SUSE Linux Enterprise Server in an Active Directory Domain



Similar documents
Kangaroot SUSE TechUpdate Interoperability SUSE Linux Enterprise and Windows

Single sign-on websites with Apache httpd: Integrating with Active Directory for authentication and authorization

Implementing Linux Authentication and Authorisation Using SSSD

Going in production Winbind in large AD domains today. Günther Deschner (Red Hat / Samba Team)

Advanced Systems Management with Machinery

SUSE Customer Center Roadmap

SSSD Active Directory Improvements

Building Open Source Identity Management with FreeIPA. Martin Kosek

INUVIKA TECHNICAL GUIDE

FreeIPA - Open Source Identity Management in Linux

Single Sign-On for Kerberized Linux and UNIX Applications

Windows Enterprise OU Administrator Tips. Integrating RHEL5 Systems with Active Directory

RHEL Clients to AD Integrating RHEL clients to Active Directory

Using btrfs Snapshots for Full System Rollback

Linux/Windows Security Interop: Apache with mod_auth_kerb and Windows Server 2003 R2

Relax-and-Recover. Johannes Meixner. on SUSE Linux Enterprise 12.

Running SAP HANA One on SoftLayer Bare Metal with SUSE Linux Enterprise Server CAS19256

Apache LDAP Configuration

Using Kerberos tickets for true Single Sign On

Using SUSE Linux Enterprise Desktop with Microsoft * Active Directory Infrastructure

Operating System Security Hardening for SAP HANA

SUSE Linux uutuudet - kuulumiset SUSECon:sta

Challenges Implementing a Generic Backup-Restore API for Linux

Integrating Red Hat Enterprise Linux 6 with Microsoft Active Directory Presentation

Using SUSE Linux Enterprise to "Focus In" on Retail Optical Sales

Guide to SASL, GSSAPI & Kerberos v.6.0

Setting up Single Sign-On (SSO) with SAP HANA and SAP BusinessObjects XI 4.0

Integration with Active Directory. Jeremy Allison Samba Team

HO15982 Deploy OpenStack. The SUSE OpenStack Cloud Experience. Alejandro Bonilla. Michael Echavarria. Cameron Seader. Sales Engineer

Using SUSE Cloud to Orchestrate Multiple Hypervisors and Storage at ADP

Integrating UNIX and Linux with Active Directory. John H Terpstra

Big Data, SAP HANA. SUSE Linux Enterprise Server for SAP Applications. Kim Aaltonen

Kerberos and Single Sign On with HTTP

White Paper. Fabasoft on Linux - Preparation Guide for Community ENTerprise Operating System. Fabasoft Folio 2015 Update Rollup 2

Attunity RepliWeb PAM Configuration Guide

Installing, Tuning, and Deploying Oracle Database on SUSE Linux Enterprise Server 12 Technical Introduction

Kerberos and Single Sign-On with HTTP

Univention Corporate Server. Extended domain services documentation

SUSE Enterprise Storage Highly Scalable Software Defined Storage. Gábor Nyers Sales

GL550 - Enterprise Linux Security Administration

How To Make A Cloud Work For You

We are watching SUSE

Deploying Hadoop with Manager

High Availability Storage

Ceph Distributed Storage for the Cloud An update of enterprise use-cases at BMW

Wicked A Network Manager Olaf Kirch

SUSE Manager 1.2.x ADS Authentication

Public Cloud. Build, Use, Manage. Robert Schweikert. Public Cloud Architect

Single Sign-on (SSO) technologies for the Domino Web Server

Btrfs and Rollback How It Works and How to Avoid Pitfalls

Data Center Automation with SUSE Manager Federal Deployment Agency Bundesagentur für Arbeit Data Center Automation Project

ENTERPRISE LINUX SECURITY ADMINISTRATION

Kerberos and Active Directory symmetric cryptography in practice COSC412

Interoperability Update: Red Hat Enterprise Linux 7 beta and Microsoft Windows

Using OpenSSH in a Single Sign-On Corporate Environment with z/os, Windows and Linux

ENTERPRISE LINUX SECURITY ADMINISTRATION

System Security Services Daemon

SUSE Linux Enterprise 12 Security Certifications Common Criteria, EAL, FIPS, PCI DSS,... What's All This About?

