SlideShare una empresa de Scribd logo
1 de 54
Descargar para leer sin conexión
Integrating Linux systems
with Active Directory
Using Open Source Tools
All Things Open
Dmitri Pal
Engineering Director, Red Hat, Inc.
10-23-2017
Integrating Linux systems with Active Directory Using Open Source Tools2
● Problem statement
● Aspects of integration
● Integration options
● Recommendations
Agenda
Problem Statement
and
Aspects of Integration
Integrating Linux systems with Active Directory Using Open Source Tools4
● For most companies AD is the central hub of the user identity management inside the
enterprise
● All systems that AD users can access (including Linux) need (in some way, i.e. directly or
indirectly) to have access to AD to perform authentication and identity lookups
● In some cases the AD is the only allowed central authentication server due to
compliance requirements
● In some cases DNS is tightly controlled by the Windows side of the enterprise and non
Windows systems need to adapt to this
Problem Statement
Integrating Linux systems with Active Directory Using Open Source Tools5
● Identities
○ Where are my users stored? What properties do they have? How is this data made
available to systems and applications? How this data is delivered to the right
endpoints? Is it cached and how it is refreshed?
● Authentication
○ What credentials do my users use to authenticate? Passwords? Smart Cards?
Special devices? Is there SSO? How can the same user access file stores and web
applications without requiring re-authentication?
Integration Aspects
Main aspects
Integrating Linux systems with Active Directory Using Open Source Tools
● Access control
○ Which users have access to which systems, services, applications? What
commands can they run on those systems? What SELinux context is a user is
mapped to?
● Policies
○ What is the type and strength of the credential? What are the SSO ticket/assertion
policies? How to express what is allowed and what not in my environment to be
compliant with known regulations (PCI, STIG, etc.)?
6
Integration Aspects
Main aspects, continued
Integration Options
Integrating Linux systems with Active Directory Using Open Source Tools
Direct Integration
8
Integration options
Linux
system
Linux
system
Linux
system
Active
Directory
Indirect Integration
Linux
system
Linux
system
Linux
system
Active
Directory
Central
Identity
Server
Integrating Linux systems with Active Directory Using Open Source Tools
Direct Integration
9
Integration options
Linux
system
Linux
system
Linux
system
Active
Directory
Integrating Linux systems with Active Directory Using Open Source Tools10
● 3rd party
● Legacy (pam_krb5, pam_ldap, nss_ldap, nslcd)
● Traditional – winbind
● Contemporary – SSSD (with realmd)
Direct Integration Options
Integrating Linux systems with Active Directory Using Open Source Tools11
Third Party Direct Integration
Active Directory
3rd
Party Plugin
Policies via GPO
DNS LDAP KDC
Linux System
Policies3rd
party client
Authentication
Identities
Name Resolution
sudo
HBAC
automount
selinux
Client may use native AD protocols
Authentication can be LDAP or
Kerberos
ID mapping is implementation specific
or uses SFU/IMU extensions in AD
ssh keys
Integrating Linux systems with Active Directory Using Open Source Tools12
● Pros
● Everything is managed in one place including policies
● SSO can be accomplished via Kerberos
● Cons
● Requires third party vendor
● Extra cost per system (adds up)
● Limits UNIX/Linux environment independence
● Requires software on AD side
● Policies are not managed or require extra addons
Third Party Direct Integration
Pros and Cons
Integrating Linux systems with Active Directory Using Open Source Tools13
Legacy Direct Integration
Active Directory
DNS LDAP KDC
Linux System
PoliciesLDAP/Kerberos
Authentication
Identities
Name Resolution
sudo
HBAC
automount
selinux
Authentication can be LDAP or
Kerberos
ID mapping SFU/IMU extensions are in AD
AD can be extended to serve basic sudo
and automount
ssh keys
Policies are delivered via configuration files and
managed locally or via a config server like Ansible
or Puppet.
Integrating Linux systems with Active Directory Using Open Source Tools14
● Pros:
● Free
● No third party vendor is needed
● Intuitive
● LDAP OTP authentication in Azure (have not tried)
● Available on UNIXes
● Cons:
● Requires SFU/IMU AD extension (which are deprecated as of fall 2014)
● Policies are not centrally managed
● Hard to configure securely
● No SSO with OTP
Legacy Direct Integration
Pros and Cons
Integrating Linux systems with Active Directory Using Open Source Tools15
Traditional Direct Integration
Active Directory
DNS LDAP KDC
Linux System
PoliciesSamba Winbind
Authentication
Identities
Name Resolution
sudo
HBAC
automount
selinux
Authentication can be LDAP,
Kerberos or NTLM
AD can be extended to serve basic sudo and automount
Can map AD SID to POSIX attributes or use SFU/IMU
Can join system into AD domain (net join or realmd)
Leverages native AD protocols and LDAP/Kerberos
ssh keys
Policies are delivered via configuration files and
managed locally or via a config server like Ansible
or Puppet.
Integrating Linux systems with Active Directory Using Open Source Tools16
● Pros:
● Well known
● Does not require third party
● Does not require SFU/IMU but can use them
● Supports trusted forests
● Supports NTLM fallback
● Cons:
● Can connect only to AD and very MSFT focused
● Policies are not centrally managed
● No OTP support
Traditional Direct Integration
Pros and Cons
Integrating Linux systems with Active Directory Using Open Source Tools17
● SSSD = System Security Services Daemon
● SSSD is a service used to retrieve information from a central identity management
system.
● SSSD connects a Linux system to a central identity store:
● Active Directory
● FreeIPA
● Any other directory server
● Provides authentication and access control
● Top technology in the evolution chain of the client side IdM components
SSSD
Introduction
Integrating Linux systems with Active Directory Using Open Source Tools18
● Multiple parallel sources of identity and authentication – domains
● All information is cached locally for offline use
● Remote data center use case
● Laptop or branch office system use case
● Advanced features for:
● FreeIPA integration
● AD integration
SSSD
Capabilities
Integrating Linux systems with Active Directory Using Open Source Tools19
SSSD Architecture
Simplified
Identity Server
Authentication
Server
Client
Client
Client
SSSD
Domain Provider
PAM Responer
Identity
Provider
Authentication
Provider
NSS Responer
Cache
Integrating Linux systems with Active Directory Using Open Source Tools20
● Supports everything that previous UNIX solutions support and more
● Brings architecture to the next level
● Supports multiple sources – domains
● Supports IdM specific features
● Supports trusts between AD and IdM
● Has a feature parity with winbind in core areas and surpasses in some
SSSD
Why?
Integrating Linux systems with Active Directory Using Open Source Tools21
● Component of Linux
● Main goal is to detect domain environment using DNS (detection)
○ AD
○ FreeIPA
○ Kerberos
● Join system to the domain (using SSSD or Winbind)
● Do it in one command or click
● Availability: command line, D-BUS interface, system installer, desktop
Realmd
Couple words
Integrating Linux systems with Active Directory Using Open Source Tools22
SSSD Based Direct Integration
Active Directory
DNS LDAP KDC
Linux System
PoliciesSSSD
Authentication
Identities
Name Resolution
sudo
HBAC
automount
selinux
Authentication can be LDAP or
Kerberos
AD can be extended to serve basic sudo and automount
Can map AD SID to POSIX attributes or use SFU/IMU
Can join system into AD domain (realmd)
Leverages native AD protocols and LDAP/Kerberos
ssh keys
GPO support for HBAC is available
Other policies are delivered via configuration files
and managed locally or via a config server like
Satellite or Puppet.
Integrating Linux systems with Active Directory Using Open Source Tools23
● Pros:
● Does not require SFU/IMU but can use them
● Can be used with different identity sources
● Support transitive trusts in AD domains and trusts with FreeIPA
● Supports CIFS client and Samba FS integration
● GPO for Windows based HBAC
● Well known now?
● Cons:
● No NTLM support, no support for AD forest trusts
● No SSO with OTP
● Not all policies are centrally managed
SSSD Based Direct Integration
Pros and Cons
Integrating Linux systems with Active Directory Using Open Source Tools24
● Use SSSD - it provides good enough integration out of box, free and well supported
● Use Winbind if you have special cases when NTLM or cross forest trusts are needed (*)
