• No results found

PowerBroker Identity Services. Installation Guide

N/A
N/A
Protected

Academic year: 2021

Share "PowerBroker Identity Services. Installation Guide"

Copied!
60
0
0

Loading.... (view fulltext now)

Full text

(1)
(2)

Corporate Headquarters 5090 N. 40th Street Phoenix, AZ 85018 Phone: 1 818-575-4000 COPYRIGHT NOTICE

Copyright © 2014 BeyondTrust Software, Inc. All rights reserved. Use of this software and/or document, as and when applicable, is also subject to the terms and conditions of the license between the licensee and BeyondTrust Software, Inc. (“BeyondTrust”) or BeyondTrust’s authorized remarketer, if and when applicable.

TRADE SECRET NOTICE

This software and/or documentation, as and when applicable, and the information and know-how they contain constitute the proprietary, confidential and valuable trade secret information of BeyondTrust and/or of the respective manufacturer or author, and may not be disclosed to others without the prior written permission of BeyondTrust. This software and/or documentation, as and when applicable, have been provided pursuant to an agreement that contains prohibitions against and/or restrictions on copying, modification and use.

DISCLAIMER

BeyondTrust makes no representations or warranties with respect to the contents hereof. Other than, any limited warranties expressly provided pursuant to a license agreement, NO OTHER WARRANTY IS EXPRESSED AND NONE SHALL BE IMPLIED, INCLUDING WITHOUT LIMITATION THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR USE OR FOR A PARTICULAR PURPOSE.

LIMITED RIGHTS FARS NOTICE (If Applicable)

If provided pursuant to FARS, this software and/or documentation, as and when applicable, are submitted with limited rights. This software and/or documentation, as and when applicable, may be reproduced and used by the Government with the express limitation that it will not, without the permission of BeyondTrust, be used outside the Government for the following purposes: manufacture, duplication, distribution or disclosure. (FAR 52.227.14(g)(2)(Alternate II))

LIMITED RIGHTS DFARS NOTICE (If Applicable)

If provided pursuant to DFARS, use, duplication, or disclosure of this software and/or documentation by the Government is subject to limited rights and other restrictions, as set forth in the Rights in Technical Data – Noncommercial Items clause at DFARS 252.227-7013.

TRADEMARK NOTICES

PowerBroker, PowerPassword, and PowerKeeper are registered trademarks of BeyondTrust. PowerSeries, PowerADvantage, PowerBroker Password Safe, PowerBroker Directory Integrator, PowerBroker Management Console, PowerBroker Desktops, PowerBroker Virtualization, PowerBroker Express, PowerBroker Databases, PowerBroker Windows Servers, PowerBroker Windows Desktops, and PowerBroker Identity Services are trademarks of BeyondTrust.

ssh® is a registered trademark of SSH Communications Security Corp in the United States and in certain other jurisdictions. The SSH logo, Tectia and tectia logo are trademarks of SSH Communications Security Corp and may be registered in certain jurisdictions.

This application contains software powered by PKAIP®, the leading solution for enabling efficient and secure data storage and transmission. PKAIP® is provided by PKWARE, the inventor and continuing innovator of the ZIP file format. Used with

permission. OTHER NOTICES

If and when applicable the following additional provisions are so noted:

The PowerBroker Identity Services Open software is free to download and use according to the terms of the Limited GPL 2.1 for client libraries and the GPL 2 for daemons. The licenses for PowerBroker Identity Services Enterprise and for PowerBroker Identity Services UID-GID Module are different. For complete information on the software licenses and terms of use for BeyondTrust products, see www.beyondtrust.com.

(3)

Contents

Introduction 6

Conventions Used in This Guide 6

Documentation Set for PBIS Enterprise 6

Contact Technical Support 7

Before Contacting Technical Support 7

Contacting Support 8

PBIS Enterprise Overview 10

PBIS Overview 10

PBIS Components 10

PBIS Agent 11

Services 12

Caches and Databases 17

Time Synchronization 18

Using a Network Time Protocol Server 19

Automatic Detection of Offline Domain Controller and Global Catalog 19

Cached Credentials 19

Trust Support 19

Integrating with Samba 21

Supported Platforms 21

SELinux Support 21

Storage Modes 22

Directory Integrated Mode 22

Schemaless Mode 23

Planning Your Installation and Deployment 24

Planning Your Deployment 24

Installing the Management Console 25

Requirements 25

Microsoft Management Tools 25

Administrator Privileges 26

Active Directory Requirements 26

Windows Requirements for the Console 26

Requirements to Run PBIS in Directory Integrated Mode 27

Networking 27

Replication 27

Supported Platforms and Applications 27

Installing the Console 28

Upgrading the Console 29

Upgrading PBIS 7.5 to PBIS 8.1 29

Changing to Directory Integrated Mode 30

(4)

Configuring Clients Before PBIS Agent Installation 32

Configure nsswitch.conf 32

Configure netsvc.conf on AIX 32

Restart Services 32

Configure resolv.conf 33

Configure Firewall Ports 33

Extend Partition Size (IBM AIX) 33

Increase Max User Name Length (IBM AIX) 34

Installing the PBIS Agent 35

Install the Correct Version for Your Operating System 35

Checking Your Linux Kernel Release Number 35

Package Management Commands 35

Requirements for the Agent 35

Environmental Variables 35

Patch Requirements 36

Other Requirements for the Agent 36

Additional Requirements for Specific Operating Systems 37

Install the Agent on Linux or Unix with the Shell Script 37

Install the Agent on Linux in Unattended Mode 38

Install the Agent on a Mac OS X Computer 38

Install the Agent on a Mac in Unattended Mode 39

Install the Agent in Solaris Zones 39

Installing Solaris 11 41

What's New with the Solaris 11 Installer 41

Uploading the Packages with the P5P file 42

Installing the Agent in Solaris 11 Zones 42

Upgrading Your Operating System 43

Configuring SELinux 43

Installing SELinux on Unsupported Platforms 43

Configuring SELinux After Installing 43

Joining an Active Directory Domain 45

Overview 45

Privileges and Permissions 46

Creation of Local Accounts 46

Join Active Directory from the Command Line 48

Before Joining a Domain 48

Joining a Computer to Active Directory 48

Join a Linux or Unix Computer to an Organizational Unit 49

Join a Linux or Unix Computer to a Nested Organizational Unit 49

Join Active Directory Without Changing /etc/hosts 49

50

Join Active Directory Using the Domain Join GUI Tool 50

Joining a Linux Computer 50

(5)

Turn Off OS X Directory Service Authentication 53

Files Modified When You Join a Domain 53

Logging on with Domain Credentials 56

Log on with AD Credentials 56

Log on with SSH 57

Leaving a Domain and Uninstalling the PBIS Agent 58

Leave a Domain 58

Remove the Computer Account in Active Directory 58

Remove a Linux or Unix Computer from a Domain 59

Remove a Mac from a Domain 59

Remove a Mac from a Domain from the Command Line 60

Uninstall the Agent on a Linux or Unix Computer 60

Using a Shell Script to Uninstall 60

Using a Command to Uninstall 60

(6)

Introduction

This guide shows system administrators and security administrators how to use BeyondTrust PowerBroker Identity Services Enterprise Edition (PBIS).

PBIS ships with a number of documents that help you to use the various features of the product. See the following section for a list of the guides.

Conventions Used in This Guide

Specific font and linespacing conventions are used in this book to ensure readability and to highlight important information such as commands, syntax, and examples.

Font Conventions

The font conventions used for this document are:

• Courier New Fontis used for program names, commands, command arguments, directory paths, variable names, text input, text output, configuration file listings, and source code. For example:

C:\Documents and Settings\All Users

Courier New Bold Fontis used for information that should be entered into the system exactly as shown. For example:

pbdeploy.exe

Courier New Italics Fontis used for input variables that need to be replaced by actual values.

