Skip to content

Latest commit

 

History

History
369 lines (259 loc) · 18.6 KB

File metadata and controls

369 lines (259 loc) · 18.6 KB

Lab 8: How to create a single sign-on environment for all of your linux servers using Red Hat Identity Management

Goal of Lab

In this exercise you are going to configure clients to attach to a Red Hat Identity Management (IdM) server. The goal is to create a single-sign-on environment for all of your Linux servers to manage users, hosts, and sudo commands from a central console. This exercise will already have an IdM server installed, and will focus on registering and managing clients. The objectives for this exercise are:

  • Install the IdM client on your client systems

  • Configure the client to be part of the IdM realm

  • Create users on the idm server and demonstrate single-sign-on

  • Create user groups and assign users to those groups

  • Create host groups and assign hosts to those groups

  • Create sudo command groups that allow escalated privileges

  • Integrate user, host and sudo command groups into a policy

We will be doing this lab exercise using the consoles for both your IdM server and clients. You will access the consoles and your lab environment’s power control from the Lab GUID information UI page.

Introduction

The IdM server is a 389 based server that has been configured to manage users, hosts, and sudo commands. It is kerberos based and can operate as a standalone directory server, or can integrate with any LDAP compliant directory servers (e.g. Microsoft Active Directory). IdM can also be configured to manage DNS for you Linux environment and provide for dynamic DNS updates. Because the lab already provides DNS we will not have that enabled. It will also be configured to create user home directories upon first login.

Lab 8.1 Attaching the Clients to the IdM Realm

  1. Navigate to the Lab information page from the Lab 0 Setup steps. This page has your environment’s power control and consoles. Click on the console for IdM1.

    300

  2. Notice that the IdM1 system has been installed with a GUI. IdM1 already has an IdM server installed on it. Login with username admin and r3dh4t1! as the password.

    400

  3. Navigate to the Firefox web browser (which is under Applications). Open up the Firefox web browser and navigate to https://idm1.example.com. This is the UI for the IdM server. Login as admin with r3dh4t1! as the password. Take a quick glance around. We will revisit this IdM server GUI later in this exercise.

    500

  4. Next, we are going to attach our client servers to the IdM realm. The servers we are going to attach are:

    • idm2.example.com

    • idm3.example.com

  5. The ipa-client package has already been installed for your convenience. Next we are going to log into idm2 and idm3 and configure the client.

  6. Navigate to the Lab GUID information UI page again. This page has your environment’s power control and consoles. Click on the consoles for IdM2 and IdM3.

    200 200

  7. Log into IdM2 as root with r3dh4t1! as the password.

  8. Now, let’s install the IdM client and configure the client to be part of the IdM realm.

  9. In the console window for IdM2, type the following:

    [root@idm2 ~]# ipa-client-install --mkhomedir --no-ntp
  10. NOTE:

    • mkhomedir - this allows you to create a user home directory upon first login

    • no-ntp - our lab is using chronyd to synchronize time

    • In a production environment, you may want to mount home directories remotely so that there are no user accounts or home directories on your servers.

  11. You will be asked a series of questions during the installation and configuration of your IdM client. Here are the answers to these questions:

    • Provide the domain name of your IPA server: example.com

    • Provide your IPA server name: idm1.example.com

    • Proceed with fixed values and no DNS discovery? yes

    • Continue to configure the system with these values? yes

    • User authorized to enroll computers: admin

    • Password for [email protected]: r3dh4t1!

      Note
      Had we been using IdM with embedded DNS, it would have auto discovered and input all parameters and simply asked us to confirm.
  12. Repeat the above steps 6-9 for IdM3. The root password for IdM3 is also r3dh4t1!.

  13. Your systems are now configured and enrolled in the IdM realm. Let’s verify enrollment of our 2 client systems.

  14. Navigate back to IdM1. If you need to log back in, the password for the Administrator is r3dh4t1!. If your Firefox web browser was closed, open up the Firefox web browser and navigate to https://idm1.example.com (if you’re not already there).

  15. Navigate to the IdentityHosts tab. Notice that both of our client systems, idm2.example.com and idm3.example.com are showing as Enrolled (in addition to our IdM server, idm1.example.com).

700

Lab 8.2 Configuring a Simple User

In this exercise we will create a user and demonstrate single-sign-on.

  1. Navigate back to the IdM1 console. If you need to log back in, the password for the Administrator is r3dh4t1!. Open up the Firefox web browser and navigate to https://idm1.example.com (if you’re not already there).

