Red Hat Training

A Red Hat training course is available for Red Hat Virtualization

4.2. Configuring Single Sign-On for Virtual Machines

Configuring single sign-on, also known as password delegation, allows you to automatically log in to a virtual machine using the credentials you use to log in to the VM Portal. Single sign-on can be used on both Red Hat Enterprise Linux and Windows virtual machines.

Important

If single sign-on to the VM Portal is enabled, single sign-on to virtual machines will not be possible. With single sign-on to the VM Portal enabled, the VM Portal does not need to accept a password, thus the password cannot be delegated to sign in to virtual machines.

4.2.1. Configuring Single Sign-On for Red Hat Enterprise Linux Virtual Machines Using IPA (IdM)

To configure single sign-on for Red Hat Enterprise Linux virtual machines using GNOME and KDE graphical desktop environments and IPA (IdM) servers, you must install the ovirt-guest-agent package on the virtual machine and install the packages associated with your window manager.

Important

The following procedure assumes that you have a working IPA configuration and that the IPA domain is already joined to the Manager. You must also ensure that the clocks on the Manager, the virtual machine and the system on which IPA (IdM) is hosted are synchronized using NTP.

Configuring Single Sign-On for Red Hat Enterprise Linux Virtual Machines

  1. Log in to the Red Hat Enterprise Linux virtual machine.
  2. Enable the repository:

    • For Red Hat Enterprise Linux 6:

      # subscription-manager repos --enable=rhel-6-server-rhv-4-agent-rpms
    • For Red Hat Enterprise Linux 7:

      # subscription-manager repos --enable=rhel-7-server-rh-common-rpms
  3. Download and install the guest agent, single sign-on, and IPA packages:

    # yum install ovirt-guest-agent-common ovirt-guest-agent-pam-module     ovirt-guest-agent-gdm-plugin ipa-client
  4. Run the following command and follow the prompts to configure ipa-client and join the virtual machine to the domain:

    # ipa-client-install --permit --mkhomedir
    Note

    In environments that use DNS obfuscation, this command should be:

    # ipa-client-install --domain=FQDN --server==FQDN
  5. For Red Hat Enterprise Linux 7.2 and later:

    # authconfig --enablenis --update
    Note

    Red Hat Enterprise Linux 7.2 has a new version of the System Security Services Daemon (SSSD), which introduces configuration that is incompatible with the Red Hat Virtualization Manager guest agent single sign-on implementation. This command ensures that single sign-on works.

  6. Fetch the details of an IPA user:

    # getent passwd ipa-user
  7. Record the IPA user’s UID and GID:

    ipa-user:*:936600010:936600001::/home/ipa-user:/bin/sh
  8. Create a home directory for the IPA user:

    # mkdir /home/ipa-user
  9. Assign ownership of the directory to the IPA user:

    # chown 936600010:936600001 /home/ipa-user

Log in to the VM Portal using the user name and password of a user configured to use single sign-on and connect to the console of the virtual machine. You will be logged in automatically.

4.2.2. Configuring Single Sign-On for Red Hat Enterprise Linux Virtual Machines Using Active Directory

To configure single sign-on for Red Hat Enterprise Linux virtual machines using GNOME and KDE graphical desktop environments and Active Directory, you must install the ovirt-guest-agent package on the virtual machine, install the packages associated with your window manager and join the virtual machine to the domain.

Important

The following procedure assumes that you have a working Active Directory configuration and that the Active Directory domain is already joined to the Manager. You must also ensure that the clocks on the Manager, the virtual machine and the system on which Active Directory is hosted are synchronized using NTP.

Configuring Single Sign-On for Red Hat Enterprise Linux Virtual Machines

  1. Log in to the Red Hat Enterprise Linux virtual machine.
  2. Enable the Red Hat Virtualization Agent repository:

    • For Red Hat Enterprise Linux 6

      # subscription-manager repos --enable=rhel-6-server-rhv-4-agent-rpms
    • For Red Hat Enterprise Linux 7

      # subscription-manager repos --enable=rhel-7-server-rh-common-rpms
  3. Download and install the guest agent packages:

    # yum install ovirt-guest-agent-common
  4. Install the single sign-on packages:

    # yum install ovirt-guest-agent-gdm-plugin
  5. Install the Samba client packages:

    # yum install samba-client samba-winbind samba-winbind-clients
  6. On the virtual machine, modify the /etc/samba/smb.conf file to contain the following, replacing DOMAIN with the short domain name and REALM.LOCAL with the Active Directory realm:

    [global]
       workgroup = DOMAIN
       realm = REALM.LOCAL
       log level = 2
       syslog = 0
       server string = Linux File Server
       security = ads
       log file = /var/log/samba/%m
       max log size = 50
       printcap name = cups
       printing = cups
       winbind enum users = Yes
       winbind enum groups = Yes
       winbind use default domain = true
       winbind separator = +
       idmap uid = 1000000-2000000
       idmap gid = 1000000-2000000
    template shell = /bin/bash
  7. Join the virtual machine to the domain:

    net ads join -U user_name
  8. Start the winbind service and ensure it starts on boot:

    • For Red Hat Enterprise Linux 6

      # service winbind start
      # chkconfig winbind on
    • For Red Hat Enterprise Linux 7

      # systemctl start winbind.service
      # systemctl enable winbind.service
  9. Verify that the system can communicate with Active Directory:

    1. Verify that a trust relationship has been created:

      # wbinfo -t
    2. Verify that you can list users:

      # wbinfo -u
    3. Verify that you can list groups:

      # wbinfo -g
  10. Configure the NSS and PAM stack:

    1. Open the Authentication Configuration window:

      # authconfig-tui
    2. Select the Use Winbind check box, select Next and press Enter.
    3. Select the OK button and press Enter.

Log in to the VM Portal using the user name and password of a user configured to use single sign-on and connect to the console of the virtual machine. You will be logged in automatically.

4.2.3. Configuring Single Sign-On for Windows Virtual Machines

To configure single sign-on for Windows virtual machines, the Windows guest agent must be installed on the guest virtual machine. The RHEV Guest Tools ISO file provides this agent. If the RHEV-toolsSetup.iso image is not available in your ISO domain, contact your system administrator.

Configuring Single Sign-On for Windows Virtual Machines

  1. Select the Windows virtual machine. Ensure the machine is powered up.
  2. Click Change CD.
  3. Select RHEV-toolsSetup.iso from the list of images.
  4. Click OK.
  5. Click Console and log in to the virtual machine.
  6. On the virtual machine, locate the CD drive to access the contents of the guest tools ISO file and launch RHEV-ToolsSetup.exe. After the tools have been installed, you will be prompted to restart the machine to apply the changes.

Log in to the VM Portal using the user name and password of a user configured to use single sign-on and connect to the console of the virtual machine. You will be logged in automatically.

4.2.4. Disabling Single Sign-on for Virtual Machines

The following procedure explains how to disable single sign-on for a virtual machine.

Disabling Single Sign-On for Virtual Machines

  1. Select a virtual machine and click Edit.
  2. Click the Console tab.
  3. Select the Disable Single Sign On check box.
  4. Click OK.