● Use 3rd party if you want super advanced functionality and have extra money
● Do not use legacy setup
Direct Integration
Option Summary
Integrating Linux systems with Active Directory Using Open Source Tools25
● Please read my blog :-)
○ http://rhelblog.redhat.com/author/dpalsecam/
● Comparison:
○ http://rhelblog.redhat.com/2015/02/04/overview-of-direct-integration-options/
○ It is 2.5 years old but gives a good foundation
Direct Integration
More information
Integrating Linux systems with Active Directory Using Open Source Tools26
● Policy management is still not fully central
● Might require deprecated extensions on the AD side
● Per system CALs add to cost
● Linux/UNIX administrators do not have control over the environment
Direct Integration
Issues
FreeIPA/IdM
Integrating Linux systems with Active Directory Using Open Source Tools28
● IdM – Identity Management in Red Hat Enterprise Linux
● Based on FreeIPA open source technology
● IPA stands for Identity, Policy, Audit
● So far we have focused on identities and related policies
● Audit is coming but it is bigger than FreeIPA
FreeIPA/IdM
Introduction
Integrating Linux systems with Active Directory Using Open Source Tools29
● Central management of authentication and identities for Linux clients
○ Improvement over standalone LDAP/Kerberos/NIS based solutions
○ Simplify management of infrastructure
● Gateway between the Linux/UNIX infrastructure and Active Directory
Problems FreeIPA/IdM Solves
Integrating Linux systems with Active Directory Using Open Source Tools30
FreeIPA/IdM
High Level Architecture
KDC
LDAP
PKI
DNS
CLI/UI
MIT Kerberos Dogtag
Bind389 DS
Linux
UNIX
Admin
Integrating Linux systems with Active Directory Using Open Source Tools31
FreeIPA/IdM Integration
FreeIPA/IdM
DNS LDAP KDC
Linux System
PoliciesSSSD
Authentication
Identities
Name Resolution
sudo
HBAC
automount
selinux
Authentication can be LDAP or
Kerberos ssh keysCertificates/Keys
PKI
And more: netgroups, automembership, OTP...
Integrating Linux systems with Active Directory Using Open Source Tools32
https://ipa.demo1.freeipa.org/
Demo
I bet we will not have time!
Integrating Linux systems with Active Directory Using Open Source Tools33
● Centralized authentication via Kerberos or LDAP
● Identity management:
○ users, groups, hosts, host groups, netgroups, services
○ user lifecycle management
● Manageability:
○ Simple installation scripts for server and client
○ Rich CLI and web-based user interface
○ Pluggable and extensible framework for UI/CLI
○ Flexible delegation and administrative model
■ Self, delegated, role based; read permissions
FreeIPA/IdM
Features
Integrating Linux systems with Active Directory Using Open Source Tools34
● Host-based access control
● Centrally-managed SUDO
● SSH key management
● Group-based password policies
● Automatic management of private groups
● Can act as NIS server for legacy systems
● Painless password migration
● SELinux user mapping
● Auto-membership for hosts and users
● Serving sets of automount maps to different clients
● Different POSIX data and SSH keys for different sets of hosts
FreeIPA/IdM
Features Continued
Integrating Linux systems with Active Directory Using Open Source Tools35
● DNS is optional but convenient
● Advantages (automation and security):
○ The SRV records get created automatically
○ Host records get created automatically when hosts are added
○ The clients can update their DNS records in a secure way (GSS-TSIG)
○ The admin can delegate management of the zones to whomever he likes
○ Built in DNSSEC support (Tech Preview)
● Disadvantages:
○ You need to delegate a zone
FreeIPA/IdM
Features DNS
Integrating Linux systems with Active Directory Using Open Source Tools36
● Replication:
○ Supports multi-server deployment based on the multi-master replication (up to 60
replicas)
○ Recommended deployment 2K-3K clients per replica
○ Details depend on the number of data centers and their geo-location
● 2FA
○ Native HOTP/TOTP support with FreeOTP and Yubikey
○ Proxied 2FA authentication over RADIUS for other solutions
○ 2FA for AD users (in future)
● Backup and Restore
● Compatibility with broad set of clients (LINUX/UNIX)
FreeIPA/IdM
More Features
Integrating Linux systems with Active Directory Using Open Source Tools37
● CA related capabilities
○ Certificate provisioning for users, hosts and services
○ Multiple certificate profiles
○ Sub CAs
○ Smart Card authentication
○ PKINIT authentication
FreeIPA/IdM
Features PKI
Integrating Linux systems with Active Directory Using Open Source Tools38
● CA deployment types
○ CA-less
○ Chained to other CA
○ Self signed root
● Tool to change deployment type and rotate CA keys
○ Flexibility in deploying CAs on different replicas
● Key store (Vault)
FreeIPA/IdM
Features PKI
Indirect Integration using FreeIPA/IdM
Integrating Linux systems with Active Directory Using Open Source Tools40
Indirect Integration
Linux
system
Linux
system
Linux
system
Active
Directory
FreeIPA
IdM
Integration Options
Integrating Linux systems with Active Directory Using Open Source Tools41
● User and password synchronization (not recommended)
● Cross forest trusts (recommended)
Integration Paths
Overview
Integrating Linux systems with Active Directory Using Open Source Tools42
● LDAP level synchronization
● AD is the authoritative source - one way sync
● No group synchronization, only users
● Only one domain can be synchronized
● Single point of failure - sync happens only on one replica
● Limited set of attributes is replicated
● Passwords need to captured and synced
○ Requires a plugin on every AD DC
○ Mismatch of password policies can lead to strange errors
Synchronization Solution
Overview
Integrating Linux systems with Active Directory Using Open Source Tools43
FreeIPA/IdM AD Integration with Trust
FreeIPA/IdM
DNS LDAP KDC
Linux System
SSSD
Authentication
Identities
Name Resolution
Certificates/Keys
PKI
Active Directory
DNSLDAPKDC PKI
Policies
sudo
HBAC
automount
selinux
ssh keys
Integrating Linux systems with Active Directory Using Open Source Tools44
FreeIPA/IdM AD Integration with Trust
FreeIPA/IdM
DNS LDAP KDC
Linux System
SSSD
Authentication
Identities
Name Resolution
Certificates/Keys
PKI
Active Directory
DNSLDAPKDC PKI
Policies
sudo
HBAC
automount
selinux
ssh keys
Chain
Integrating Linux systems with Active Directory Using Open Source Tools45
FreeIPA/IdM AD Integration with Trust
FreeIPA/IdM
DNS LDAP KDC
Linux System
SSSD
Authentication
Identities
Name Resolution
Certificates/Keys
PKI
Active Directory
DNSLDAPKDC PKI
Policies
sudo
HBAC
automount
selinux
ssh keys
Delegate
Zone
Integrating Linux systems with Active Directory Using Open Source Tools46
FreeIPA/IdM AD Integration with Trust
FreeIPA/IdM
DNS LDAP KDC
Linux System
SSSD
Authentication
Identities
Name Resolution
Certificates/Keys
PKI
Active Directory
DNSLDAPKDC PKI
Policies
sudo
HBAC
automount
selinux
ssh keys
Cross Forest Trust
Integrating Linux systems with Active Directory Using Open Source Tools47
FreeIPA/IdM AD Integration with Trust
FreeIPA/IdM
DNS LDAP KDC
Linux System
SSSD
Authentication
Identities
Name Resolution
Certificates/Keys
PKI
Active Directory
DNSLDAPKDC PKI
Policies
sudo
HBAC
automount
selinux
ssh keys
Integrating Linux systems with Active Directory Using Open Source Tools48
● Can leverage SFU/IMU for POSIX (brown field)
● Can do dynamic mapping of the SIDs to UIDs & GIDs (green field)
● Static override with ID views
User Mapping
Details
Integrating Linux systems with Active Directory Using Open Source Tools49
● Two-way and one-way trust (FreeIPA trusts AD)
○ AD/Samba DC trusting FreeIPA is on the roadmap
● Trust agents (different behavior of different replicas)
● Migration from the sync to trust
Trust
Details
Integrating Linux systems with Active Directory Using Open Source Tools50
● Pros:
○ Free (FreeIPA/IdM is a part of OS)
○ Reduces cost – no CALs or 3rd party
○ Policies are centrally managed
○ Gives control to Linux admins
○ Enabled independent growth of the Linux environment
○ No synchronization required
○ Authentication happens in AD
○ Great tool for troubleshooting AD misconfigurations
Trust Based Solution
Pros and Cons
Integrating Linux systems with Active Directory Using Open Source Tools51
● Requirement:
○ Proper DNS setup
● Cons:
○ Separate server
Trust Based Solution
Pros and Cons
Integrating Linux systems with Active Directory Using Open Source Tools52
● There are different paths to AD integration: direct or indirect
● SSSD is recommended for direct integration for small environments up to 30-50
systems
● FreeIPA/IdM is recommended for bigger environments where management needs to
scale and be automated
Summary
Integrating Linux systems with Active Directory Using Open Source Tools53
Questions?
THANK YOU!