In the following example, the variableMyServer, must be replaced by an actual environment server

name and the variableMyFolder must be replaced by an actual folder name:

\\MyServer\MyFolder\pbdcl32.msi • Bold is used for Windows buttons. For example:

Click OK.

Documentation Set for PBIS Enterprise

The complete PowerBroker Identity Services Enterprise Edition documentation set includes the following: • PBIS Enterprise Installation Guide

PBIS Enterprise Administration GuidePBIS Enterprise Linux Administration GuidePBIS Enterprise Auditing & Reporting GuidePBIS Enterprise Group Policy Administration GuidePBIS Release Notes

Report Book

(7)

BeyondTrust Software, Inc. provides an online knowledge base, as well as telephone and web-based support.

Before Contacting Technical Support

To expedite support, collect the following information to provide to Technical Support:

• PBIS Enterprise version (Available in the PBIS Console by clicking Help, About on the menu bar.) • PBIS Agent version and build number

• Linux or Unix version

• Windows or Windows Server version

If you are contacting Technical Support about one of the following problems, also provide the diagnostic information specified.

Segmentation Faults

Provide the following information when contacting Technical Support: • Core dump of the PowerBroker Identity Services application:

ulimit - c unlimited

• Exact patch level or exact versions of all installed packages.

Program Freezes

Provide the following information when contacting Technical Support: • Debug logs

• tcpdump

• Anstraceof the program

Domain-Join Errors

Provide the following information when contacting Technical Support: • Debug logs (Copy the log file from/var/log/pbis-join.log.)

• tcpdump

All Active Directory Users Are Missing

Provide the following information when contacting Technical Support: • Run/opt/pbis/bin/get-status

• Contents ofnsswitch.conf

All Active Directory Users Cannot Log On

(8)

• Output ofsu -c 'su <user>' <user>

• Lsass debug logs (See Generate an Authentication Agent Debug Log, in the PBIS Troubleshooting webhelp.)

• Contents of pam.d/pam.conf

• The sshd and ssh debug logs and syslog

AD Users or Groups are Missing

Provide the following information when contacting Technical Support: • The debug logs for lsass

• Output forgetent passwdorgetent groupfor the missing object • Output forid <user>if user

• tcpdump

• Copy of lsass cache file.

Poor Performance When Logging On or Looking Up Users

Provide the following information when contacting Technical Support: • Output ofid <user>

• The lsass debug log

• Copy of lsass cache file. (For more about the file name and location of the cache files, refer to the Linux Administration Guide.)

• tcpdump

Contacting Support

If you encounter problems that are not covered in the documentation, contact BeyondTrust Technical Support.

When contacting Technical Support, provide the following information: l Your company name

l Telephone and email address where you can be contacted

l Description of the problem and the steps you have taken to resolve it l Diagnostic information requested inBefore Contacting Technical Support

You can contact BeyondTrust Technical Support by email or through the BeyondTrust website. If you are located in the United States, you can also contact Technical Support by telephone. Support is staffed 24 hours per day, seven days per week.

Telephone: +1 800-234-9072 or +1 818-575-4040 Email:pbis-support@beyondtrust.com

(9)

3. On the BeyondTrust Technical Support page, scroll to the Customer Support Portals section and click the PowerBroker Identity Services tab.

4. If you do not have a PBIS Support password, clicksupport@beyondtrust.com to request that a PBIS Support password be sent to your email address.

Note: This is a different password than the one provided for use with the BeyondTrust Customer/Partner Portal.

5. For Username, enter your email address.

(10)

PBIS Enterprise Overview

PowerBroker Identity Services Enterprise Edition connects Linux, Unix, and Mac OS X computers to

Microsoft Active Directory so you can centrally manage all your computers and users from a single identity management system.

This guide describes how to install and manage PowerBroker Identity Services Enterprise Edition. The target audience is system administrators who manage access to workstations, servers, and applications with Active Directory.

The guide assumes that you know how to administer computers, users, and Group Policy settings in Active Directory and that you know how to manage computers running Unix, Linux, and Mac OS X.

PBIS Overview

PBIS Enterprise is installed on a Windows administrative workstation connected to a domain controller so you can set user identifiers and group identifiers in Active Directory Users and Computers. Once the UIDs and GIDs are set, the PBIS agent uses the identifiers to authenticate users and groups and to control access to computers and applications.

PBIS Enterprise includes additional features:

• Apply policy settings to Unix computers from the Microsoft Group Policy Management Console (GPMC), including policy settings based on the Gnome GConf project to define desktop and application preferences for Linux computers.

• Integrates Apple's Workgroup Manager with the Group Policy Management Editor to apply managed client settings to Mac OS X computers with Group Policy Objects (GPOs).

• Generate a range of reports to help improve regulatory compliance. The result: lower operating costs, better security, enhanced compliance.

• PBIS provides graphical tools to manage Linux and Unix information in Active Directory. However, it can be useful to access and modify the information programmatically. For this purpose, PBIS provides scripting objects that can be used by any programming language that supports the

Microsoft Common Object Model, or COM. The scripting objects provide dual interfaces that can be used by languages that use COM early binding, such as C++ and C#, and by languages that use Idispatch, such as VBScript and Jscript.

PBIS - Open Edition

PBIS Open Edition is available as a free and open source version of PowerBroker Identity Services. PBIS Open authenticates domain users with the highly secure Kerberos 5 protocol by hashing their security identifiers from Active Directory.

PBIS Open does not, however, process user identifiers or group identifiers even if they are set in Active Directory. For more information, visit the BeyondTrust website.

PBIS Components

(11)

• PBIS management tools for Active Directory, which you install on a Windows computer that connects to an Active Directory domain controller.

• PBIS agent, which you install on a Linux, Unix, or Mac computer to connect it to Active Directory. Component Function

Agent n Runs on a Linux, Unix, or Mac OS X computer to connect it to Active Directory with the PBIS command-line interface or GUI. SeeJoin Active Directory from the Command Line. n Communicates with an Active Directory domain controller to authenticate and

authorize users and groups with the PBIS Identity Service. SeeLog On with AD Credentials.

n Pulls and refreshes policy settings by using the Group Policy service, which is included only with the PBIS Enterprise agent.

Enterprise Console

n Runs on a Windows administrative workstation that connects to an Active Directory domain controller to help manage Linux, Unix, and Mac OS X computers in Active Directory.

n Migrates users, checks status, and generates reports. MMC

Snap-Ins for ADUC and GPMC

n Extends Active Directory Users and Computers to include Unix and Linux users.

n With PBIS Enterprise, it also extends the Group Policy Management Console (GPMC) to include Linux, Unix, and Mac OS X Group Policy settings as well as a way to target them at specific platforms.

Cell Manager

A snap-in for the Microsoft Management Console to manage cells associated with Active Directory Organizational Units.

Reporting Database

Stores security events and access logs for compliance reports. Operations

Dashboard

The PBIS Operations Dashboard is a management application, or plug-in, for the BeyondTrust Management Console. The dashboard retrieves information from the PBIS reporting database to display authentication transactions, authorization requests, network events, and other security events that take place on PBIS clients.

PBIS Agent

The PowerBroker Identity Services (PBIS) agent is installed on a Linux, Unix, or Mac OS X computer to connect it to Microsoft Active Directory and to authenticate users with their domain credentials.

The agent integrates with the core operating system to implement the mapping for any application, such as the logon process (/bin/login), that uses the name service (NSS) or pluggable authentication module (PAM). As such, the agent acts as a Kerberos 5 client for authentication and as an LDAP client for authorization. In PBIS Enterprise, the agent also retrieves Group Policy Objects (GPOs) to securely update local configurations, such as the sudo file.

