NTP CA IPA Core Kerberos KDC Directory Server DNS Management framework Authentication Users, Groups, Netgroups, HBAC Name lookups and service discovery Cert tracking & provisioning Other maps SSSD Certmonger Enrollment & un-enrollment Managed host (client) Management Station CLI Configures Configures ipa-client nss_ldap Management WEBUI Browser

Client Configurations SSSD With IPA back end LDAP or Proxy for identity Kerberos or LDAP for authentication nss_ldap for other maps Non-SSSD LDAP (nss_ldap) or NIS (nss_nis) for identity LDAP (pam_ldap) or Kerberos (pam_krb5) for auth

AD IdM Integration For most companies AD is the central hub of the user identity management inside the enterprise All systems that AD users can access (including Linux) need (in some way, i.e. directly or indirectly) to have access to AD to perform authentication and identity lookups In some cases the AD is the only allowed central authentication server due to compliance requirements In some cases DNS is tightly controlled by the Windows side of the enterprise and non Windows systems need to adapt to this

Aspects of integration Authentication User logs into a Linux system, how he is authenticated? Identity lookup How system knows about the right accounts? How AD accounts are mapped to POSIX? Name resolution and service discovery How system knows where is its authentication and identity server? Policy management How other identity related policies are managed on the system?

IdM Based Integration Option AD Users are synchronized from AD to IdM IdM Policies are centrally managed over LDAP DNS LDAP KDC DNS LDAP KDC A DNS zone is delegated by AD to IdM to manage Linux environment Linux System Name resolution and service discovery queries are resolved against IdM SSSD Authentication Identities Name resolution Policies sudo hbac automount selinux

IdM AD Trust AD Domains trust each other. Users stay where they are, no synchronization needed IdM Policies are centrally managed over LDAP DNS LDAP KDC A DNS zone is delegated by AD to IdM to manage Linux systems or IdM has an independent namespace DNS LDAP KDC Linux System Client software connects to the right server depending on the information it needs SSSD Authentication Identities Name resolution Policies sudo hbac automount selinux

IdM 3.0 Targeted for RHEL6.4 Cross Kerberos-Trust for mixed IdM <-> AD setups Multiple IdM domains SELinux policy management Additional standard maps UI enhancements

Future features Disk encryption key management External authentication integration (OTP) User certificate management RADIUS

Resources Project wiki: www.freeipa.org Project trac: https://fedorahosted.org/freeipa/ Code: http://git.fedorahosted.org/git/?p=freeipa.git SSSD: https://fedorahosted.org/sssd/ Certmonger: https://fedorahosted.org/certmonger/ Mailing lists: freeipa-users@redhat.com freeipa-devel@redhat.com freeipa-interest@redhat.com 19 CONFIDENTIAL FOR USE UNDER NON-DISCLOSURE AGREEMENT ONLY

Resources Project wiki: www.freeipa.org Project trac: https://fedorahosted.org/freeipa/ Code: http://git.fedorahosted.org/git/?p=freeipa.git SSSD: https://fedorahosted.org/sssd/ Certmonger: https://fedorahosted.org/certmonger/ Mailing lists: freeipa-users@redhat.com freeipa-devel@redhat.com freeipa-interest@redhat.com 20 CONFIDENTIAL FOR USE UNDER NON-DISCLOSURE AGREEMENT ONLY

Questions?