Más contenido relacionado

La actualidad más candente

Deploying CloudStack with Ceph
Deploying CloudStack with CephDeploying CloudStack with Ceph
Deploying CloudStack with CephShapeBlue
 
Room 2 - 4 - Juncheng Anthony Lin - Redhat - A Practical Approach to Traditio...
Room 2 - 4 - Juncheng Anthony Lin - Redhat - A Practical Approach to Traditio...Room 2 - 4 - Juncheng Anthony Lin - Redhat - A Practical Approach to Traditio...
Room 2 - 4 - Juncheng Anthony Lin - Redhat - A Practical Approach to Traditio...Vietnam Open Infrastructure User Group
 
BIND 9 logging best practices
BIND 9 logging best practicesBIND 9 logging best practices
BIND 9 logging best practicesMen and Mice
 
What's Coming in CloudStack 4.19
What's Coming in CloudStack 4.19What's Coming in CloudStack 4.19
What's Coming in CloudStack 4.19ShapeBlue
 
Cilium: Kernel Native Security & DDOS Mitigation for Microservices with BPF
Cilium: Kernel Native Security & DDOS Mitigation for Microservices with BPFCilium: Kernel Native Security & DDOS Mitigation for Microservices with BPF
Cilium: Kernel Native Security & DDOS Mitigation for Microservices with BPFDocker, Inc.
 
Ibm spectrum scale fundamentals workshop for americas part 4 spectrum scale_r...
Ibm spectrum scale fundamentals workshop for americas part 4 spectrum scale_r...Ibm spectrum scale fundamentals workshop for americas part 4 spectrum scale_r...
Ibm spectrum scale fundamentals workshop for americas part 4 spectrum scale_r...xKinAnx
 
Room 1 - 2 - Nguyễn Văn Thắng & Dzung Nguyen - Proxmox VE và ZFS over iscsi
Room 1 - 2 - Nguyễn Văn Thắng & Dzung Nguyen - Proxmox VE và ZFS over iscsiRoom 1 - 2 - Nguyễn Văn Thắng & Dzung Nguyen - Proxmox VE và ZFS over iscsi
Room 1 - 2 - Nguyễn Văn Thắng & Dzung Nguyen - Proxmox VE và ZFS over iscsiVietnam Open Infrastructure User Group
 
Oracle Key Vault Data Subsetting and Masking
Oracle Key Vault Data Subsetting and MaskingOracle Key Vault Data Subsetting and Masking
Oracle Key Vault Data Subsetting and MaskingDLT Solutions
 
How to Hunt for Lateral Movement on Your Network
How to Hunt for Lateral Movement on Your NetworkHow to Hunt for Lateral Movement on Your Network
How to Hunt for Lateral Movement on Your NetworkSqrrl
 
Hci solution with VxRail
Hci solution with VxRailHci solution with VxRail
Hci solution with VxRailAnton An
 
Oracle Active Data Guard: Best Practices and New Features Deep Dive
Oracle Active Data Guard: Best Practices and New Features Deep Dive Oracle Active Data Guard: Best Practices and New Features Deep Dive
Oracle Active Data Guard: Best Practices and New Features Deep Dive Glen Hawkins
 
Room 1 - 6 - Trần Quốc Sang - Autoscaling for multi cloud platform based on S...
Room 1 - 6 - Trần Quốc Sang - Autoscaling for multi cloud platform based on S...Room 1 - 6 - Trần Quốc Sang - Autoscaling for multi cloud platform based on S...
Room 1 - 6 - Trần Quốc Sang - Autoscaling for multi cloud platform based on S...Vietnam Open Infrastructure User Group
 
The Best Storage Solution For CloudStack: LINSTOR
The Best Storage Solution For CloudStack: LINSTORThe Best Storage Solution For CloudStack: LINSTOR
The Best Storage Solution For CloudStack: LINSTORShapeBlue
 

La actualidad más candente (20)

Deploying CloudStack with Ceph
Deploying CloudStack with CephDeploying CloudStack with Ceph
Deploying CloudStack with Ceph
 
Apache CloudStack from API to UI
Apache CloudStack from API to UIApache CloudStack from API to UI
Apache CloudStack from API to UI
 
Red Hat Insights
Red Hat InsightsRed Hat Insights
Red Hat Insights
 
LDAP
LDAPLDAP
LDAP
 
Room 2 - 4 - Juncheng Anthony Lin - Redhat - A Practical Approach to Traditio...
Room 2 - 4 - Juncheng Anthony Lin - Redhat - A Practical Approach to Traditio...Room 2 - 4 - Juncheng Anthony Lin - Redhat - A Practical Approach to Traditio...
Room 2 - 4 - Juncheng Anthony Lin - Redhat - A Practical Approach to Traditio...
 