IceWarp Server - SSO (Single Sign-On)

Using Single Sign-on with Samba. Appendices. Glossary. Using Single Sign-on with Samba. SonicOS Enhanced

TUT5605: Deploying an elastic Hadoop cluster Alejandro Bonilla

Identity Management based on FreeIPA

DevOps and SUSE From check-in to deployment

Using Active Directory as your Solaris Authentication Source

SUSE Storage. FUT7537 Software Defined Storage Introduction and Roadmap: Getting your tentacles around data growth. Larry Morris

Build Platform as a Service (PaaS) with SUSE Studio, WSO2 Middleware, and EC2 Chris Haddad

Install and Configure an Open Source Identity Server Lab

SAP SINGLE SIGN-ON AND SECURE CONNECTIONS VIA SNC ADAPTER. Author : Matthias Schlarb, REALTECH system consulting GmbH. matthias.schlarb@realtech.

CAS18543 Migration from a Windows Environment to a SUSE Linux Enterprise based Infrastructure Liberty Christian School

SUSE OpenStack Cloud 4 Private Cloud Platform based on OpenStack. Gábor Nyers Sales gnyers@suse.com

GL-550: Red Hat Linux Security Administration. Course Outline. Course Length: 5 days

Open Source High Availability Writing Resource Agents for your own services. Lars Marowsky-Brée Team Lead SUSE Labs

Charles Firth Managing Macs in a Windows World

Unifying Authorization Models

Leverage Active Directory with Kerberos to Eliminate HTTP Password

User Source and Authentication Reference

Mac OS X Directory Services

Domain Services for Windows Administration Guide

Table 1 shows the LDAP server configuration required for configuring the federated repositories in the Tivoli Integrated Portal server.

Open Enterprise Server Product Roadmap Presentation

Configure the Application Server User Account on the Domain Server

Using Kerberos to Authenticate a Solaris TM 10 OS LDAP Client With Microsoft Active Directory

ACE Management Server Deployment Guide VMware ACE 2.0

High Availability and Disaster Recovery for SAP HANA with SUSE Linux Enterprise Server for SAP Applications

Secure Unified Authentication for NFS

Novell Remote Manager Administration Guide

IGEL Universal Management. Installation Guide

Software Defined Everything

TIBCO ActiveMatrix BPM Single Sign-On

DameWare Server. Administrator Guide

Advancements in Linux Authentication and Authorisation using SSSD

SUSE Linux Enterprise 12 Security Certifications

How an Open Source Cloud Will Help Keep Your Cloud Strategy Options Open

Linux w chmurze publicznej SUSE na platformie Microsoft Azure

Oracle Products on SUSE Linux Enterprise Server 11

Transcription:

Gábor Nyers Systems Engineer @SUSE gnyers@suse.com SUSE Linux Enterprise Server in an Active Directory Domain

Agenda Introduction Practical scenario's for SLES 11 SP2: Participating in an Active Directory Integration of Apache with Active Directory Bleeding Edge Samba 4 Server side copy Prototype implementation of Previous versions Questions 2

Introduction

Data Center Interoperability The Playfield Platforms Mainframe Observable trends (in general): Legacy Unix holds or declines Mainframe: Linux Windows z/os holds Linux on System z emerging Linux and Windows grow UNIX 4

Linux Windows Interoperability The playfield Linux Platforms Mainframe UNIX Windows Interoperability Topics Scope: Services > < Virtualization Systems Management Documents Scripting Languages Porting and running software 5

Linux Windows Interoperability Scenario's Practical scenario's 1. SLES Participating in an Active Directory domain 2. Integration of Apache with Active Directory 6

Linux Windows Interoperability Scenario's Practical value vs. Maturity Maturity 4 Enterprise 2 1 3 5 1 2 3 4 SLES Participating in an Active Directory domain Integration of Apache on SLES with Active Directory SLES and Samba as domain controller Windows Remote Desktop on Linux 6 Emerging 5 ODBC connection to MS SQL Practical value 6 Prototype Samba implementation of Recovery Point 7

Practical scenario's for SLES 11 SP2

Scenario 1: SLES as member server in Active Directory domain PAM / nsswitch / SSH Kerberized application / service 1 2 Active Directory SLES 11 SP2 Mount share 3 Shared folder Windows 2008 R2 Role: Member server AD: ad.demo.lan Hostname: interop01 File share 4 Mapped share Role: AD Domain Controller AD domain name: ad.demo.lan NT-style domain name: INTEROP Hostname: win200864 Mapped share Mapped share See also: more detailleddocumentation Interop Demo appliance 10 Kerberized / SPNEGO enabled application Windows XP (winxp01.ad.demo.lan) Kerberized / SPNEGO enabled application Windows 7 (win764.ad.demo.lan)

