Schneier on Security
Schneier on Security. One of the best infosec blogs out there.
Linux user auth against Active Directory2014.07.30
Enabling user authentication on linux against Active Directory, using ubuntu, sssd and AD 2008 (should work with 2003r2) apt-get install realmd sssd samba-common samba-common-bin samba-libs sssd-tools krb5-user adcli 2. vi /etc/sssd/sssd.conf and put this in it: [nss] filter_groups = root filter_users = root reconnection_retries = 3 [pam] reconnection_retries = 3 3. chmod 0600 /etc/sssd/sssd.conf 4. vi /etc/realmd.conf and put this in it:
5. run kinit Administrator@YOURDOMAIN.ALLINCAPS.TLD
You should now be able to su – to a domain user. That’s it, you’re done: you can login to your linux box by authenticating to your Active Directory domain. Additional (and optional) stuff is below, like adding groups and restricting logins based on groups.
Additional settings inside /etc/sssd/sssd.conf [domain] section to enable groups: [domain/yourdomain.allincaps.tld] ad_domain = yourdomain.allincaps.tld krb5_realm = YOURDOMAIN.ALLINCAPS.TLD realmd_tags = manages-system joined-with-adcli cache_credentials = True id_provider = ad krb5_store_password_if_offline = True default_shell = /bin/bash ldap_id_mapping = True ## comment out #use_fully_qualified_names = True ## these will need to be created manually or you will need to modify pam to ## mkdir them with pam_mkhomedir.so or use oddjob-mkhomedir, see below override_homedir = /home/%u fallback_homedir = /home/%d/%u ##group settings## ldap_group_uuid = objectGUID ldap_user_uuid = objectGUID ldap_group_member = member ldap_user_member_of = memberOf ldap_user_uid_number = uidNumber ldap_group_nesting_level = 1 ldap_force_upper_case_realm = True ldap_user_principal = userPrincipalName ldap_user_object_class = user ldap_user_gid_number = gidNumber ldap_group_modify_timestamp = whenChanged ldap_group_object_class = group ldap_group_name = cn ldap_user_name = sAMAccountName ldap_ns_account_lock = userAccountControl ldap_user_home_directory = unixHomeDirectory ldap_user_modify_timestamp = whenChanged ldap_group_gid_number = gidNumber ldap_referrals = false ldap_group_nesting_level = 0 Test that groups are working by su’ing to an AD user and typing in “groups”, which will show you what groups your user is a member of. To make the homedirectory autocreate: 1. edit /etc/pam.d/common-session (/etc/pam.d/session-auth in RHEL)and add this line before any pam_ldap or pam_krb5 lines: #autocreate user homedirs session required pam_mkhomedir.so umask=0022 skel=/etc/skel To limit login by AD group:
To allow an AD group to have access to sudo:
%domain\ admins ALL=(ALL) ALL %linux-sudo ALL=(ALL) ALL Further reading: Various bits, mostly to do with LDAP authentication, but can be translated for use with AD/sssd/pam (e.g. homedir creation) http://www.chriscowley.me.uk/blog/2014/06/17/new-linux-active-directory-integration/ http://funwithlinux.net/2014/04/join-ubuntu-14-04-to-active-directory-domain-using-realmd/ http://linux.tvortex.net/2011/10/sssd-against-active-directory-2003.html https://fedorahosted.org/sssd/wiki/Configuring_sssd_with_ad_server The App I Used to Break Into My Neighbor’s Home | Threat Level | WIRED2014.07.25
What I didn’t tell my neighbor was that I spent about 30 seconds in the stairwell scanning his keys with software that would let me reproduce them with no specialized skills whatsoever. The iPhone app I used wasn’t intended for anything so nefarious: KeyMe was designed to let anyone photograph their keys and upload them to the company’s servers. From there, they can be 3-D printed and mail-ordered in a variety of novelty shapes, from a bottle opener to Kanye West’s head. via The App I Used to Break Into My Neighbor’s Home | Threat Level | WIRED. |
SearchContactTechnical How-ToCategoriesArchivesRecent Posts |
|