BIND 9 logging best practices
BIND 9 logging best practicesBIND 9 logging best practices
BIND 9 logging best practices
 
What's Coming in CloudStack 4.19
What's Coming in CloudStack 4.19What's Coming in CloudStack 4.19
What's Coming in CloudStack 4.19
 
Cilium: Kernel Native Security & DDOS Mitigation for Microservices with BPF
Cilium: Kernel Native Security & DDOS Mitigation for Microservices with BPFCilium: Kernel Native Security & DDOS Mitigation for Microservices with BPF
Cilium: Kernel Native Security & DDOS Mitigation for Microservices with BPF
 
Ldap
LdapLdap
Ldap
 
Breaking The Cloud Kill Chain
Breaking The Cloud Kill ChainBreaking The Cloud Kill Chain
Breaking The Cloud Kill Chain
 
Ibm spectrum scale fundamentals workshop for americas part 4 spectrum scale_r...
Ibm spectrum scale fundamentals workshop for americas part 4 spectrum scale_r...Ibm spectrum scale fundamentals workshop for americas part 4 spectrum scale_r...
Ibm spectrum scale fundamentals workshop for americas part 4 spectrum scale_r...
 
Room 1 - 2 - Nguyễn Văn Thắng & Dzung Nguyen - Proxmox VE và ZFS over iscsi
Room 1 - 2 - Nguyễn Văn Thắng & Dzung Nguyen - Proxmox VE và ZFS over iscsiRoom 1 - 2 - Nguyễn Văn Thắng & Dzung Nguyen - Proxmox VE và ZFS over iscsi
Room 1 - 2 - Nguyễn Văn Thắng & Dzung Nguyen - Proxmox VE và ZFS over iscsi
 
IBM QRadar UBA
IBM QRadar UBA IBM QRadar UBA
IBM QRadar UBA
 
Oracle Key Vault Data Subsetting and Masking
Oracle Key Vault Data Subsetting and MaskingOracle Key Vault Data Subsetting and Masking
Oracle Key Vault Data Subsetting and Masking
 
How to Hunt for Lateral Movement on Your Network
How to Hunt for Lateral Movement on Your NetworkHow to Hunt for Lateral Movement on Your Network
How to Hunt for Lateral Movement on Your Network
 
Hci solution with VxRail
Hci solution with VxRailHci solution with VxRail
Hci solution with VxRail
 
Oracle Active Data Guard: Best Practices and New Features Deep Dive
Oracle Active Data Guard: Best Practices and New Features Deep Dive Oracle Active Data Guard: Best Practices and New Features Deep Dive
Oracle Active Data Guard: Best Practices and New Features Deep Dive
 
Privileged Access Manager POC Guidelines
Privileged Access Manager  POC GuidelinesPrivileged Access Manager  POC Guidelines
Privileged Access Manager POC Guidelines
 
Room 1 - 6 - Trần Quốc Sang - Autoscaling for multi cloud platform based on S...
Room 1 - 6 - Trần Quốc Sang - Autoscaling for multi cloud platform based on S...Room 1 - 6 - Trần Quốc Sang - Autoscaling for multi cloud platform based on S...
Room 1 - 6 - Trần Quốc Sang - Autoscaling for multi cloud platform based on S...
 
The Best Storage Solution For CloudStack: LINSTOR
The Best Storage Solution For CloudStack: LINSTORThe Best Storage Solution For CloudStack: LINSTOR
The Best Storage Solution For CloudStack: LINSTOR
 

Similar a Integrating Linux Systems with Active Directory

Introduction to active_directory
Introduction to active_directoryIntroduction to active_directory
Introduction to active_directoryCouploa Couploa
 
[Pass the SALT 2021] Hosting Identity in the Cloud with free softwares
[Pass the SALT 2021] Hosting Identity in the Cloud with free softwares[Pass the SALT 2021] Hosting Identity in the Cloud with free softwares
[Pass the SALT 2021] Hosting Identity in the Cloud with free softwaresWorteks
 
[OW2con'21] Hosting Identity in the Cloud with OW2 free softwares
[OW2con'21] Hosting Identity in the Cloud with OW2 free softwares[OW2con'21] Hosting Identity in the Cloud with OW2 free softwares
[OW2con'21] Hosting Identity in the Cloud with OW2 free softwaresWorteks
 
Webinar: OpenIDM 3.1
Webinar: OpenIDM 3.1Webinar: OpenIDM 3.1
Webinar: OpenIDM 3.1ForgeRock
 
Dev ops for big data cluster management tools
Dev ops for big data  cluster management toolsDev ops for big data  cluster management tools
Dev ops for big data cluster management toolsRan Silberman
 
Openstack platform -Red Hat Pizza and technology event - Israel
Openstack platform -Red Hat Pizza and technology event - IsraelOpenstack platform -Red Hat Pizza and technology event - Israel
Openstack platform -Red Hat Pizza and technology event - IsraelArthur Berezin
 
RHCP_IdM_Lab_User_Guide_2015
RHCP_IdM_Lab_User_Guide_2015RHCP_IdM_Lab_User_Guide_2015
RHCP_IdM_Lab_User_Guide_2015Diaa Radwan
 
The State of Security Enhanced Linux - FOSS.IN/2007
The State of Security Enhanced Linux - FOSS.IN/2007The State of Security Enhanced Linux - FOSS.IN/2007
The State of Security Enhanced Linux - FOSS.IN/2007James Morris
 
micro services architecture (FrosCon2014)
micro services architecture (FrosCon2014)micro services architecture (FrosCon2014)
micro services architecture (FrosCon2014)smancke
 
Pragmatic Approach to Microservices and Cell-based Architecture
Pragmatic Approach to Microservices and Cell-based Architecture Pragmatic Approach to Microservices and Cell-based Architecture
Pragmatic Approach to Microservices and Cell-based Architecture Andrew Blades
 
IBM Connect2014 JMP106
IBM Connect2014 JMP106IBM Connect2014 JMP106
IBM Connect2014 JMP106Thomas Evans
 
Faster Computing has contacted Go2Linux and requested a brief prop
Faster Computing has contacted Go2Linux and requested a brief propFaster Computing has contacted Go2Linux and requested a brief prop
Faster Computing has contacted Go2Linux and requested a brief propChereCheek752
 
Securing Your MongoDB Deployment
Securing Your MongoDB DeploymentSecuring Your MongoDB Deployment
Securing Your MongoDB DeploymentMongoDB
 
VMworld 2015: Beyond the Marketing - Horizon 6 Technical Deep Dive
VMworld 2015: Beyond the Marketing - Horizon 6 Technical Deep DiveVMworld 2015: Beyond the Marketing - Horizon 6 Technical Deep Dive
VMworld 2015: Beyond the Marketing - Horizon 6 Technical Deep DiveVMworld
 
Server 2008 r2 ppt
Server 2008 r2 pptServer 2008 r2 ppt
Server 2008 r2 pptRaj Solanki
 
Windows Server 2008 R2 Overview Jordan Remix
Windows Server 2008 R2 Overview Jordan RemixWindows Server 2008 R2 Overview Jordan Remix
Windows Server 2008 R2 Overview Jordan RemixJordan Remix
 
Webinar slides: Free Monitoring (on Steroids) for MySQL, MariaDB, PostgreSQL ...
Webinar slides: Free Monitoring (on Steroids) for MySQL, MariaDB, PostgreSQL ...Webinar slides: Free Monitoring (on Steroids) for MySQL, MariaDB, PostgreSQL ...
Webinar slides: Free Monitoring (on Steroids) for MySQL, MariaDB, PostgreSQL ...Severalnines
 
Event Driven Infrastructure as Software With Lee Briggs | Current 2022
Event Driven Infrastructure as Software With Lee Briggs | Current 2022Event Driven Infrastructure as Software With Lee Briggs | Current 2022
Event Driven Infrastructure as Software With Lee Briggs | Current 2022HostedbyConfluent
 

Similar a Integrating Linux Systems with Active Directory (20)

Introduction to active_directory
Introduction to active_directoryIntroduction to active_directory
Introduction to active_directory
 