Scenario 1: Join as member server in Active Directory domain Pre-requisites Correct NTP settings Correct timezone settings Correct DNS name, forward and backward for all hosts Authorized AD service account to join machines (typically Administrator ) Concepts Kerberos Principal / Service Principal Ticket Granting Ticket Keytab file LDAP sssd (System Security Services Daemon) PAM, NSS SASL, GSSAPI, SPNEGO 11

Scenario 1: Join as member server in Active Directory domain Steps on Linux opensuse, SUSE Linux Enterprise: Join the AD domain using YaST Windows Domain Membership Other Linux distros: Join the AD domain with the manual procedure (smb.conf; krb5.conf; `net ads join -U Administrator%password`) Required packages on SLES: samba-client, samba-winbind(pam_winbind.so, libnss_winbind.so, idmap) krb5 (libgssapi_krb5) Steps on Active Directory No requisite steps 12

Scenario 1: Use Case 1/a: Integrate PAM and nsswitch with AD /etc/pam.d/common-auth interop01:~ # cat /etc/pam.d/common-auth #%PAM-1.0 auth required pam_env.so auth sufficient pam_unix2.so auth required pam_winbind.so use_first_pass interop01:~ # /etc/nsswitch.conf interop01:~ # cat /etc/nsswitch.conf # [...] passwd: winbind compat group: winbind compat # [ ] interop01:~ # 13

Scenario 1: Use Case 1/a: Integrate SSHD with AD Configure SSHD interop01:~ # cat /etc/ssh/sshd_config # [...] GSSAPIAuthentication yes GSSAPICleanupCredentials yes ChallengeResponseAuthentication yes # [...] interop01:~ # Login from remote host remote-host:~ $ ssh 'INTEROP\Administrator'@interop02 Password: Creating directory '/home/interop/administrator'. INTEROP\administrator@interop02:~> Kerberos credentials INTEROP\administrator@interop02:~> klist Ticket cache: FILE:/tmp/krb5cc_10000 Default principal: Administrator@AD.DEMO.LAN Valid starting Expires Service principal 04/06/13 10:22:28 04/06/13 20:22:28 krbtgt/ad.demo.lan@ad.demo.lan renew until 04/13/13 10:22:28 04/06/13 10:22:28 04/06/13 20:22:28 INTEROP02$@AD.DEMO.LAN renew until 04/13/13 10:22:28 Kerberos 4 ticket cache: /tmp/tkt10000 klist: You have no tickets cached INTEROP\administrator@interop02:~> 14

Scenario 1: Use Case 1/b: Restrict shell access to AD group Steps on SLES Manually amend the pam_winbind configuration file to restrict allowed users Steps on Active Directory Add group SLES Shell Users Add user Administrator to SLES Shell Users /etc/security/pam_winbind.conf [global] cached_login = yes krb5_auth = yes krb5_ccache_type = FILE debug = yes require_membership_of = "SLES Shell Users" See also: Interop Demo appliance 15

Scenario 1: Use Case 2: Integrate SPNGO enabled applications with AD Applications using GSSAPI, SASL or Java GSS libraries GSSAPI SLES pkg: krb5 (1.6+) C lib: /usr/lib64/libgssapi_krb5.so.2 Java lib: Java GSS Applications: Mod_auth_kerb (Apache), PostgreSQL, etc.. SASL API SLES pkg: cyrus-sasl C lib: /usr/lib64/libsasl2.so.2 Java lib: Java SASL Applications: OpenLDAP2 (Server, clients) Cyrus IMAP, etc... Postfix Libvirt Evolution 16