(12)

Services

Prior to PowerBroker Identity Services 6.5, the agent was composed of separate daemon processes, and each was started in sequence by the operating systems at start up.

In PowerBroker Identity Services 6.5, the daemons are replaced by libraries loaded by the service manager daemon (/opt/pbis/sbin/lwsmd). The servicelsassreplaces the daemonlsassd.

At start up, the operating system is configured to start the service manager daemon. It is then instructed by the operating system (with the command/opt/pbis/bin/lwsm autostart) to start all desired services.

The service manager daemon keeps track of the services already started and ensures the services are started and stopped in the appropriate order.

(13)

PBIS Open and PBIS Enterprise

The PBIS Open agent and the PBIS Enterprise agent are composed of the service manager daemon (/opt/pbis/sbin/lwsmd) and include the following services:

Service Description Dependencies

lsass Handles authentication, authorization, caching, and idmap lookups. You can check its status or restart it.

To view the Lsass architecture see the diagram following the tables.

netlogon lwio rdr lwreg

Usuallyeventlog(Can be disabled after installation.) Sometimesdcerpc(Can be enabled after installation for registering TCP/IP endpoints of various services.)

netlogon Detects the optimal domain controller and global catalog and caches them.

lwreg

lwio An input-output service that is used to

communicate through DCE-RPC calls to remote computers, such as during domain join and user authentication.

lwreg

rdr A redirector that multiplexes connections to remote systems.

lwio lwreg dcerpc Handles communication between Linux, Unix,

and Mac computers and Microsoft Active Directory by mapping data to end points. By default, it is disabled.

eventlog Collects and processes data for the local event log. Can be disabled.

lwreg The registry service that holds configuration information both about the services and information provided by the services.

reapsysl The syslog reaper that scans the syslog for events of interest and records them in the eventlog.

eventlog

usermonitor The usermonitor service scans the system for changes to users, groups, and authorization rights and records the changes in the eventlog.

lsass eventlog

(14)

PBIS Enterprise Only

Additionally, PBIS Enterprise also includes the following services to apply Group Policy settings, handle smart cards, and monitor security events:

Service Description Dependencies

gpagent Pulls Group Policy Objects (GPOs) from Active Directory and applies them to the computer.

lsass netlogon lwio rdr lwreg eventlog eventfwd Forwards events from the local event log to a remote computer. eventlog

lwsc Smart card service. lwpkcs11

lwpkcs11 Aidslwscby supporting PKCS#11 API. Figure 1. LSASS Architecture

PBIS Input-Output Service

Thelwioservice multiplexes input and output by using SMB1 or SMB2. The service's plugin-based architecture includes several drivers, the most significant of which is coded asrdr—the redirector.

(15)

The redirector multiplexes CIFS/SMB connections to remote systems. For instance, when two different processes on a local Linux computer need to perform input-output operations on a remote system by using CIFS/SMB, with either the same identity or different identities, the preferred method is to use the APIs in thelwioclient library, which routes the calls through the redirector. In this example, the

redirector maintains a single connection to the remote system and multiplexes the traffic from each client by using multiplex IDs.

The input-output service plays a key role in the PBIS architecture because PBIS uses DCE/RPC (Distributed Computing Environment/Remote Procedure Calls). DCE/RPC uses SMB: Thus, the DCE-RPC client libraries use the PBIS input-output client library, which in turn makes calls tolwiowith Unix domain sockets. When you join a domain, for example, PBIS uses DCE-RPC calls to establish the machine password. The PBIS authentication service periodically refreshes the machine password by using DCE-RPC calls. Authentication of users and groups in Active Directory takes place with Kerberos, not RPC.

(16)

The following data-flow diagram shows how systems interact when you join a domain.

In addition, when a joined computer starts up, the PBIS authentication service enumerates Active Directory trusts by using DCE-RPC calls that go through the redirector. With one-way trusts, the

authentication service uses RPC to look up domain users, groups, and security identifiers. With two-way trusts, lookup takes place through LDAP, not RPC.

Because the authentication service registers trusts only when it starts up, you should restartlsasswith the PBIS Service Manager after you modify a trust relationship.

The PBIS Group Policy agent also uses the input-output client library and the redirector when it copies files from thesysvolshare of a domain controller.

To troubleshoot remote procedure calls that go through the input-output service and its redirector, use a Wireshark trace or a TCP dump to capture the network traffic. Wireshark, a free open-source packet analyzer, is recommended.

(17)

PAM Options

PowerBroker Identity Services uses three standard PAM options: • try_first_pass

• use_first_pass • use_authtok

Additionally, there are three non-standard options to the PAM configuration on some systems:

• unknown_ok– Allows local users to continue down the stack (first line succeeds but second line fails) while blocking domain users who do not meet group membership requirements.

• remember_chpass– On AIX systems, which have both PAM and LAM modules, theremember_ chpassprevents the AIX computer from trying to change the password twice and prompting the user twice.

• set_default_repository– On Solaris systems, theset_default_repositoryoption is used to make sure password changes work as expected.

Managing the PBIS Services

Using the PBIS Service Manager, you can:

• Track and troubleshoot all the PBIS services with a single command-line utility.

For example, check the status of the services, view their dependencies, and start or stop them. The service manager is the preferred method for restarting a service because it automatically identifies a service's dependencies and restarts them in the correct order.

• Use the service manager to set the logging destination and the log level.

For more information, see "Manage PBIS Services (lwsm)" in thePBIS Enterprise Administration Guide.

Caches and Databases

To maintain the current state and to improve performance, the PBIS authentication service (lsass) caches information about users and groups in memory.

You can change the cache to store the information in a SQLite database. For more information, refer to thePBIS Enterprise Administration Guide, "lsass Cache Settings".

The PBIS site affinity service,netlogon, caches information about the optimal domain controller and global catalog in the PBIS registry.

The following files are in/var/lib/pbis/db:

File Description

registry.db The SQLite 3.0 database in which the PBIS registry service, lwreg, stores data. sam.db Repository managed by the local authentication provider to store information

about local users and groups.

(18)

File Description

lsass-adcache.filedb.FQDN

Cache managed by the Active Directory authentication provider to store user and group information. The file is in/var/lib/pbis/db. In the name of the file, FQDN is replaced by your fully qualified domain name.

Since the default UIDs that PBIS generates are large, the entries made by the operating system in the lastlogfile when AD users log in make the file appear to increase to a large size. This is normal and should not cause concern. The lastlog file (typically/var/log/lastlog) is a sparse file that uses the UID and GID of the users as disk addresses to store the last login information. Because it is a sparse file, the actual amount of storage used by it is minimal.

Additional information about a computer's Active Directory domain name, machine account, site affinity, domain controllers, forest, the computer's join state, and so forth is stored in the PBIS registry. Here is an example of the kind of information that is stored under thenetlogonkey:

[HKEY_THIS_MACHINE\Services\netlogon\cachedb\example.com-0] "DcInfo-ClientSiteName"="Default-First-Site-Name" "DcInfo-DCSiteName"="Default-First-Site-Name" "DcInfo-DnsForestName"="example.com" "DcInfo-DomainControllerAddress"="192.168.92.20" "DcInfo-DomainControllerAddressType"=dword:00000017 "DcInfo-DomainControllerName"="w2k3-r2.example.com" "DcInfo-DomainGUID"=hex:71,c1,9e,b5,18,35,f3,45,ba,15,05,95,fb,5b,62,e3 "DcInfo-Flags"=dword:000003fd "DcInfo-FullyQualifiedDomainName"="example.com" "DcInfo-LMToken"=dword:0000ffff "DcInfo-NetBIOSDomainName"="EXAMPLE" "DcInfo-NetBIOSHostName"="W2K3-R2" "DcInfo-NTToken"=dword:0000ffff "DcInfo-PingTime"=dword:00000006 "DcInfo-UserName"="" "DcInfo-Version"=dword:00000005 "DnsDomainName"="example.com" "IsBackoffToWritableDc"=dword:00000000 "LastDiscovered"=hex:c5,d9,86,4b,00,00,00,00 "LastPinged"=hex:1b,fe,86,4b,00,00,00,00 "QueryType"=dword:00000000 "SiteName"=""

Time Synchronization

For the PBIS agent to communicate over Kerberos with the domain controller, the clock of the client must be within the domain controller's maximum clock skew, which is 300 seconds, or 5 minutes, by default. (For more information, see http://web.mit.edu/kerberos/krb5-1.4/krb5-1.4.2/doc/krb5-admin/Clock-Skew.html.)