[Pass the SALT 2021] Hosting Identity in the Cloud with free softwares
[Pass the SALT 2021] Hosting Identity in the Cloud with free softwares[Pass the SALT 2021] Hosting Identity in the Cloud with free softwares
[Pass the SALT 2021] Hosting Identity in the Cloud with free softwares
 
[OW2con'21] Hosting Identity in the Cloud with OW2 free softwares
[OW2con'21] Hosting Identity in the Cloud with OW2 free softwares[OW2con'21] Hosting Identity in the Cloud with OW2 free softwares
[OW2con'21] Hosting Identity in the Cloud with OW2 free softwares
 
Windows Azure for IT Pros
Windows Azure for IT ProsWindows Azure for IT Pros
Windows Azure for IT Pros
 
Webinar: OpenIDM 3.1
Webinar: OpenIDM 3.1Webinar: OpenIDM 3.1
Webinar: OpenIDM 3.1
 
Dev ops for big data cluster management tools
Dev ops for big data  cluster management toolsDev ops for big data  cluster management tools
Dev ops for big data cluster management tools
 
Openstack platform -Red Hat Pizza and technology event - Israel
Openstack platform -Red Hat Pizza and technology event - IsraelOpenstack platform -Red Hat Pizza and technology event - Israel
Openstack platform -Red Hat Pizza and technology event - Israel
 
RHCP_IdM_Lab_User_Guide_2015
RHCP_IdM_Lab_User_Guide_2015RHCP_IdM_Lab_User_Guide_2015
RHCP_IdM_Lab_User_Guide_2015
 
The State of Security Enhanced Linux - FOSS.IN/2007
The State of Security Enhanced Linux - FOSS.IN/2007The State of Security Enhanced Linux - FOSS.IN/2007
The State of Security Enhanced Linux - FOSS.IN/2007
 
micro services architecture (FrosCon2014)
micro services architecture (FrosCon2014)micro services architecture (FrosCon2014)
micro services architecture (FrosCon2014)
 
Pragmatic Approach to Microservices and Cell-based Architecture
Pragmatic Approach to Microservices and Cell-based Architecture Pragmatic Approach to Microservices and Cell-based Architecture
Pragmatic Approach to Microservices and Cell-based Architecture
 
IBM Connect2014 JMP106
IBM Connect2014 JMP106IBM Connect2014 JMP106
IBM Connect2014 JMP106
 
Faster Computing has contacted Go2Linux and requested a brief prop
Faster Computing has contacted Go2Linux and requested a brief propFaster Computing has contacted Go2Linux and requested a brief prop
Faster Computing has contacted Go2Linux and requested a brief prop
 
Securing Your MongoDB Deployment
Securing Your MongoDB DeploymentSecuring Your MongoDB Deployment
Securing Your MongoDB Deployment
 
VMworld 2015: Beyond the Marketing - Horizon 6 Technical Deep Dive
VMworld 2015: Beyond the Marketing - Horizon 6 Technical Deep DiveVMworld 2015: Beyond the Marketing - Horizon 6 Technical Deep Dive
VMworld 2015: Beyond the Marketing - Horizon 6 Technical Deep Dive
 
Server 2008 r2 ppt
Server 2008 r2 pptServer 2008 r2 ppt
Server 2008 r2 ppt
 
Windows Server 2008 R2 Overview Jordan Remix
Windows Server 2008 R2 Overview Jordan RemixWindows Server 2008 R2 Overview Jordan Remix
Windows Server 2008 R2 Overview Jordan Remix
 
Webinar slides: Free Monitoring (on Steroids) for MySQL, MariaDB, PostgreSQL ...
Webinar slides: Free Monitoring (on Steroids) for MySQL, MariaDB, PostgreSQL ...Webinar slides: Free Monitoring (on Steroids) for MySQL, MariaDB, PostgreSQL ...
Webinar slides: Free Monitoring (on Steroids) for MySQL, MariaDB, PostgreSQL ...
 
Scribe insight 04 insight 7.9.0
Scribe insight 04   insight 7.9.0Scribe insight 04   insight 7.9.0
Scribe insight 04 insight 7.9.0
 
Event Driven Infrastructure as Software With Lee Briggs | Current 2022
Event Driven Infrastructure as Software With Lee Briggs | Current 2022Event Driven Infrastructure as Software With Lee Briggs | Current 2022
Event Driven Infrastructure as Software With Lee Briggs | Current 2022
 

Más de All Things Open

Building Reliability - The Realities of Observability
Building Reliability - The Realities of ObservabilityBuilding Reliability - The Realities of Observability
Building Reliability - The Realities of ObservabilityAll Things Open
 
Modern Database Best Practices
Modern Database Best PracticesModern Database Best Practices
Modern Database Best PracticesAll Things Open
 
Open Source and Public Policy
Open Source and Public PolicyOpen Source and Public Policy
Open Source and Public PolicyAll Things Open
 
Weaving Microservices into a Unified GraphQL Schema with graph-quilt - Ashpak...
Weaving Microservices into a Unified GraphQL Schema with graph-quilt - Ashpak...Weaving Microservices into a Unified GraphQL Schema with graph-quilt - Ashpak...
Weaving Microservices into a Unified GraphQL Schema with graph-quilt - Ashpak...All Things Open
 
The State of Passwordless Auth on the Web - Phil Nash
The State of Passwordless Auth on the Web - Phil NashThe State of Passwordless Auth on the Web - Phil Nash
The State of Passwordless Auth on the Web - Phil NashAll Things Open
 
Total ReDoS: The dangers of regex in JavaScript
Total ReDoS: The dangers of regex in JavaScriptTotal ReDoS: The dangers of regex in JavaScript
Total ReDoS: The dangers of regex in JavaScriptAll Things Open
 
What Does Real World Mass Adoption of Decentralized Tech Look Like?
What Does Real World Mass Adoption of Decentralized Tech Look Like?What Does Real World Mass Adoption of Decentralized Tech Look Like?
What Does Real World Mass Adoption of Decentralized Tech Look Like?All Things Open
 
How to Write & Deploy a Smart Contract
How to Write & Deploy a Smart ContractHow to Write & Deploy a Smart Contract
How to Write & Deploy a Smart ContractAll Things Open
 
Spinning Your Drones with Cadence Workflows, Apache Kafka and TensorFlow
 Spinning Your Drones with Cadence Workflows, Apache Kafka and TensorFlow Spinning Your Drones with Cadence Workflows, Apache Kafka and TensorFlow
Spinning Your Drones with Cadence Workflows, Apache Kafka and TensorFlowAll Things Open
 
DEI Challenges and Success
DEI Challenges and SuccessDEI Challenges and Success
DEI Challenges and SuccessAll Things Open
 
Scaling Web Applications with Background
Scaling Web Applications with BackgroundScaling Web Applications with Background
Scaling Web Applications with BackgroundAll Things Open
 
Supercharging tutorials with WebAssembly
Supercharging tutorials with WebAssemblySupercharging tutorials with WebAssembly
Supercharging tutorials with WebAssemblyAll Things Open
 
Using SQL to Find Needles in Haystacks
Using SQL to Find Needles in HaystacksUsing SQL to Find Needles in Haystacks
Using SQL to Find Needles in HaystacksAll Things Open
 
Configuration Security as a Game of Pursuit Intercept
Configuration Security as a Game of Pursuit InterceptConfiguration Security as a Game of Pursuit Intercept
Configuration Security as a Game of Pursuit InterceptAll Things Open
 