  2. Navigate to the IdentityUsers tab. Click on the Add button at the far right.

    500

  3. Fill in the form with the following information:

    • User login - user1

    • User first name - User

    • User last name - One

    • New password - password (initial password that will have to be changed on first logon)

    • Verify password - password

    • You do not need to fill in the other items on this form (Class, GID, etc)

    500

  4. When you are done filling out the form, Press Add.

500

  1. Navigate to the PolicyHost-Based-Access-ControlHBAC Rules tab.

    700

    Note
    Notice the default allow_all policy, which allows access to all users and all hosts. This is something that we will delete shortly, but is good for testing for now.
  2. Navigate back to the console for IdM2 (idm2.example.com). If you are still logged in as root, type exit. Now, login as follows:

    • username: user1

    • password: password

  3. You will be prompted to change your initial password. Feel free to change your initial password to any new password that you can easily remember.

    • A home directory will be automatically be created for user1.

  4. From the command line, verify that this local user1 account does not exist in /etc/passwd. This is because IdM caches credentials locally in the sssd.

    [user1@idm2 ~]$ grep user1 /etc/passwd
    [user1@idm2 ~]$ exit

Lab 8.3 User Based Access Control

In this exercise, we are going to allow/restrict access to hosts by user.

  1. Navigate back to the IdM1 console. If you need to log back in, the password for the Administrator is r3dh4t1!. Open up the Firefox web browser and navigate to https://idm1.example.com (if you’re not already there).

  2. Navigate to the PolicyHost-Based-Access-ControlHBAC Rules tab

  3. Click on the box next to the allow_all HBAC rule and press Disable at the far right. Press Ok.

    700

  4. The kerberos ticket you are currently holding may continue to allow/disallow access to a resource after you make a change to a resource on the IdM server. As a result, let’s go ahead and clear cache for IdM2 and IdM3.

  5. While there are ways to configure the cache for your specific needs, a quick way to clear the sssd cache is as the root user. After clearing the cache, you will no longer be able to login. Do these steps on IdM2 as the root user. Log back into IdM2 as root. The password for the root user is r3dh4t1!.

    [root@idm2 ~]$ systemctl stop sssd.service
    [root@idm2 ~]$ sss_cache -E
    [root@idm2 ~]$ systemctl start sssd.service
  6. Clear the cache for IdM3 as well by repeating the step above on IdM3.

  7. Press the Add button at the far right to create a new rule that allows you access to a specific server. For the rule name, type any name of your choice (For example, my_hbac_rule).

  8. Select the Add and Edit button to create and edit your rule.

    700

  9. Under Who, click on the +Add button on the far right in the Users section. Press Add.

    700

  10. Click on the box next to user1 and add them to the policy by clicking on the > button to move user1 from the Available Users section to the Prospective Users section.

    700

  11. Under Accessing, select the +Add button at the far right.

    700

  12. Click on the box next to idm2.example.com and add it to the policy by clicking on the > button to move idm2.example.com from the Available Hosts section to the Prospective Hosts section. Press Add.

    700

  13. Under Via Service, select the +Add button at the far right.

    700

  14. Click on the box next to both login and sshd and add them to the policy by clicking on the > button to move them from the Available HBAC Services section to the Prospective HBAC Services section. Press Add.

    700

  15. Now, let’s try logging into the IdM2 server as user1 with the password that you set previously. You should be able to successfully login as user1 on IdM2 since our policy that we just created above allows both login and ssh for user1 on idm2.example.com.

  16. Now, let’s try logging into the IdM3 server as user1 with the password that you set previously. You should be restricted from logging into IdM3 with a Permission denied error since this server is not in the policy that we created previously.

  17. Clear the cache on the server where you successfully logged in (IdM2). Log into IdM2 from the console as root with password r3dh4t1! and execute the following commands below to clear the cache.

    [root@idm2 ~]$ systemctl stop sssd.service
    [root@idm2 ~]$ sss_cache -E
    [root@idm2 ~]$ systemctl start sssd.service
  18. Now let’s disable the policy to ready the system for the next exercise. Navigate to the PolicyHost-Based Access ControlHBAC Rules tab and click on the box next to the policy you created previously. Then, click on Disable on the far right.

    700

Lab 8.4 User Group Based Access Control

In this exercise we are going to restrict access to hosts by user group.

  1. Navigate back to the IdM1 console. If you need to log back in, the password for the Administrator is r3dh4t1!. Open up the Firefox web browser and navigate to https://idm1.example.com (if you’re not already there).

  2. Navigate to the IdentityGroups tab. Select User Groups under Group Categories on the left panel and add a group by pressing the +Add button.

    700

  3. Provide a User Group name (For example, my_user_group) and press the Add and Edit button.

    700

  4. Add a user to your user group by pressing the +Add button.

    700

  5. Click on the box next to user1 and add it to your user group by clicking on the > button to move it from the Available User login section to the Prospective User login section. Press Add.

    700

  6. Navigate to the IdentityGroupsHost Groups tab. Click on the +Add button at the far right.

    700

  7. Enter a Host-group name (For example, my_host_group ) and Click on the Add and Edit button.

    700

  8. Then, press +Add on the Host Group page.

    700

  9. Click on the box next to idm3.example.com and add this host into your host group by clicking on the > button to move it from the Available Host name section to the Prospective Host name section. Press Add.