The clock skew tolerance is a server-side setting. When a client communicates with a domain controller, it is the domain controller's Kerberos key distribution center that determines the maximum clock skew. Since changing the maximum clock skew in a client'skrb5.conffile does not affect the clock skew tolerance of the domain controller, the change will not allow a client outside the domain controller's tolerance to communicate with it.

(19)

The clock skew value that is set in the/etc/pbis/krb5.conffile of Linux, Unix, and Mac OS X

computers is useful only when the computer is functioning as a server for other clients. In such cases, you can use a PBIS Group Policy setting to change the maximum tolerance; for more information, see Set the Maximum Tolerance for Kerberos Clock Skew in thePowerBroker Identity Services Group Policy

Administration Guide.

The domain controller uses the clock skew tolerance to prevent replay attacks by keeping track of every authentication request within the maximum clock skew. Authentication requests outside the maximum clock skew are discarded. When the server receives an authentication request within the clock skew, it checks the replay cache to make sure the request is not a replay attack.

Using a Network Time Protocol Server

If you set the system time on your computer with a Network Time Protocol (NTP) server, the time value of the NTP server and the time value of the domain controller could exceed the maximum skew. As a result, you will be unable to log on your computer.

If you use an NTP server with a cron job, there will be two processes trying to synchronize the computer's time—causing a conflict that will change the computer's clock back and forth between the time of the two sources.

It is recommended that you configure your domain controller to get its time from the NTP server and configure the domain controller's clients to get their time from the domain controller.

Automatic Detection of Offline Domain Controller and Global Catalog

The PBIS authentication service—lsass—manages site affinity for domain controllers and global catalogs and caches the information withnetlogon. When a computer is joined to Active Directory, netlogondetermines the optimum domain controller and caches the information.

If the primary domain controller goes down,lsassautomatically detects the failure and switches to another domain controller and another global catalog within a minute.

However, if another global catalog is unavailable within the forest, the PBIS agent will be unable to find the Unix and Linux information of users and groups. The PBIS agent must have access to the global catalog to function. Therefore, it is a recommended that each forest has redundant domain controllers and redundant global catalogs.

Cached Credentials

Both PBIS Open and PBIS Enterprise cache credentials so users can log on when the computer is disconnected from the network or Active Directory is unavailable.

Trust Support

The PBIS agent supports the following Active Directory trusts:

Trust Type Transitivity Direction PBIS Default Cell Support Named Cells

Parent and child Transitive Two-way Yes Yes

(20)

Trust Type Transitivity Direction PBIS Default Cell Support Named Cells

External Nontransitive Two-way No Yes

Forest Transitive One-way No Yes

Forest Transitive Two-way Yes: Must enable default cell in both forests. Yes There is information on the types of trusts athttp://technet.microsoft.com/en-us/library/cc775736 (WS.10).aspx.

Notes on Trusts

The following is general information about working with trusts.

• You must place the user or group that you want to give access to the trust in a cell other than the default cell.

• In a two-way forest or parent-child trust, PBIS merges the default cells. When merged, users in one domain can log on computers in another domain, and vice-versa.

• To put a user in a child domain but not the parent domain, you must put the user in a named cell, which is a cell associated with an organizational unit.

• If there is a UID conflict across two domains, one domain will be dropped.

• In a cross-forest transitive one- or two-way trust, the root of the trusted forest must have a default cell.

• In a one-way trust in which Forest A trusts Forest B, a computer in Forest A cannot get group information from Forest B, because Forest B does not trust Forest A. The computer in Forest A can obtain group information if the user logs on with a password for a domain user, but not if the user logs on with Kerberos single sign-on credentials. Only the primary group information, not the secondary group information, is obtained.

• To support a 1-way trust without duplicating user accounts, you must use a cell associated with an OU, not a default cell. If Domain A trusts Domain B (but not the reverse) and if Domain B contains all the account information in cells associated with OUs, then when a user from Domain B logs on a machine joined to Domain A, Domain B will authenticate the user and authorize access to the machine in Domain A.

In such a scenario, you should also add a domain user from the trusted domain to an administrative group in the trusting domain so you can manage the trusting domain with the appropriate level of read access to trusted user and group information. However, before you add the domain user from the trusted domain to the trusting domain, you must first add to the trusting domain a group that includes the user because Unix and Linux computers require membership in at least one group and Active Directory does not enumerate a user's membership in foreign groups.

• If you have a network topology in which the "front" domain trusts the "back" domain, and you join a machine to the front domain using a back domain administrator, as in the following example, the attempt to join the domain will fail:domainjoin-cli join front.example.com

back\\administrator password. However, the attempt to join the domain will succeed if you use the following nomenclature:

(21)

domainjoin-cli join front.example.com administrator@BACK.example.COM password

• With PBIS Enterprise, aliased user names are supported in the default cell and in named cells.

Trusts and Cells in PBIS Enterprise

In PBIS Enterprise, a cell contains Unix settings, such as a UID and a GID, for an Active Directory user. When an AD user logs on a PBIS client, PBIS Enterprise searches Active Directory for the user's cell information—and must find it to operate properly. Thus, your AD topology and your trust relationships may dictate where to locate a cell in Active Directory so that your PBIS clients can access their Unix settings.

With a default cell, PBIS searches for a user or group's attributes in the default cell of the domain where the user or group resides. In a multi-domain topology, a default cell must exist in the domain where user and group objects reside in addition to the default cell that exists in the domain to which Unix, Linux, and Mac computers are joined. In a multi-domain topology, then, be sure to create a default cell in each domain.

Ideally, Unix information is stored on the user object in default cell Directory Integrated mode. If the client computer does not have the access rights to read and write the information to the user object, as in an external one-way trust, the Unix information cannot be stored on the user object. It can, however, be stored locally in a named cell, that is, a cell associated with an organizational unit.

Since a named cell can be linked to the default cell, you can store Unix information on the user object in default cell Directory Integrated mode when possible, and otherwise in a named cell that represents the external user. For information about cells, see the chapter on planning your PBIS Enterprise installation and deployment.

Integrating with Samba

PowerBroker Identity Services includes a tool to install the files necessary to use Samba with PBIS. Located in/opt/pbis/bin, the tool is namedsamba-interop-install. ThePowerBroker Identity Services Samba Guidedescribes how to use the tool to integrate Samba 3.0.25, 3.2.X, or 3.5.X with PBIS Enterprise or PBIS Open.

Supported Platforms

PBIS Open and PBIS Enterprise run on a broad range of Unix, Mac OS X, and Linux platforms. BeyondTrust frequently adds new vendors and distributions. See theBeyondTrust websitefor the list of supported platforms.