Scaling an Open Source Sponsorship Program
Scaling an Open Source Sponsorship ProgramScaling an Open Source Sponsorship Program
Scaling an Open Source Sponsorship ProgramAll Things Open
 
Build Developer Experience Teams for Open Source
Build Developer Experience Teams for Open SourceBuild Developer Experience Teams for Open Source
Build Developer Experience Teams for Open SourceAll Things Open
 
Deploying Models at Scale with Apache Beam
Deploying Models at Scale with Apache BeamDeploying Models at Scale with Apache Beam
Deploying Models at Scale with Apache BeamAll Things Open
 
Sudo – Giving access while staying in control
Sudo – Giving access while staying in controlSudo – Giving access while staying in control
Sudo – Giving access while staying in controlAll Things Open
 
Fortifying the Future: Tackling Security Challenges in AI/ML Applications
Fortifying the Future: Tackling Security Challenges in AI/ML ApplicationsFortifying the Future: Tackling Security Challenges in AI/ML Applications
Fortifying the Future: Tackling Security Challenges in AI/ML ApplicationsAll Things Open
 
Securing Cloud Resources Deployed with Control Planes on Kubernetes using Gov...
Securing Cloud Resources Deployed with Control Planes on Kubernetes using Gov...Securing Cloud Resources Deployed with Control Planes on Kubernetes using Gov...
Securing Cloud Resources Deployed with Control Planes on Kubernetes using Gov...All Things Open
 

Más de All Things Open (20)

Building Reliability - The Realities of Observability
Building Reliability - The Realities of ObservabilityBuilding Reliability - The Realities of Observability
Building Reliability - The Realities of Observability
 
Modern Database Best Practices
Modern Database Best PracticesModern Database Best Practices
Modern Database Best Practices
 
Open Source and Public Policy
Open Source and Public PolicyOpen Source and Public Policy
Open Source and Public Policy
 
Weaving Microservices into a Unified GraphQL Schema with graph-quilt - Ashpak...
Weaving Microservices into a Unified GraphQL Schema with graph-quilt - Ashpak...Weaving Microservices into a Unified GraphQL Schema with graph-quilt - Ashpak...
Weaving Microservices into a Unified GraphQL Schema with graph-quilt - Ashpak...
 
The State of Passwordless Auth on the Web - Phil Nash
The State of Passwordless Auth on the Web - Phil NashThe State of Passwordless Auth on the Web - Phil Nash
The State of Passwordless Auth on the Web - Phil Nash
 
Total ReDoS: The dangers of regex in JavaScript
Total ReDoS: The dangers of regex in JavaScriptTotal ReDoS: The dangers of regex in JavaScript
Total ReDoS: The dangers of regex in JavaScript
 
What Does Real World Mass Adoption of Decentralized Tech Look Like?
What Does Real World Mass Adoption of Decentralized Tech Look Like?What Does Real World Mass Adoption of Decentralized Tech Look Like?
What Does Real World Mass Adoption of Decentralized Tech Look Like?
 
How to Write & Deploy a Smart Contract
How to Write & Deploy a Smart ContractHow to Write & Deploy a Smart Contract
How to Write & Deploy a Smart Contract
 
Spinning Your Drones with Cadence Workflows, Apache Kafka and TensorFlow
 Spinning Your Drones with Cadence Workflows, Apache Kafka and TensorFlow Spinning Your Drones with Cadence Workflows, Apache Kafka and TensorFlow
Spinning Your Drones with Cadence Workflows, Apache Kafka and TensorFlow
 
DEI Challenges and Success
DEI Challenges and SuccessDEI Challenges and Success
DEI Challenges and Success
 
Scaling Web Applications with Background
Scaling Web Applications with BackgroundScaling Web Applications with Background
Scaling Web Applications with Background
 
Supercharging tutorials with WebAssembly
Supercharging tutorials with WebAssemblySupercharging tutorials with WebAssembly
Supercharging tutorials with WebAssembly
 
Using SQL to Find Needles in Haystacks
Using SQL to Find Needles in HaystacksUsing SQL to Find Needles in Haystacks
Using SQL to Find Needles in Haystacks
 
Configuration Security as a Game of Pursuit Intercept
Configuration Security as a Game of Pursuit InterceptConfiguration Security as a Game of Pursuit Intercept
Configuration Security as a Game of Pursuit Intercept
 
Scaling an Open Source Sponsorship Program
Scaling an Open Source Sponsorship ProgramScaling an Open Source Sponsorship Program
Scaling an Open Source Sponsorship Program
 
Build Developer Experience Teams for Open Source
Build Developer Experience Teams for Open SourceBuild Developer Experience Teams for Open Source
Build Developer Experience Teams for Open Source
 
Deploying Models at Scale with Apache Beam
Deploying Models at Scale with Apache BeamDeploying Models at Scale with Apache Beam
Deploying Models at Scale with Apache Beam
 
Sudo – Giving access while staying in control
Sudo – Giving access while staying in controlSudo – Giving access while staying in control
Sudo – Giving access while staying in control
 
Fortifying the Future: Tackling Security Challenges in AI/ML Applications
Fortifying the Future: Tackling Security Challenges in AI/ML ApplicationsFortifying the Future: Tackling Security Challenges in AI/ML Applications
Fortifying the Future: Tackling Security Challenges in AI/ML Applications
 
Securing Cloud Resources Deployed with Control Planes on Kubernetes using Gov...
Securing Cloud Resources Deployed with Control Planes on Kubernetes using Gov...Securing Cloud Resources Deployed with Control Planes on Kubernetes using Gov...
Securing Cloud Resources Deployed with Control Planes on Kubernetes using Gov...
 

Último

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 

Último (20)

