Red Hat Enterprise Linux 6
Managing Identity and Authorization Policies for Linux-Based Infrastructures
Legal Notice
Copyright © 2016 Red Hat.
This document is licensed by Red Hat under the Creative Commons Attribution-ShareAlike 3.0 Unported License. If you distribute this document, or a modified version of it, you must provide attribution to Red Hat, Inc. and provide a link to the original. If the document is modified, all Red Hat trademarks must be removed.
Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section 4d of CC-BY-SA to the fullest extent permitted by applicable law.
Red Hat, Red Hat Enterprise Linux, the Shadowman logo, JBoss, MetaMatrix, Fedora, the Infinity Logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries.
Linux® is the registered trademark of Linus Torvalds in the United States and other countries.
Java® is a registered trademark of Oracle and/or its affiliates.
XFS® is a trademark of Silicon Graphics International Corp. or its subsidiaries in the United States and/or other countries.
MySQL® is a registered trademark of MySQL AB in the United States, the European Union and other countries.
Node.js® is an official trademark of Joyent. Red Hat Software Collections is not formally related to or endorsed by the official Joyent Node.js open source or commercial project.
The OpenStack® Word Mark and OpenStack Logo are either registered trademarks/service marks or trademarks/service marks of the OpenStack Foundation, in the United States and other countries and are used with the OpenStack Foundation's permission. We are not affiliated with, endorsed or sponsored by the OpenStack Foundation, or the OpenStack community.
All other trademarks are the property of their respective owners.
Abstract
Identity and policy management — for both users and machines — is a core function for almost any enterprise environment. IPA provides a way to create an identity domain that allows machines to enroll to a domain and immediately access identity information required for single sign-on and authentication services, as well as policy settings that govern authorization and access. This manual covers all aspects of installing, configuring, and managing IPA domains, including both servers and clients. This guide is intended for IT and systems administrators.
- 1. Introduction to Identity Management
- I. Installing Identity Management Servers and Services
- 2. Prerequisites for Installation
- 3. Installing an IdM Server
- 4. Setting up IdM Replicas
- 5. Setting up Systems as IdM Clients
- 6. Upgrading Identity Management
- 7. Uninstalling IdM Servers and Replicas
- 8. The Basics of Managing the IdM Server and Services
- 8.1. Starting and Stopping the IdM Domain
- 8.2. About the IdM Client Tools
- 8.3. Logging into IdM
- 8.4. Using the IdM Web UI
- 9. Identity: Managing Users and User Groups
- 9.1. Setting up User Home Directories
- 9.2. Managing User Entries
- 9.3. Managing Public SSH Keys for Users
- 9.4. Changing Passwords
- 9.5. Enabling and Disabling User Accounts
- 9.6. Unlocking User Accounts After Password Failures
- 9.7. Smart Card Authentication in Identity Management
- 9.8. Managing User Private Groups
- 9.9. Managing Unique UID and GID Number Assignments
- 9.10. Managing User and Group Schema
- 9.11. Managing User Groups
- 10. Identity: Managing Hosts
- 10.1. About Hosts, Services, and Machine Identity and Authentication
- 10.2. About Host Entry Configuration Properties
- 10.3. Disabling and Re-enabling Host Entries
- 10.4. Managing Public SSH Keys for Hosts
- 10.5. Setting Ethers Information for a Host
- 10.6. Renaming Machines and Reconfiguring IdM Client Configuration
- 10.7. Managing Host Groups
- 11. Identity: Managing Services
- 12. Identity: Delegating Access to Hosts and Services
- 13. Identity: Integrating with NIS Domains and Netgroups
- 13.1. About NIS and Identity Management
- 13.2. Setting the NIS Port for Identity Management
- 13.3. Creating Netgroups
- 13.4. Exposing Automount Maps to NIS Clients
- 13.5. Migrating from NIS to IdM
- 14. Identity: Integrating with Active Directory Through Cross-forest Trust (Technology Preview)
- 15. Identity: Integrating with Microsoft Active Directory Through Synchronization
- 15.1. Supported Windows Platforms
- 15.2. About Active Directory and Identity Management
- 15.3. About Synchronized Attributes
- 15.4. Setting up Active Directory for Synchronization
- 15.5. Managing Synchronization Agreements
- 15.5.1. Trusting the Active Directory and IdM CA Certificates
- 15.5.2. Creating Synchronization Agreements
- 15.5.3. Changing the Behavior for Syncing User Account Attributes
- 15.5.4. Changing the Synchronized Windows Subtree
- 15.5.5. Configuring Uni-Directional Sync
- 15.5.6. Deleting Synchronization Agreements
- 15.5.7. Winsync Agreement Failures
- 15.6. Managing Password Synchronization
- 16. Identity: ID Views and Migrating Existing Environments to Trust
- 17. Identity: Managing DNS
- 17.1. About DNS in IdM
- 17.2. Using IdM and DNS Service Discovery with an Existing DNS Configuration
- 17.3. DNS Notes
- 17.4. Adding or Updating DNS Services After Installation
- 17.5. Setting up the rndc Service
- 17.6. Managing DNS Zone Entries
- 17.6.1. Adding Forward DNS Zones
- 17.6.2. Adding Additional Configuration for DNS Zones
- 17.6.3. Adding Reverse DNS Zones
- 17.6.4. Enabling and Disabling Zones
- 17.6.5. Enabling Dynamic DNS Updates
- 17.6.6. Configuring Forwarders and Forward Policy
- 17.6.7. Enabling Zone Transfers
- 17.6.8. Defining DNS Queries
- 17.6.9. Synchronizing Forward and Reverse Zone Entries
- 17.6.10. Setting DNS Access Policies
- 17.7. Managing DNS Record Entries
- 17.8. Configuring the bind-dyndb-ldap Plug-in
- 17.9. Changing Recursive Queries Against Forwarders
- 17.10. Resolving Hostnames in the IdM Domain
- 18. Policy: Using Automount
- 19. Policy: Defining Password Policies
- 20. Policy: Managing the Kerberos Domain
- 21. Policy: Using sudo
- 22. Policy: Configuring Host-Based Access Control
- 23. Policy: Group Policy Object Access Control
- 24. Policy: Defining SELinux User Maps
- 25. Policy: Defining Automatic Group Membership for Users and Hosts
- 26. Policy: Restricting Domains for PAM services
- 27. Configuration: Defining Access Control for IdM Users
- 28. Configuration: Configuring IdM Servers and Replicas
- 28.1. Identity Management Files and Logs
- 28.2. Managing Certificates and Certificate Authorities
- 28.3. Disabling Anonymous Binds
- 28.4. Changing Domain DNS Configuration
- 28.5. Managing Replication Agreements Between IdM Servers
- 28.6. Removing a Replica
- 28.7. Renaming a Server or Replica Host System
- 29. Migrating from an LDAP Directory to IdM
- 29.1. An Overview of LDAP to IdM Migration
- 29.2. Examples for Using migrate-ds
- 29.3. Scenario 1: Using SSSD as Part of Migration
- 29.4. Scenario 2: Migrating an LDAP Server Directly to Identity Management
- A. Troubleshooting Identity Management
- B. Working with certmonger
- Index
- C. Revision History