    700

  10. Navigate to the Policy → Host-Based-Access-Control → HBAC Rules tab. Press the +Add button at the far right.

    700

  11. Give the new HBAC Rule a name (For example, name it my_group_hbac ). Press Add and Edit.

    700

  12. Under the Who section, select your user group. Press +Add. Then, move your user group from the Available User Groups section into the Prospective User Groups section. Press Add.

    700 700

  13. Under the Accessing section, select your host group. Press +Add. Then, move your host group from the Available Host Groups section to the Prospective Host Groups section. Press Add.

    700 700

  14. Under the Via Service section, press +Add next to Services. Then, select login and sshd under Available HBAC Services and move that to Prospective HBAC Services.

    700 700

  15. Now, go back to your console for IdM3 and login as user1 with the password that you set. You should be able to logon to this server since it is specified in the your group HBAC policy that we created in this exercise.

  16. Navigate to your console for IdM2 and login as user1 with the password that you set. You should be restricted from logging into IdM2 with a Permission denied error since IdM2 is not in your group HBAC policy that we created in this exercise.

  17. Now, let’s clear the cache on the server where you successfully logged in (IdM3). Log into IdM3 from the console as root with password r3dh4t1! and execute the following commands below to clear the cache.

    [root@idm3 ~]$ systemctl stop sssd.service
    [root@idm3 ~]$ sss_cache -E
    [root@idm3 ~]$ systemctl start sssd.service
  18. Do not disable the policy because we are going to add to it in the next step

Grouping users and hosts allows you to move users into and out of groups, thereby, inheriting and disinheriting access. The real strength with this method comes in the next exercise where we create sudo command groups. Rather than creating service accounts with shared passwords for a group of administrators, you can do the following:

  • Add a user to a user group

  • That user will inherit access to a specific group of hosts

  • That user will also inherit escalated privileges required to perform their role on those hosts

  • That user’s activity will be logged centrally

Lab 8.5 Creating sudo Command Groups

This exercise will build off the previous exercise by adding a sudo command group to the existing policy. Therefore, in addition to having access to specific hosts, the users in the group will also be granted escalated privileges. To simplify the demonstration, we will create a sudo command group with one command in it: the ability to execute yum.

  1. Before creating this to the policy, log into a server that your user (user1) has access to (IdM3) from the previous step to verify that you do not have access to escalate and run yum. Use the password that you set earlier for this user.

    [user1@idm3 ~]# sudo yum update
  2. Even though you type in the password that you set for user1, you will get a Sorry, try again error. After three attempts, you will be prevented from trying further.

  3. Navigate back to the IdM1 console. If you need to log back in, the password for the Administrator is r3dh4t1!. Open up the Firefox web browser and navigate to https://idm1.example.com (if you’re not already there).

  4. Navigate to Policy → Sudo tab. Select Sudo Commands.

    700

  5. Click on +Add at the far right to add a command.

    700

  6. For the Sudo Command, enter /usr/bin/yum. Press Add and Edit.

    700

  7. Select Sudo Command Groups from the Sudo drop down. Press the +Add button at the far right to create a group.

    700

  8. Create a new group by providing a Sudo Command Group Name (For example, my_sudo_group). Press Add and Edit.

    700

  9. Press the +Add button. Add the /usr/bin/yum command from the previous step from the Available Sudo Command section to the Prospective Sudo Command section. Press Add.

    700

  10. Select Sudo Rules from the Sudo drop down. Then, click on the +Add button on the far right to create a new rule.

    700

  11. Provide a Sudo Rule Name (For example, my_sudo_rule). Press the Add and Edit button.

    700

  12. In the Who section, add your user group under User Groups. Press +Add.

    1000

  13. Next, select my_user_group from the list of Available User Groups and add it to the Prospective User Groups by pressing the > button. Press Add.

    500

  14. Add your host group under Access this host → Host Groups. Press +Add.

    700 700

  15. In the Run Commands section, add your sudo group under Sudo Allow Command Groups. Press +Add.

    700 700

  16. Navigate to Policy → Host Based Access Control → HBAC Rules.

    300

  17. Click on the rule you created earlier (my_group_hbac).

  18. Navigate to Via Service. Click on +Add in the Services section. Next, select sudo from the list of Available HBAC Services and add it to the Prospective HBAC Services by pressing the > button. Now, you should see sudo as a service in addition to logon and sshd.

    800 700

  19. Log back into the server that your user (user1) has access to (IdM3) from the previous step to verify that you do have access to escalate and run yum. Use the password that you set earlier for this user.

    [user1@idm3 ~]# sudo yum update

    NOTE: You could have simplified this by adding a user and a command rather than a user group and command group. However, what we want to show is how you can group users, hosts, and sudo commands into one policy, which allows you to add and remove users that will inherit and dis-inherit access respectively.