Use Case 2: Integrate SPNGO enabled applications with AD: smbclient Steps Request TGT with kinit or log in as an AD user Access Windows share with smbclient interop01:~ # id uid=0(root) gid=0(root) groups=0(root) interop01:~ # kinit demo@ad.demo.lan Password for demo@ad.demo.lan: <PASSWORD> interop01:/tmp # klist Ticket cache: FILE:/tmp/krb5cc_0 Default principal: demo@ad.demo.lan interop01:~ # smbclient -k //win200864/share OS=[Windows Server 2008 R2 Standard 7601 Service Pack 1] Server=[Windows Server 2008 R2 Standard 6.1] smb: \> smb: \> exit interop01:~ # klist Ticket cache: FILE:/tmp/krb5cc_0 Default principal: demo@ad.demo.lan Valid starting Expires Service principal 03/07/13 10:08:48 03/07/13 20:08:55 krbtgt/ad.demo.lan@ad.demo.lan renew until 03/08/13 10:08:48 03/07/13 10:10:16 03/07/13 20:08:55 cifs/win200864@ad.demo.lan renew until 03/08/13 10:08:48 Kerberos 4 ticket cache: /tmp/tkt0 klist: You have no tickets cached interop01:~ # Valid starting Expires Service principal 03/07/13 10:08:48 03/07/13 20:08:55 krbtgt/ad.demo.lan@ad.demo.lan renew until 03/08/13 10:08:48 Kerberos 4 ticket cache: /tmp/tkt0 klist: You have no tickets cached 17

Use Case 2: Integrate SPNGO enabled applications with AD: OpenLDAP ldapsearch Steps Request TGT with kinit or log in as an AD user Run ldapsearch interop01:~ # ldapsearch \ -h win200864 -b 'cn=users,dc=ad,dc=demo,dc=lan' \ -LLL '(givenname=interop)' \ cn SASL/GSSAPI authentication started SASL username: Administrator@AD.DEMO.LAN SASL SSF: 56 SASL data security layer installed. dn: CN=Interop Demo,CN=Users,DC=ad,DC=demo,DC=lan cn: Interop Demo interop01:~ # 18

Scenario 1: Use Case 3: Mount a Windows share Mount manually With plain passwords mount -o username=administrator,password=mysecret //win200864/share /mnt/win200864-share Using Kerberos kinit Administrator mount -o sec=krb5i //win200864/share /mnt/win200864-share Mount at boot from fstab Credentials file //win200864/share /mnt/win200864-share cifs credentials=/root/.smb.credentials 0 0 See also: man 8 mount.cifs 19

Scenario 1: Use Case 4: Access a Samba share from Windows Transparently access Samba share Start Run \\interop02<enter> 20

Scenario 2: Integration of Apache with Active Directory Apache SLES 11 SP2 mod_kerb_auth / 3 2 Active Directory (LDAP) Kerberos Windows 2008 R2 Role: Member server AD: ad.demo.lan Hostname: interop04 /secure 1 4 Role: AD Domain Controller AD domain name: ad.demo.lan NT-style domain name: INTEROP Hostname: win200864 Firefox Internet Explorer See more detailled documentation Windows 7 (win764.ad.demo.lan) 21

Scenario 2: Integration of Apache with Active Directory Configuration steps Steps on SLES Join domain Create/amend keytab Configure Apache Steps on workstations Configure Integrated Authentication for Firefox Steps on Active Directory Add user sles-apache Add group SLES Web Users Add user Administrator to SLES Web Users Internet Explorer See also: HTTP-Based Cross-Platform Authentication by Using the Negotiate Protocol (MSDN) See also: Interop Demo appliance 22

Configure Apache for Kerberos authentication file: /etc/apache/conf.d/apache-integration-with-ad.conf LoadModule auth_kerb_module /usr/lib64/apache2/mod_auth_kerb.so LoadModule ldap_module /usr/lib64/apache2/mod_ldap.so LoadModule authnz_ldap_module /usr/lib64/apache2/mod_authnz_ldap.so <Location /secure> # Configuration for auth_kerb AuthName "---Restricted Access, please use your Active Directory credentials---" AuthType Kerberos KrbMethodNegotiate on KrbMethodK5Passwd on Krb5Keytab /etc/krb5.keytab KrbAuthRealms AD.DEMO.LAN KrbServiceName HTTP/interop04.ad.demo.lan@AD.DEMO.LAN KrbLocalUserMapping On # Configuration for authnz_ldap AuthLDAPBindDN cn=sles-apache,cn=users,dc=ad,dc=demo,dc=lan AuthLDAPBindPassword SecretPassword AuthLDAPURL "ldap://win200864.ad.demo.lan:389/dc=ad,dc=demo,dc=lan?samaccountname" AuthLDAPGroupAttribute member Require ldap-group cn=sles Web Users,cn=Users,dc=ad,dc=demo,dc=lan </Location> 23