SELinux Support

The PBIS SELinux implementation supports the following operating systems: • Fedora 13—Fedora 17

• RedHat Enterprise Linux version 6

(22)

All versions of the policy and the source for the policy are available on the workstation after the PBIS RPM is installed.

Appropriate versions of the policy are determined by the logic in the RPM package.

Unsupported Operating Systems

If SELinux is enabled and you are installing to an unsupported operating system (for example, Fedora 12 or Fedora 25), the installation is stopped. You must place SELinux in permissive mode to continue. • SELinux enabled is only detected with the RPM package.

• SELinux enabled is not detected with the self-extracting installer or domainjoin.

Storage Modes

PBIS has two operating modes: Directory Integrated mode and Schemaless mode. Note: Directory Integrated mode is the preferred mode.

The modes provide a method for storing Unix and Linux information in Active Directory—including UIDs and GIDs—so that PBIS can map SIDs to UIDs and GIDs and vice versa.

The mapping lets PBIS use an Active Directory user account to grant a user access to a Unix or Linux resource that is governed by a UID-GID scheme. When an AD user logs on a Unix or Linux computer, the PBIS agent communicates with the Active Directory Domain Controller through standard LDAP protocols to obtain the following authorization data:

• UID

• Primary GID • Secondary GIDs • Home directory • Login shell

PBIS uses this information to control the user's access to Unix and Linux resources.

Directory Integrated Mode

Directory Integrated mode takes advantage of the Unix- and Linux-specific RFC 2307 object classes and attributes to store Linux and Unix user and group information, namely theposixAccountand posixGroupobject classes.

For example, theposixAccountandposixGroupobject classes include attributes—uidNumberand gidNumber—that PBIS uses for UID and GID mapping. In addition, PBIS uses

serviceConnectionPointobjects to store the same information as in Schemaless by using the keywordsattribute.

For example, when you create a cell in Directory Integrated mode, PBIS creates a container object— CN=$LikewiseIdentityCell—in the domain root, or in the OU where you created the cell. If the container is created in an OU, which is called a named or named cell, the Unix-specific data is stored in CN=UsersandCN=Groupsin the$LikewiseIdentityCellcontainer object. The objects point to the Active Directory user or group information with a backlinked security identifier.

(23)

If the container is created at the level of the root domain, it is known as a default cell. In this case, the Unix-specific data is stored directly in the AD user or group account.

Upgrading Your Schema

You must upgrade your schema if your schema does not comply with RFC 2307 (Windows Server 2003 R2 or later complies with RFC 2307).

Use the Active Directory Domains and Trusts tool to raise the forest functional level.

PBIS does not change the schema, but you still must run the Directory Integrated Mode Wizard to include the RFC 2307 attributes in the global catalog and to index them for faster searches.

Schemaless Mode

In contrast, Schemaless mode stores Linux and Unix data without requiring RFC 2307 object classes and attributes and without modifying the schema. Instead, Schemaless mode uses existing object classes and attributes to store its data.

• To store information about a cell, PBIS creates acontainerobject and stores data in its descriptionattribute.

• To store information about a group or user, PBIS creates aserviceConnectionPointobject and stores data in itskeywordsattribute. Bothkeywordsanddescriptionare multi-valued

attributes that can have multiple values while still allowing AD searches for specific values. In Schemaless mode, PBIS uses RFC 2307 attribute names to store values in thekeywordsand

descriptionattributes in the formname=value, wherenameis the attribute name andvalueis its value.

(24)

Planning Your Installation and Deployment

Planning Your Deployment

The key to a successful deployment is planning. Before you begin deploying PBIS in an enterprise, develop a plan that addresses at least the following aspects of installation and deployment:

• Review the PBIS Release Notes to ensure your enviroment meets the deployment requirements. • Set up a test environment. It is recommended that you first deploy PBIS in a test environment so that

you can identify and resolve any issues specific to your mixed network before you put the system into production.

• Determine whether to use PBIS inDirectory Integration or Schemaless mode. When you configure your domain with the PBIS domain configuration wizard, you must choose the mode to use. Important: Back up Active Directory before you run the PBIS domain configuration wizard. • Decide whether to configure PBIS to manage a single forest or multiple forests. If you manage

multiple forests, the UID-GID range assigned to a forest should not overlap with the range of another forest.

• Determine how you will migrate Linux, Unix, and Mac OS X users to Active Directory.

For example, if you are using NIS, decide whether you will migrate those accounts to Active Directory and whether you will migrate local accounts and then delete them or leave them. It is usually

recommended that you delete interactive local accounts other than the root account.

• Identify the structure of the organizational units—or cell topology—that you will need, including the UID-GID ranges. If you have multiple NIS servers in place, your users may have different UID-GID maps in each NIS domain. You may want to eliminate the NIS servers but retain the NIS mapping

information in Active Directory. To do so, you can use PowerBroker cells.

• Determine whether you will use aliasing. If you plan to use aliasing, you must associate users with a specific PowerBroker cell; you cannot use the default cell.

(25)

Installing the Management Console

This section provides information on management console requirements and installing the console.

Requirements

This section lists the requirements to use PBIS Enterprise with Active Directory. You must have at least the following components:

• An Active Directory domain controller.

• A Windows administrative workstation that is running ADUC and is connected to your Active Directory domain controller.

• One or more Unix or Linux computers running an operating system that PBIS supports, such as versions of Mac OS X, Red Hat, SUSE Linux, Fedora, CentOS, Debian, Sun Solaris, IBM AIX, HP-UX, and Ubuntu. For a complete list of supported platforms, see www.beyondtrust.com.

Requirements for the PBIS agent—the software that runs on the Linux, Unix, and Mac OS X computers that you want to connect to AD—are listed inInstalling the Agent.

Microsoft Management Tools

PBIS works with ADUC, GPME, and GPMC. Ensure that the Microsoft management tools are installed before you install PBIS.

The Microsoft management tools vary by Windows version, but include the Remote Server Administration Tools (RSAT) for Windows.

• Turn on the following RSAT features. Go to Control Panel, select Programs, and then select Turn Windows features on or off:

– Group Policy Management Tools

– Active Directory Module for Windows PowerShell – Active Directory Administrative Center

– AD DS Snap-ins and Command-Line Tools

For more information, seeRemote Server Administration Tools for Windows 7and your Microsoft Windows documentation.

(26)

Administrator Privileges

• Root access or sudo permission on the Unix, Linux, and Mac OS X computers that you want to join to the domain.

• Active Directory credentials that allow you to add computers to an Active Directory domain—for example, membership in the Domain Administrators security group or the Enterprise Administrators security group.

Active Directory Requirements

• Windows 2003 SP1 or R2 Standard and Enterprise • Windows Server 2008

Windows Requirements for the Console

• One of the following operating systems: – Windows Server 2012

– Windows Server 2008 SP1 or R2

– Windows Server 2003 SP1 or R2 (or later), 32-bit version Note: The 64-bit version is not supported.

– Windows 7 Professional – Windows Vista SP1

(27)

• Microsoft .NET 1.1 Framework • Microsoft .NET 2.0 Framework

• MSXML 6.0 Parser (for displaying reports in the GPMC) • MMC 3.0 Update

• 50 MB of free space

Requirements to Run PBIS in Directory Integrated Mode

• Active Directory installations that comply with RFC 2307, such as Windows Server 2003 R2. • Domain and forest functional levels have been raised to Windows Server 2003 or later.

• No Windows 2000 domain controllers (raising the forest functional level to Windows Server 2003 excludes Windows 2000 domain controllers from the domain).

For more information, seeStorage Modes.

Networking

The subnets with your Linux, Unix, and Mac computers must be added to Active Directory sites before joining the computers to Active Directory so that the PBIS agent can detect the optimal domain controller and global catalog.