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

Integrating Linux Systems with Active Directory

  • 1. Integrating Linux systems with Active Directory Using Open Source Tools All Things Open Dmitri Pal Engineering Director, Red Hat, Inc. 10-23-2017
  • 2. Integrating Linux systems with Active Directory Using Open Source Tools2 ● Problem statement ● Aspects of integration ● Integration options ● Recommendations Agenda
  • 4. Integrating Linux systems with Active Directory Using Open Source Tools4 ● For most companies AD is the central hub of the user identity management inside the enterprise ● All systems that AD users can access (including Linux) need (in some way, i.e. directly or indirectly) to have access to AD to perform authentication and identity lookups ● In some cases the AD is the only allowed central authentication server due to compliance requirements ● In some cases DNS is tightly controlled by the Windows side of the enterprise and non Windows systems need to adapt to this Problem Statement
  • 5. Integrating Linux systems with Active Directory Using Open Source Tools5 ● Identities ○ Where are my users stored? What properties do they have? How is this data made available to systems and applications? How this data is delivered to the right endpoints? Is it cached and how it is refreshed? ● Authentication ○ What credentials do my users use to authenticate? Passwords? Smart Cards? Special devices? Is there SSO? How can the same user access file stores and web applications without requiring re-authentication? Integration Aspects Main aspects
  • 6. Integrating Linux systems with Active Directory Using Open Source Tools ● Access control ○ Which users have access to which systems, services, applications? What commands can they run on those systems? What SELinux context is a user is mapped to? ● Policies ○ What is the type and strength of the credential? What are the SSO ticket/assertion policies? How to express what is allowed and what not in my environment to be compliant with known regulations (PCI, STIG, etc.)? 6 Integration Aspects Main aspects, continued
  • 8. Integrating Linux systems with Active Directory Using Open Source Tools Direct Integration 8 Integration options Linux system Linux system Linux system Active Directory Indirect Integration Linux system Linux system Linux system Active Directory Central Identity Server
  • 9. Integrating Linux systems with Active Directory Using Open Source Tools Direct Integration 9 Integration options Linux system Linux system Linux system Active Directory
  • 10. Integrating Linux systems with Active Directory Using Open Source Tools10 ● 3rd party ● Legacy (pam_krb5, pam_ldap, nss_ldap, nslcd) ● Traditional – winbind ● Contemporary – SSSD (with realmd) Direct Integration Options
  • 11. Integrating Linux systems with Active Directory Using Open Source Tools11 Third Party Direct Integration Active Directory 3rd Party Plugin Policies via GPO DNS LDAP KDC Linux System Policies3rd party client Authentication Identities Name Resolution sudo HBAC automount selinux Client may use native AD protocols Authentication can be LDAP or Kerberos ID mapping is implementation specific or uses SFU/IMU extensions in AD ssh keys
  • 12. Integrating Linux systems with Active Directory Using Open Source Tools12 ● Pros ● Everything is managed in one place including policies ● SSO can be accomplished via Kerberos ● Cons ● Requires third party vendor ● Extra cost per system (adds up) ● Limits UNIX/Linux environment independence ● Requires software on AD side ● Policies are not managed or require extra addons Third Party Direct Integration Pros and Cons
  • 13. Integrating Linux systems with Active Directory Using Open Source Tools13 Legacy Direct Integration Active Directory DNS LDAP KDC Linux System PoliciesLDAP/Kerberos Authentication Identities Name Resolution sudo HBAC automount selinux Authentication can be LDAP or Kerberos ID mapping SFU/IMU extensions are in AD AD can be extended to serve basic sudo and automount ssh keys Policies are delivered via configuration files and managed locally or via a config server like Ansible or Puppet.
  • 14. Integrating Linux systems with Active Directory Using Open Source Tools14 ● Pros: ● Free ● No third party vendor is needed ● Intuitive ● LDAP OTP authentication in Azure (have not tried) ● Available on UNIXes ● Cons: ● Requires SFU/IMU AD extension (which are deprecated as of fall 2014) ● Policies are not centrally managed ● Hard to configure securely ● No SSO with OTP Legacy Direct Integration Pros and Cons
  • 15. Integrating Linux systems with Active Directory Using Open Source Tools15 Traditional Direct Integration Active Directory DNS LDAP KDC Linux System PoliciesSamba Winbind Authentication Identities Name Resolution sudo HBAC automount selinux Authentication can be LDAP, Kerberos or NTLM AD can be extended to serve basic sudo and automount Can map AD SID to POSIX attributes or use SFU/IMU Can join system into AD domain (net join or realmd) Leverages native AD protocols and LDAP/Kerberos ssh keys Policies are delivered via configuration files and managed locally or via a config server like Ansible or Puppet.
  • 16. Integrating Linux systems with Active Directory Using Open Source Tools16 ● Pros: ● Well known ● Does not require third party ● Does not require SFU/IMU but can use them ● Supports trusted forests ● Supports NTLM fallback ● Cons: ● Can connect only to AD and very MSFT focused ● Policies are not centrally managed ● No OTP support Traditional Direct Integration Pros and Cons
  • 17. Integrating Linux systems with Active Directory Using Open Source Tools17 ● SSSD = System Security Services Daemon ● SSSD is a service used to retrieve information from a central identity management system. ● SSSD connects a Linux system to a central identity store: ● Active Directory ● FreeIPA ● Any other directory server ● Provides authentication and access control ● Top technology in the evolution chain of the client side IdM components SSSD Introduction
  • 18. Integrating Linux systems with Active Directory Using Open Source Tools18 ● Multiple parallel sources of identity and authentication – domains ● All information is cached locally for offline use ● Remote data center use case ● Laptop or branch office system use case ● Advanced features for: ● FreeIPA integration ● AD integration SSSD Capabilities
  • 19. Integrating Linux systems with Active Directory Using Open Source Tools19 SSSD Architecture Simplified Identity Server Authentication Server Client Client Client SSSD Domain Provider PAM Responer Identity Provider Authentication Provider NSS Responer Cache
  • 20. Integrating Linux systems with Active Directory Using Open Source Tools20 ● Supports everything that previous UNIX solutions support and more ● Brings architecture to the next level ● Supports multiple sources – domains ● Supports IdM specific features ● Supports trusts between AD and IdM ● Has a feature parity with winbind in core areas and surpasses in some SSSD Why?
  • 21. Integrating Linux systems with Active Directory Using Open Source Tools21 ● Component of Linux ● Main goal is to detect domain environment using DNS (detection) ○ AD ○ FreeIPA ○ Kerberos ● Join system to the domain (using SSSD or Winbind) ● Do it in one command or click ● Availability: command line, D-BUS interface, system installer, desktop Realmd Couple words
  • 22. Integrating Linux systems with Active Directory Using Open Source Tools22 SSSD Based Direct Integration Active Directory DNS LDAP KDC Linux System PoliciesSSSD Authentication Identities Name Resolution sudo HBAC automount selinux Authentication can be LDAP or Kerberos AD can be extended to serve basic sudo and automount Can map AD SID to POSIX attributes or use SFU/IMU Can join system into AD domain (realmd) Leverages native AD protocols and LDAP/Kerberos ssh keys GPO support for HBAC is available Other policies are delivered via configuration files and managed locally or via a config server like Satellite or Puppet.
  • 23. Integrating Linux systems with Active Directory Using Open Source Tools23 ● Pros: ● Does not require SFU/IMU but can use them ● Can be used with different identity sources ● Support transitive trusts in AD domains and trusts with FreeIPA ● Supports CIFS client and Samba FS integration ● GPO for Windows based HBAC ● Well known now? ● Cons: ● No NTLM support, no support for AD forest trusts ● No SSO with OTP ● Not all policies are centrally managed SSSD Based Direct Integration Pros and Cons
  • 24. Integrating Linux systems with Active Directory Using Open Source Tools24 ● Use SSSD - it provides good enough integration out of box, free and well supported ● Use Winbind if you have special cases when NTLM or cross forest trusts are needed (*) ● Use 3rd party if you want super advanced functionality and have extra money ● Do not use legacy setup Direct Integration Option Summary