Amend the keytab with HTTP principal # net ads keytab add HTTP -U Administrator Processing principals to add... Enter Administrator's password: # klist -k -e Keytab name: FILE:/etc/krb5.keytab KVNO Principal ---- -------------------------------------------------------------------------- 2 host/interop04.ad.demo.lan@ad.demo.lan (DES cbc mode with CRC-32) 2 host/interop04.ad.demo.lan@ad.demo.lan (DES cbc mode with RSA-MD5) 2 host/interop04.ad.demo.lan@ad.demo.lan (AES-128 CTS mode with 96-bit SHA-1 HMAC) 2 host/interop04.ad.demo.lan@ad.demo.lan (AES-256 CTS mode with 96-bit SHA-1 HMAC) 2 host/interop04.ad.demo.lan@ad.demo.lan (ArcFour with HMAC/md5) 2 host/interop04@ad.demo.lan (DES cbc mode with CRC-32) 2 host/interop04@ad.demo.lan (DES cbc mode with RSA-MD5) 2 host/interop04@ad.demo.lan (AES-128 CTS mode with 96-bit SHA-1 HMAC) 2 host/interop04@ad.demo.lan (AES-256 CTS mode with 96-bit SHA-1 HMAC) 2 host/interop04@ad.demo.lan (ArcFour with HMAC/md5) 2 INTEROP04$@AD.DEMO.LAN (DES cbc mode with CRC-32) 2 INTEROP04$@AD.DEMO.LAN (DES cbc mode with RSA-MD5) 2 INTEROP04$@AD.DEMO.LAN (AES-128 CTS mode with 96-bit SHA-1 HMAC) 2 INTEROP04$@AD.DEMO.LAN (AES-256 CTS mode with 96-bit SHA-1 HMAC) 2 INTEROP04$@AD.DEMO.LAN (ArcFour with HMAC/md5) 2 HTTP/interop04.ad.demo.lan@AD.DEMO.LAN (DES cbc mode with CRC-32) 2 HTTP/interop04.ad.demo.lan@AD.DEMO.LAN (DES cbc mode with RSA-MD5) 2 HTTP/interop04.ad.demo.lan@AD.DEMO.LAN (AES-128 CTS mode with 96-bit SHA-1 HMAC) 2 HTTP/interop04.ad.demo.lan@AD.DEMO.LAN (AES-256 CTS mode with 96-bit SHA-1 HMAC) 2 HTTP/interop04.ad.demo.lan@AD.DEMO.LAN (ArcFour with HMAC/md5) 2 HTTP/interop04@AD.DEMO.LAN (DES cbc mode with CRC-32) 2 HTTP/interop04@AD.DEMO.LAN (DES cbc mode with RSA-MD5) 2 HTTP/interop04@AD.DEMO.LAN (AES-128 CTS mode with 96-bit SHA-1 HMAC) 2 HTTP/interop04@AD.DEMO.LAN (AES-256 CTS mode with 96-bit SHA-1 HMAC) 2 HTTP/interop04@AD.DEMO.LAN (ArcFour with HMAC/md5) # 24

Create separate krb5.keytab for Apache interop02:~ # ktutil ktutil: list slot KVNO Principal ---- ---- ------------------------------------------ ktutil: rkt /etc/krb5.keytab ktutil: list slot KVNO Principal ---- ---- ------------------------------------------ 1 2 host/interop02.ad.demo.lan@ad.demo.lan... 16 2 HTTP/interop02.ad.demo.lan@AD.DEMO.LAN... 25 2 HTTP/interop02@AD.DEMO.LAN ktutil: delent 1 # repeat sufficient nr. of times to get rid of all but HTTP entries Ktutil: wkt /etc/apache2/conf.d/apache2-krb5.keytab # klist -k -e /etc/apache2/conf.d/apache2-krb5.keytab Keytab name: FILE:/etc/apache2/conf.d/apache2-krb5.keytab KVNO Principal ---- -------------------------------------------------------------------------- 2 HTTP/interop02.ad.demo.lan@AD.DEMO.LAN (DES cbc mode with CRC-32) 2 HTTP/interop02.ad.demo.lan@AD.DEMO.LAN (DES cbc mode with RSA-MD5) 2 HTTP/interop02.ad.demo.lan@AD.DEMO.LAN (AES-128 CTS mode with 96-bit SHA-1 HMAC) 2 HTTP/interop02.ad.demo.lan@AD.DEMO.LAN (AES-256 CTS mode with 96-bit SHA-1 HMAC) 2 HTTP/interop02.ad.demo.lan@AD.DEMO.LAN (ArcFour with HMAC/md5) 2 HTTP/interop02@AD.DEMO.LAN (DES cbc mode with CRC-32) 2 HTTP/interop02@AD.DEMO.LAN (DES cbc mode with RSA-MD5) 2 HTTP/interop02@AD.DEMO.LAN (AES-128 CTS mode with 96-bit SHA-1 HMAC) 2 HTTP/interop02@AD.DEMO.LAN (AES-256 CTS mode with 96-bit SHA-1 HMAC) 2 HTTP/interop02@AD.DEMO.LAN (ArcFour with HMAC/md5) # 25

