sudo Configuration in Identity Management
sudo utility uses a local configuration file,
/etc/sudoers, which defines the commands and users with
sudo access. While this file can be shared among machines, there is no native way to distribute
sudo configuration files among machines.
Identity Management uses its centralized LDAP database to contain the
sudo configuration, which makes it globally available to all domain hosts. Identity Management also has a specialized LDAP schema for
sudo entries that allows a lot more flexible and simpler configuration. This schema adds two key features:
The Identity Management schema supports host groups in addition to netgroups for
sudo only supports netgroups.
For every host group, Identity Management also creates a corresponding shadow netgroup. This allows IdM administrators to create
sudo rules that reference host groups, while the local
sudo command uses the corresponding netgroup.
Identity Management introduces the concept of a sudo command group. The group contains multiple commands, and the command group can be referenced in the
sudo does not support host groups and command groups, Identity Management translates the IdM
sudo configuration into native
sudo configuration when the
sudo rules are created.
sudo information is not available anonymously over LDAP by default. Identity Management therefore defines a default
uid=sudo,cn=sysaccounts,cn=etc,$SUFFIX, which can be set in the LDAP/
sudo configuration file,
sudo and Identity Management support user groups as part of the
sudo configuration. User groups can be either Unix or non-POSIX groups. Creating non-POSIX groups can result in some access issues because any users in the group inherit non-POSIX rights from the group. Having the choice between Unix and non-POSIX groups allows administrators the choice in group formatting and to avoid problems with inherited permissions or GID information.
21.1.2. sudo and Netgroups
As Section 21.1.1, “General
sudo Configuration in Identity Management”
mentions, the LDAP schema used for sudo entries in Identity Management supports host group-style groups in addition to netgroups. Really, Identity Management creates two groups, a visible host group and a shadow netgroup.
itself only supports NIS-style netgroups for group formats.
One important thing to consider is that even though
sudo uses NIS netgroups, it is not necessary to have a NIS server installed or a NIS client configured. When any group is created for
sudo, the NIS object is created in the Directory Server instance, and then the information is retrieved by NSS_LDAP or by SSSD. The client (in this case,
sudo) then extracts the required NIS information from the information provided by Identity Management's Directory Server.
sudo configuration requires NIS-formatted netgroups. It does not require NIS.
However, in order for IdM
to work with host groups, use the
command to set the NIS domain name to be used with the
rules. See Section 21.4, “Configuring Hosts to Use IdM
for details on using
as well as setting other configuration features.