In the message dated: Mon, 29 Dec 2008 11:57:08 MST,
The pithy ruminations from Neil Neely on 
<[lopsa-tech] AD integration with Unix> were:
=> We're looking at integrating our *nix machines with our AD servers and  
=> are trying to find the "Best" way to do this.  In this case I'm  

Propitious timing for this thread! I'm considering the same issue at $WORK.

Reading all the responses (and re-re-re-reading Samba docs & recipies) is very 
helpful.

=> finding my google-fu isn't working in my favor... there is no shortage  
=> of information.  Every time I think I have a complete grasp of ways  
=> this can be done I find one more.  So there are plenty of resources  
=> for how to do this using technique X, what I really need is some  
=> feedback from people who are further along in this evolution that can  
=> give some perspective on which approach they think is the best.

Exactly! There are so many different ways of doing "almost" the same thing 
(with important distinctions) that I feel I could spend weeks setting up test 
environments to find the "right" way...if I had weeks...


=> 
=> Relevant background details:
=> ~50 production servers that are centrally managed (unified UID and  
=> passwords) using homegrown syncing - we would like to move these to AD

Somewhat similar in my case...about 35 production servers (legacy stuff, new 
systems are standardizing around CentOS) using NIS to share UID and 
authentication data.

There are about 50 user accounts.

=> Already have AD infrastructure in place authenticating staff work  
=> stations (~50 workstations)

Here's a big difference, which may be common to many other *nix admins...in 
my $WORK there's a substantial AD infrastructure (about 3~4K user accounts) 
which is managed by a separate group. There is very limited interaction with 
the AD administrators, and little or no chance of getting any changes to the AD 
schema or getting SFU installed on the AD servers. The AD admins have too 
little exposure to integrating Windows and *nix to offer any direction.


=>      * primary concern is not securing these machines against it's  
=> legitimate users (so NIS may be acceptable in this environment).
=> This economy stinks and doing this without any capital expenses is  
=> very important.

Same here, on both counts.


My goal is limited:

        I want to allow Unix (Linux) users to login to the Linux (Unix)
        servers with their AD password. SSO is not a goal--existing login
        mechanisms (ssh, primarily) will continue, and creditials or domain
        membership on the user's desktop machine are irrelevent.

        Only people with local *nix accounts will have login privileges. The
        other members of the AD population will not be able to login to the
        *nix servers.

        Legitimate logins will be authenticated against the AD password data,
        thereby gaiing the advantage of using a single set of password strength
        rules, unified expiration timing, and reducing the number of passwords
        that users must remember (write down on yellow sticky pads).


Account names on our *nix servers are already identical to the account
names within AD, but there is no unification of UID or GIDs. Since there is no 
requirement for sharing directories between the AD and *nix worlds, I don't 
need to query the AD for a user's UID or GID, so I don't think that the 
separate UID and GIDs is a problem--there doesn't need to be any mapping.

The interaction with AD would be solely as a source of authentication data. 
Users would be "authorized" to login to a *nix server by virtue of having a
local /etc/passwd (or NIS passwd map) entry, not by their AD membership or
attributes.

My current plan is to configure the servers with Samba as domain clients (not 
PDC or BDCs), and use the NSS and LDAP (the PADL tools?) and PAM to issue 
authentication queries against the LD.

That looks so nice when I put it in print, but does this explanation make
any sense?

Does anyone have any suggested configurations?


        [SNIP!]


=> Neil Neely
=> http://neil-neely.blogspot.com

Thanks again for this thread. Your clear explanation of the environment and
goals seems to have helped get this off to a productive start.

Mark


-----
Mark Bergman   
http://wwwkeys.pgp.net:11371/pks/lookup?op=get&search=bergman%40merctech.com


_______________________________________________
Tech mailing list
[email protected]
http://lopsa.org/cgi-bin/mailman/listinfo/tech
This list provided by the League of Professional System Administrators
 http://lopsa.org/

Reply via email to