Configure Firefox for Integrated Authentication 1 Firefox is by default not enabled for the Negotiate authentication 1: Negotiate not enabled 2: Enable Negotiate 2 3 3: Transparent access! 26

Example HTTP request header using SPNEGO GET /secure/ HTTP/1.1 Host: interop01.ad.demo.lan User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:18.0) Gecko/20100101 Firefox/18.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip, deflate Connection: keep-alive If-Modified-Since: Mon, 11 Mar 2013 13:37:53 GMT If-None-Match: "b75e-db-4d7a6479f2e40" Cache-Control: max-age=0, max-age=0 Authorization: Negotiate YIIGugYGKwYBBQUCoIIGrjCCBqqgMDAuB... 27

28 Configure Firefox for Integrated Authentication

29 Configure Firefox for Integrated Authentication

Configure IE for Integrated Authentication IE is by default not enabled for the Negotiate authentication 30

Configure IE for Integrated Authentication IE is by default not enabled for the Negotiate authentication 31

32 Configure IE for Integrated Authentication

Bleeding Edge Samba 4 With thanks to David Disseldorp, Samba Team 33

Traditional Copy Read Write File data takes disk and network round-trips Duplicate data stored on disk Read Write 34

Server-Side Copy Copy Server-Side Network round-trip avoided Server copies file data locally Duplicate data stored on disk Read Write 35

Btrfs Enhanced Server-Side Copy Copy Server-Side Data avoids network and disk round-trips No duplication of file data Ideal for hypervisor based workloads Clone Range 36

Prototype Samba implementation of Recovery Point Features Through integration of Btrfs, Snapper and Samba, SLES 11 SP2 is providing a file share Automatic snapshots create by Snapper provide Recovery Points for files Through Windows Explorer clients may access older versions of a file Technology components SLES 11 SP2 Btrfs and Snapper(prototype) Samba 4(prototype) Windows XP and 7 See also: Bleeding Edge Samba and Snapper appliance 37

Prototype Samba implementation of Recovery Point Automatic snapshots by Snapper Previous versions of test.txt in Explorer File test.txt is changed Samba4 service File share Automated snapshots File test.txt is created Now SLES 11 SP2 Network share Windows 7, Vista or XP 38

39 Questions

For more information please visit our website: www.suse.com Thank you. 40

Unpublished Work of SUSE. All Rights Reserved. This work is an unpublished work and contains confidential, proprietary and trade secret information of SUSE. Access to this work is restricted to SUSE employees who have a need to know to perform tasks within the scope of their assignments. No part of this work may be practiced, performed, copied, distributed, revised, modified, translated, abridged, condensed, expanded, collected, or adapted without the prior written consent of SUSE. Any use or exploitation of this work without authorization could subject the perpetrator to criminal and civil liability. General Disclaimer This document is not to be construed as a promise by any participating company to develop, deliver, or market a product. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. SUSE makes no representations or warranties with respect to the contents of this document, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. The development, release, and timing of features or functionality described for SUSE products remains at the sole discretion of SUSE. Further, SUSE reserves the right to revise this document and to make changes to its content, at any time, without obligation to notify any person or entity of such revisions or changes. All SUSE marks referenced in this presentation are trademarks or registered trademarks of Novell, Inc. in the United States and other countries. All third-party trademarks are the property of their respective owners.