Replication

Make sure your AD replication system is up to date and functioning properly by using the following diagnostic tools fromhttp://www.microsoft.com/downloadto test replication. For instructions, see the Microsoft documentation for each tool.

• DCDiag. Part of Microsoft's support tools for Windows Server 2003, dcdiag.exe should be run with the/v /c /eswitches to test all the domain controllers in all your sites.

• FRSDiag. Use frsdiag.exe tool, available from the Microsoft Resource Kit tools, to check the File Replication Service (FRS).

In addition, the following tools can help you review and troubleshoot FRS problems. • Sonar. Optionally use it to perform a quick review of FRS status.

• Ultrasound. Optionally use it to monitor and troubleshoot FRS.

• ReplMon. Included in the Microsoft Resource Kit Tools. Use it to investigate replication problems across links where DCDiag showed failures.

Supported Platforms and Applications

Platforms

(28)

Applications

Advanced Group Policy Management (AGPM) Tool

You can use the AGPM tool to manage your GPOs. Any PBIS settings applied to your GPOs will be maintained.

Installing the Console

Install the BeyondTrust Management Console on a Windows administrative workstation that can connect to your Active Directory domain controller.

It is recommended that you do not install the console on a domain controller.

For instructions on how to use the PBIS metainstaller to install the console and other components, see thePowerBroker Identity Services Evaluation Guide.

(29)

Checkpoint

– Review the requirements before proceeding with the installation. SeeRequirements.

– Ensure the account you are using to run the install is a member of the Domain Admins group or Enterprise Admins group. The account needs privileges to change objects and child objects in Active Directory.

– Ensure the Microsoft management tools for Active Directory are installed before you install the console. SeeMicrosoft Management Tools.

1. Locate and copy the install file to your Windows workstation: SetupPBIS-*.exe or SetupPBIS64-*.exe

The installer file includes the version and build number. 2. RunSetupPBIS-*.exe or SetupPBIS64-*.exe.

a. On the Welcome page, click Install to go through the installation. b. Accept the license agreement, and then click Next.

c. Enter a user name and organization, and then click Next. d. Provide the path to install the console.

e. Select the features that you want to install (or select features that you do not want to install). By default, the following components are installed: Reporting Components, Operations Dashboard, Database Update and Management Tools, PBIS Migration Tools, and GPMC Support tools. f. Click Next.

g. Click Finish.

3. On the Directory Integrated Mode Configuration page, click Configure to set up Directory Integrated mode.

4. On the Default Cell Creation page, click Create to build the default cell. 5. On the Advanced Option page, configure the following:

– Report Viewer - Click Install to install the Report viewer.

– SQL Server database instance - Click Search Server to create the PBIS database.

– Event Collector services - Click Install to go through the wizard to configure the PBIS Database utilities.

Upgrading the Console

To upgrade to the latest version of PBIS Enterprise, first uninstall the existing version. Then, before installing the latest version of PBIS Enterprise, install the latest version of GPMC and run Windows update to make sure your workstation has the latest XML patches.

Upgrading PBIS 7.5 to PBIS 8.1

If you were using Directory Integrated mode in PBIS 7.5, updates to the schema need to be applied when you upgrade to PBIS 8.1. Ensure that the user installing PBIS is a member in the Schema Admins group. The install must be run on the forest root since the Schema Admins group only exists on the domain controller for the forest. For more information on the Schema Admins group refer to Microsoft documentation.

(30)

When Schema Admins permissions are in place, you can upgrade PBIS without removing your existing PowerBroker Cells.

Note: The Schema Admins permissions only applies to an upgrade. To upgrade PBIS:

1. Locate and copy the install file to your Windows workstation: SetupPBIS-*.exe or SetupPBIS64-*.exe

The installer file includes the version and build number. 2. RunSetupPBIS-*.exe or SetupPBIS64-*.exe. 3. Accept the license agreement, and then click Next. 4. To change settings for the PBIS install, click Modify.

This installation wizard starts. This is where you select the components to install. a. Set the user name and organization

b. Set the installation directory.

c. Select the PBIS components to install: BT management console, Reporting, Operations Dashboard, Database Update and Management tools, Migration tools, GPMC support – Click Finish.

5. If you are using DI mode, there is no configuration required here. Click Skip.

6. Click Skip on the Default Cell Create Page. 7. On the Advanced Options page, you can:

– Remove the report viewer.

– Create or remove database instances. – Run the PBIS Database Utilities wizard. 8. Click Finish.

Changing to Directory Integrated Mode

If you are already using Windows Server 2003 R2, running the wizard indexes frequently searched attributes in the Active Directory global catalog.

(31)

To change the storage mode to Directory Integrated mode:

1. Run the PBIS installer, and skip to the Directory Integrated Mode Configuration page. 2. Click the Configure button.

The necessary attributes are updated.

Changes Made by the Directory Integrated Mode Configuration

The Active Directory schema changes are applied from a set of LDAP Data Interchange Format (LDIF) files. The standard installation places these files in the following directory:

\Program Files\BeyondTrust\PBIS\Enterprise\Resources\LDF

After you raise the domain and forest to 2003 functional levels, the PBIS domain configuration wizard changes the following attributes, which are required for PBIS to run in Directory Integrated mode. Promotes and indexes the following attributes to the global catalog:

• uidNumber • uid • displayName • gecos • loginShell • unixHomeDirectory

(32)

Configuring Clients Before PBIS Agent Installation

Before you install the PBIS agent, configure client computers as indicated in the following topics.

Configure nsswitch.conf

Before you attempt to join an Active Directory domain, make sure the/etc/nsswitch.conffile contains the following line:

hosts: files dns

Thehostsline can contain additional information, but it must include thednsentry, and it is recommended that thednsentry appear after thefilesentry.

Computers running Solaris, in particular, may not contain this line innsswitch.confuntil you add it. When you use PowerBroker Identity Services with Multicast DNS 4 (mDNS4) and have a domain in your environment that ends in.local, you must place thednsentry before themdns4_minimalentry and before themdns4entry:

hosts: files dns mdns4_minimal [NOTFOUND=return] mdns4

The default setting for many Linux systems is to list themdns4entries before thednsentry—a configuration that leaves PBIS unable to find the domain.

For PBIS to work correctly, thensswitch.conffile must be readable by user, group, and world. For more information on configuring nsswitch, see the man page fornsswitch.conf.

Configure netsvc.conf on AIX

On AIX computers, ensure the netsvc.conf file contains the following line: hosts = local,bind

Restart Services

After you update nsswitch.conf (or netsvc.conf), you must restart the PBIS input-output service (lwio) and the authentication service (lsass).

Run the following command as root to restart both services: /opt/pbis/bin/lwsm restart lwio

(33)

Configure resolv.conf

Before you attempt to join an Active Directory domain, make sure that/etc/resolv.confon your Linux, Unix, or Mac client includes a DNS server that can resolve SRV records for your domain.

Example:

[root@rhel5d Desktop]# cat /etc/resolv.conf

search example.com

nameserver 192.168.100.132

For more information onresolv.conf, see your operating system's man page.

Configure Firewall Ports

If you are using local firewall settings, such asiptables, on a computer running the PBIS agent, ensure the following ports are open for outbound traffic.

Note: The PBIS agent is a client; it does not listen on any ports.

Port Protocol Use

53 UDP/ TCP DNS

88 UDP/TCP Kerberos 5

123 UDP NTP

389 UDP/TCP LDAP

445 TCP SMB over TCP

464 UDP/TCP Computer password changes (typically after 30 days) 1433 TCP Connection to SQL Server. Open the port you are using.

The default port for SQL is 1433.