  • 25. Integrating Linux systems with Active Directory Using Open Source Tools25 ● Please read my blog :-) ○ http://rhelblog.redhat.com/author/dpalsecam/ ● Comparison: ○ http://rhelblog.redhat.com/2015/02/04/overview-of-direct-integration-options/ ○ It is 2.5 years old but gives a good foundation Direct Integration More information
  • 26. Integrating Linux systems with Active Directory Using Open Source Tools26 ● Policy management is still not fully central ● Might require deprecated extensions on the AD side ● Per system CALs add to cost ● Linux/UNIX administrators do not have control over the environment Direct Integration Issues
  • 28. Integrating Linux systems with Active Directory Using Open Source Tools28 ● IdM – Identity Management in Red Hat Enterprise Linux ● Based on FreeIPA open source technology ● IPA stands for Identity, Policy, Audit ● So far we have focused on identities and related policies ● Audit is coming but it is bigger than FreeIPA FreeIPA/IdM Introduction
  • 29. Integrating Linux systems with Active Directory Using Open Source Tools29 ● Central management of authentication and identities for Linux clients ○ Improvement over standalone LDAP/Kerberos/NIS based solutions ○ Simplify management of infrastructure ● Gateway between the Linux/UNIX infrastructure and Active Directory Problems FreeIPA/IdM Solves
  • 30. Integrating Linux systems with Active Directory Using Open Source Tools30 FreeIPA/IdM High Level Architecture KDC LDAP PKI DNS CLI/UI MIT Kerberos Dogtag Bind389 DS Linux UNIX Admin
  • 31. Integrating Linux systems with Active Directory Using Open Source Tools31 FreeIPA/IdM Integration FreeIPA/IdM DNS LDAP KDC Linux System PoliciesSSSD Authentication Identities Name Resolution sudo HBAC automount selinux Authentication can be LDAP or Kerberos ssh keysCertificates/Keys PKI And more: netgroups, automembership, OTP...
  • 32. Integrating Linux systems with Active Directory Using Open Source Tools32 https://ipa.demo1.freeipa.org/ Demo I bet we will not have time!
  • 33. Integrating Linux systems with Active Directory Using Open Source Tools33 ● Centralized authentication via Kerberos or LDAP ● Identity management: ○ users, groups, hosts, host groups, netgroups, services ○ user lifecycle management ● Manageability: ○ Simple installation scripts for server and client ○ Rich CLI and web-based user interface ○ Pluggable and extensible framework for UI/CLI ○ Flexible delegation and administrative model ■ Self, delegated, role based; read permissions FreeIPA/IdM Features
  • 34. Integrating Linux systems with Active Directory Using Open Source Tools34 ● Host-based access control ● Centrally-managed SUDO ● SSH key management ● Group-based password policies ● Automatic management of private groups ● Can act as NIS server for legacy systems ● Painless password migration ● SELinux user mapping ● Auto-membership for hosts and users ● Serving sets of automount maps to different clients ● Different POSIX data and SSH keys for different sets of hosts FreeIPA/IdM Features Continued
  • 35. Integrating Linux systems with Active Directory Using Open Source Tools35 ● DNS is optional but convenient ● Advantages (automation and security): ○ The SRV records get created automatically ○ Host records get created automatically when hosts are added ○ The clients can update their DNS records in a secure way (GSS-TSIG) ○ The admin can delegate management of the zones to whomever he likes ○ Built in DNSSEC support (Tech Preview) ● Disadvantages: ○ You need to delegate a zone FreeIPA/IdM Features DNS
  • 36. Integrating Linux systems with Active Directory Using Open Source Tools36 ● Replication: ○ Supports multi-server deployment based on the multi-master replication (up to 60 replicas) ○ Recommended deployment 2K-3K clients per replica ○ Details depend on the number of data centers and their geo-location ● 2FA ○ Native HOTP/TOTP support with FreeOTP and Yubikey ○ Proxied 2FA authentication over RADIUS for other solutions ○ 2FA for AD users (in future) ● Backup and Restore ● Compatibility with broad set of clients (LINUX/UNIX) FreeIPA/IdM More Features
  • 37. Integrating Linux systems with Active Directory Using Open Source Tools37 ● CA related capabilities ○ Certificate provisioning for users, hosts and services ○ Multiple certificate profiles ○ Sub CAs ○ Smart Card authentication ○ PKINIT authentication FreeIPA/IdM Features PKI
  • 38. Integrating Linux systems with Active Directory Using Open Source Tools38 ● CA deployment types ○ CA-less ○ Chained to other CA ○ Self signed root ● Tool to change deployment type and rotate CA keys ○ Flexibility in deploying CAs on different replicas ● Key store (Vault) FreeIPA/IdM Features PKI
  • 40. Integrating Linux systems with Active Directory Using Open Source Tools40 Indirect Integration Linux system Linux system Linux system Active Directory FreeIPA IdM Integration Options
  • 41. Integrating Linux systems with Active Directory Using Open Source Tools41 ● User and password synchronization (not recommended) ● Cross forest trusts (recommended) Integration Paths Overview
  • 42. Integrating Linux systems with Active Directory Using Open Source Tools42 ● LDAP level synchronization ● AD is the authoritative source - one way sync ● No group synchronization, only users ● Only one domain can be synchronized ● Single point of failure - sync happens only on one replica ● Limited set of attributes is replicated ● Passwords need to captured and synced ○ Requires a plugin on every AD DC ○ Mismatch of password policies can lead to strange errors Synchronization Solution Overview
  • 43. Integrating Linux systems with Active Directory Using Open Source Tools43 FreeIPA/IdM AD Integration with Trust FreeIPA/IdM DNS LDAP KDC Linux System SSSD Authentication Identities Name Resolution Certificates/Keys PKI Active Directory DNSLDAPKDC PKI Policies sudo HBAC automount selinux ssh keys
  • 44. Integrating Linux systems with Active Directory Using Open Source Tools44 FreeIPA/IdM AD Integration with Trust FreeIPA/IdM DNS LDAP KDC Linux System SSSD Authentication Identities Name Resolution Certificates/Keys PKI Active Directory DNSLDAPKDC PKI Policies sudo HBAC automount selinux ssh keys Chain
  • 45. Integrating Linux systems with Active Directory Using Open Source Tools45 FreeIPA/IdM AD Integration with Trust FreeIPA/IdM DNS LDAP KDC Linux System SSSD Authentication Identities Name Resolution Certificates/Keys PKI Active Directory DNSLDAPKDC PKI Policies sudo HBAC automount selinux ssh keys Delegate Zone
  • 46. Integrating Linux systems with Active Directory Using Open Source Tools46 FreeIPA/IdM AD Integration with Trust FreeIPA/IdM DNS LDAP KDC Linux System SSSD Authentication Identities Name Resolution Certificates/Keys PKI Active Directory DNSLDAPKDC PKI Policies sudo HBAC automount selinux ssh keys Cross Forest Trust
  • 47. Integrating Linux systems with Active Directory Using Open Source Tools47 FreeIPA/IdM AD Integration with Trust FreeIPA/IdM DNS LDAP KDC Linux System SSSD Authentication Identities Name Resolution Certificates/Keys PKI Active Directory DNSLDAPKDC PKI Policies sudo HBAC automount selinux ssh keys
  • 48. Integrating Linux systems with Active Directory Using Open Source Tools48 ● Can leverage SFU/IMU for POSIX (brown field) ● Can do dynamic mapping of the SIDs to UIDs & GIDs (green field) ● Static override with ID views User Mapping Details
  • 49. Integrating Linux systems with Active Directory Using Open Source Tools49 ● Two-way and one-way trust (FreeIPA trusts AD) ○ AD/Samba DC trusting FreeIPA is on the roadmap ● Trust agents (different behavior of different replicas) ● Migration from the sync to trust Trust Details
  • 50. Integrating Linux systems with Active Directory Using Open Source Tools50 ● Pros: ○ Free (FreeIPA/IdM is a part of OS) ○ Reduces cost – no CALs or 3rd party ○ Policies are centrally managed ○ Gives control to Linux admins ○ Enabled independent growth of the Linux environment ○ No synchronization required ○ Authentication happens in AD ○ Great tool for troubleshooting AD misconfigurations Trust Based Solution Pros and Cons
  • 51. Integrating Linux systems with Active Directory Using Open Source Tools51 ● Requirement: ○ Proper DNS setup ● Cons: ○ Separate server Trust Based Solution Pros and Cons
  • 52. Integrating Linux systems with Active Directory Using Open Source Tools52 ● There are different paths to AD integration: direct or indirect ● SSSD is recommended for direct integration for small environments up to 30-50 systems ● FreeIPA/IdM is recommended for bigger environments where management needs to scale and be automated Summary
  • 53. Integrating Linux systems with Active Directory Using Open Source Tools53 Questions?