3268 TCP Global Catalog search

Tip: To view the firewall rules on a Linux computer usingiptables, execute the following command: iptables - nL

Extend Partition Size (IBM AIX)

On AIX 5.2 and 5.3, you may need to extend the size of certain partitions to complete the installation. To change the partition size using IBM'Schfs command:

# chfs -a size=+200M /opt

The example command increases the size of theoptpartition by 200 MB, which should be sufficient for a successful installation.

(34)

Increase Max User Name Length (IBM AIX)

By default, IBM AIX is not configured to support long user and group names, which might present a conflict when you try to log on with a long Active Directory username.

On AIX 5.3 and AIX 6.1, group names are truncated when enumerated through thegroupscommand. To increase the max user name length on AIX 5.3, use the following syntax:

# chdev -l sys0 -a max_logname=MaxUserNameLength+1 Example:

# chdev -l sys0 -a max_logname=255

This command allocates 254 characters for the user and 1 for the terminating null. The safest value that you can setmax_lognameto is255.

You must reboot for the changes to take effect: # shutdown -Fr

(35)

Installing the PBIS Agent

The following sections provide details on installing the PBIS agent to your computers.

Install the Correct Version for Your Operating System

You must install the PBIS agent—the identity service that authenticates users—on each Linux, Unix, or Mac OS X computer that you want to connect to Active Directory.

To download the installer or to view a list of supported platforms, go towww.beyondtrust.com.

Important: Before you install the agent, it is recommended that you upgrade your system with the latest security patches. SeePatch requirements.

The procedure for installing the agent depends on the operating system of your target computer or virtual machine.

Checking Your Linux Kernel Release Number

To determine the release number of the kernel on your Linux machine, run the following command: uname -r

To run the PBIS agent on a Linux machine, the kernel release number must be 2.6 or later.

Package Management Commands

For an overview of commands such asrpmanddpkgthat can help you manage PBIS on Linux and Unix platforms, seePowerBroker Identity Services Package Management Commands.

Requirements for the Agent

This section lists requirements for installing and running the PBIS agent.

Environmental Variables

PBIS does not support installations that use these environmental variables.

Before you install the PBIS agent, make sure that the following environmental variables are not set: LD_LIBRARY_PATH,LIBPATH,SHLIB_PATH,LD_PRELOAD

Setting any of these environmental variables violates best practices for managing Unix and Linux

computers because it causes PBIS to use non-PBIS libraries for its services. For more information on best practices, seehttp://linuxmafia.com/faq/Admin/ld-lib-path.html.

If you must setLD_LIBRARY_PATH,LIBPATH, orSHLIB_PATHfor another program, put the PBIS library path (/opt/pbis/libor/opt/pbis/lib64) before any other path—but keep in mind that doing so may result in side effects for your other programs, as they will now use PBIS libraries for their services. If joining the domain fails with an error message that one of these environmental variables is set, stop all the PBIS services, clear the environmental variable, make sure it is not automatically set when the computer restarts, and then try to join the domain again.

(36)

Patch Requirements

It is recommended that you apply the latest patches for your operating system before you install PBIS.

Sun Solaris

All Solaris versions require the md5sum utility, which can be found on the companion CD.

Visit theOracle Technology Network Patching Centerto ensure the latest patches are deployed to your Solaris targets.

HP-UX

Visit theHP Software Depotto download patches.

Secure Shell: For all HP-UX platforms, it is recommended that a recent version of HP's Secure Shell be installed.

Sudo: By default, the versions of sudo available from the HP-UX Porting Center do not include the Pluggable Authentication Module, or PAM, which PBIS requires to allow domain users to execute sudo commands with super-user credentials. It is recommended that you download sudo from the HP-UX Porting Center and make sure that you use thewith-pamconfiguration option when you build it. HP-UX 11iv1 requires the following patches: PHCO_36229, PHSS_35381, PHKL_34805, PHCO_31923, PHCO_31903, and PHKL_29243.

The patches listed here represent the minimum patch level for proper operation.The patches might be superceded by later patches.

Kerberos client libraries: For single sign-on with HP-UX 11.11 and 11.23, you must install the latest KRB5-Client libraries from the HP Software Depot. By default, HP-UX 11.31 includes the libraries.

Other Requirements for the Agent

Locale

Configure the locale with UTF-8 encoding for every target computer.

Secure Shell

To properly process logon events with PBIS, your SSH server or client must support theUsePam yes option.

For single sign-on, both the SSH server and the SSH client must support GSSAPI authentication.

Other Software

Telnet, rsh, rcp, rlogin, and other programs that use PAM for processing authentication requests are compatible with PBIS.

Networking Requirements

Each Unix, Linux, or Mac computer must have fully routed network connectivity to all the domain controllers that service the computer's Active Directory site. Each computer must be able to resolve A, PTR, and SRV records for the Active Directory domain, including at least the following:

(37)

• SRV _kerberos._tcp.domain.tld • SRV _ldap._tcp.domain.tld

• SRV _kerberos._udp.sitename.Sites._msdcs.domain.tld • A domaincontroller.domain.tld

Disk Space Requirements

The PBIS agent requires 100MB of disk space in the /opt mount point.

The agent also creates configuration files in /etc/pbis and offline logon information in /var/lib/pbis. The PBIS Enterprise agent caches Group Policy Objects (GPOs) in /var/lib/pbis.

Memory and CPU Requirements

• RAM – The agent services and daemons can use between 9 MB – 14 MB: – Authentication service on a 300-user mail server is typically 7 MB – Other services and daemons require between 500 KB and 2 MB each

• CPU – On a 2.0 GHz single-core processor under heavy load with authentication requests is about 2 percent.

For a description of the PBIS services and daemons, seePBIS Agent.

Clock Skew Requirements

For the PBIS agent to communicate over Kerberos with the domain controller's Kerberos key distribution center, the clock of the client must be within the domain controller's maximum clock skew, which is 300 seconds, or 5 minutes, by default.

For more information, seeTime Synchronization.

Additional Requirements for Specific Operating Systems

AIX

On AIX computers, PAM must be enabled. LAM is supported only on AIX 5.x. PAM must be used exclusively on AIX 6.x.

Install the Agent on Linux or Unix with the Shell Script

You install the PBIS Enterprise agent using a shell script that contains a self-extracting executable. The file name of the SFX installer ends insh. For example,

pbis-enterprise-x.x.x.xxxx.linux.i386.rpm.sh.

The examples here are for Linux RPM-based platforms.

To view information about the installer or to view a list of command-line options, run the installer package using--helpcommand. For example,

(38)

After the wizard finishes, the user interface for joining a domain starts. To suppress it, run the installer with the--dont-joinargument.

Run the install as root account.

1. Download or copy the shell script to your Linux or Unix computer's desktop.

Important: If you FTP the file to the desktop of the target Linux or Unix computer, you must select binary, or BIN, for the transfer. Most FTP clients default to AUTO or ASCII, but the installer includes some binary code that becomes corrupted in AUTO or ASCII mode.

2. Change directories to the desktop.

3. As root, change the mode of the installer to executable.

chmod a+x pbis-enterprise-x.x.x.xxxx.linux.i386.rpm.sh

On Ubuntu, execute thesudocommand before you execute thechmodcommand: sudo chmod a+x pbis-enterprise-x.x.x.xxxx.linux.i386.rpm.sh 4. As root, run the installer:

./pbis-enterprise-x.x.x.xxxx.linux.i386.rpm.sh 5. Follow the instructions in the installer.

Note: On SLES and other systems on which the pager is set to less, you must exit the end user license agreement, or EULA, by typing the following command:q

Install the Agent on Linux in Unattended Mode

You can install the agent in unattended mode using theinstallcommand.

For example, on a 32-bit RPM-based Linux system, the installation command would look like the following:

./pbis-enterprise-x.x.x.xxxx.linux.i386.rpm.sh install

Install the Agent on a Mac OS X Computer

To install the PBIS agent on a computer running Mac OS X, you must have administrative privileges on the Mac.

1. Obtain the PBIS agent installation package for your Mac from BeyondTrust Software, Inc., and save it to your desktop.

2. Log on to the Mac with a local account that has administrative privileges. 3. On the Apple menu , click System Preferences.

4. Under Internet & Network, click Sharing, and then select the Remote Login check box. Turn on Remote Login to access the Mac with SSH after you install PBIS.

5. On the Mac computer, go to the Desktop and double-click the PBIS.dmgfile. 6. In the Finder window, double-click the PBIS.mpkgfile.

7. Follow the instructions in the installation wizard.

(39)

Install the Agent on a Mac in Unattended Mode

The PBIS command-line tools can remotely deploy the shell version of the PBIS agent to multiple Mac OS X computers. You can automate the installation of the agent using the installation command in

unattended mode.

The commands in this procedure require administrative privileges. Replacex.x.x.xxxxwith the version and build number indicated in the file name of the SFX installer.

1. Use SSH to connect to the target Mac OS X computer and then use SCP to copy the.dmginstallation file to the desktop of the Mac or to a location that can be accessed remotely.

This procedure assumes that you copied the installation file to the desktop.

2. On the target Mac, open Terminal and then use thehdiutil mountcommand to mount the.dmg file underVolumes:

/usr/bin/hdiutil mount Desktop/pbis-enterprise-x.x.x.xxxx.dmg 3. Execute the following command to open the.pkgvolume:

/usr/bin/open Volumes/pbis-enterprise 4. Execute the following command to install the agent:

sudo installer -pkg /Volumes/pbis-enterprise/pbis-enterprise-x.x.x.xxxx.pkg -target LocalSystem

Note: For more information about theinstallercommand, in Terminal execute the man installercommand.

5. To join the domain, execute the following command in the Terminal, replacingdomainNamewith the FQDN of the domain that you want to join andjoinAccountwith the user name of an account that has privileges to join computers to the domain:

sudo /opt/pbis/bin/domainjoin-cli join domainName joinAccount

Example:sudo /opt/pbis/bin/domainjoin-cli join example.com Administrator Terminal prompts you for two passwords:

– The user account on the Mac that has admin privileges;

– The user account in Active Directory that you set in the join command.

Note: You can also add the password for joining the domain to the command, but it is recommended that you do not use this approach because another user could view and intercept the full command that you are running, including the password:

sudo /opt/pbis/bin/domainjoin-cli join domainName joinAccount joinPassword Example:sudo /opt/pbis/bin/domainjoin-cli join example.com Administrator YourPasswordHere

Install the Agent in Solaris Zones

Solaris zones are a virtualization technology created to consolidate servers. Primarily used to isolate an application, Solaris zones act as isolated virtual servers running on a single operating system, making each application in a collection of applications seem as though it is running on its own server. A Solaris Container combines system resource controls with the virtual isolation provided by zones.

(40)

Every zone server contains a global zone that retains visibility and control in any installed non-global zones. By default, the non-global zones share certain directories, including/usr, which are mounted read-only. The shared directories are writable only for the global zone.

By default, installing PBIS in the global zone results in it being installed in all the non-global zones. You can, however, use the following commands to control the zones that you install to.

./pbis-enterprise-x.x.x.xxxx.solaris.i386.pkg.sh --help ...

--all-zones (Solaris) Install to all zones (default) --current-zone (Solaris) Install only to current zone

After a new child zone is installed, booted, and configured, you must run the following command as root to complete the installation:

/opt/pbis/bin/postinstall.sh

You cannot join zones to Active Directory as a group. Each zone, including the global zone, must be joined to the domain independently of the other zones.

(41)

Caveats

There are some caveats when using PBIS with Solaris zones:

• When you join a non-global zone to AD, an error occurs when PBIS tries to synchronize the Solaris clock with AD.

The error occurs because the root user of the non-global zone does not have root access to the underlying global system and thus cannot set the system clock. If the clocks are within the 5-minute clock skew permitted by Kerberos, the error will not be an issue.

Otherwise, you can resolve the issue by manually setting the clock in the global zone to match AD or by joining the global zone to AD before joining the non-global zone.

• Some Group Policy settings may log PAM errors in the non-global zones even though they function as expected. The cron Group Policy setting is one example:

Wed Nov 7 16:26:02 PST 2009 Running Cronjob 1 (sh) Nov 7 16:26:01 zone01 last message repeated 1 time

Nov 7 16:27:00 zone01 cron[19781]: pam_lsass(cron): request failed

Depending on the Group Policy setting, these errors may result from file access permissions, attempts to write to read-only directories, or both.

• By default, Solaris displaysauth.noticesyslog messages on the system console. Some versions of PBIS generate significant authentication traffic on this facility-priority level, which may lead to an undesirable amount of chatter on the console or clutter on the screen.

To redirect the traffic to a file instead of displaying it on the console, edit your/etc/syslog.conffile as follows: Change this: *.err;kern.notice;auth.notice /dev/sysmsg To this: *.err;kern.notice /dev/sysmsg auth.notice /var/adm/authlog

Important: Make sure that you use tabs, not spaces, to separate the facility.priority information (on the left) from the action field (on the right). Using spaces will cue syslog to ignore the entire line.

Installing Solaris 11

This guide is intended for administrators installing PBIS to Solaris targets.

What's New with the Solaris 11 Installer

There are two ways to install Solaris 11:

• Traditional shell script using the legacy SVR4 packaging mechanism. • IPS repository install using Oracle's preferred IPS packaging mechanism

There is a p5p file that can be uploaded to your local IPS repository. This is located on the ISO in the following directory:

(42)

agents/solaris11-<ARCH>/p5p

Uploading the Packages with the P5P file

You can use the -ips option to upload the PBIS Enterprise p5p archive file to the local repository.

Example

sh/media/install.she --ips <repository>

If you only have the p5p file you can use thepkgrecv command.

Example

pkgrecv –s ./PBISEnterprise-X.X.X.XXXX-solaris11-<ARCH>.p5p –d <repository> PBISEnterprise.<ARCH>

Confirm the Package Added to Repository

Verify that the PBIS Enterprise package with publisher BeyondTrust has been added to the repository: >pkgrepo list –s <repository>

Installing the Agent in Solaris 11 Zones

After the files are uploaded to the local IPS repository and the global zone can access the IPS repository, then non-global zones can also access the repository.

In the zone, run the following IPS package command: pkg install PBISEnterprise.<ARCH>

References

Related documents

Directory and authentication frameworks User applications, system functions, and server processes PAM NetInfo NIS Schema Crypt, NTLM, Kerberos, SASL Local DB.. LDAPv3

Before you can log in with Active Directory users and manage agent settings for users and computers, you must first join your Mac OS X machine to an Active Directory domain using

With single sign-on, also called identity federation, your users can access services in Microsoft Office 365 for enterprises with their existing Active Directory

Lamb and Lamb (1990) studied 53 severely mentally ill, formerly homeless consumers of a residential mental health treatment program and determined that substance abuse played a

I fulfil your praises, saying: As to the Offerings set up, so that the sovereign gods who come into the heavenly house of the Sovereign Grandchild's augustness, which, after he

The Doctor travels the galaxy and history, doing good, stopping villainous aliens who try to take over the Earth (if not the universe), and showing the wonders of

From inception of operations to December 31, 2014 Flores Corporation provided for uncollectible accounts receivable under the allowance method: provisions

• radiers ou parois coulés avec les précautions nécessaires en vue de limiter les phénomènes de variation dimensionnelle contraire (retrait, température,...). Ces