Hi all,
Is there a way to add an AD user to a local linux group? the user function doesn’t work because it’s only looking in /etc/passwd for this user.
Hi all,
Is there a way to add an AD user to a local linux group? the user function doesn’t work because it’s only looking in /etc/passwd for this user.
Hi Chris,
I use PowerBroker to provide this sort of functionality. This auths to AD and when I show my groups at the command line, all AD and local groups are shown. PowerBroker has the AD user id and this can be added to the group in /etc/group.
What are you trying to do?
Regards
David
Look at SSSD for joining your Linux machine to AD. We use it and find it very reliable. It also enables use of smart card for SSH logins if your public keys are populated in your AD user objects if you work in an environment that requires smart card login (2-factor).
Walter
I should add that your AD user objects need to have the POSIX attributes for UID and GID or Unix will not honor them.
Walter
Look at SSSD for joining your Linux machine to AD. We use it and find it very reliable. It also enables use of smart card for SSH logins if your public keys are populated in your AD user objects if you work in an environment that requires smart card login (2-factor).
sssd has a lot of configuration issues and some very performance
issues. It works best with FreeIPA rather than Active Directory: it's
basically a Samba core with a FreeIPA body bolted on top of it, and it
does not scale to large AD environments. (Its insistence on
pre-caching the *entire* LDAP of the AD server and crashing if it
times out on that pre-load, is deadly for bulky, remote environments.)
For a very simple AD setup, it can work well. Be aware that it will
transform account names like "nkadel" in the "example.com" AD domain
to "nkadel@domain.com", except when it doesn't, and the account
management can get pretty funky if you don't want to use the long form
all the time. Also be prepared to overload the 2048 maximum
line-length limit in /etc/group with such account names if you're not
cautious, and has to be dealt with that way unless you do
considerable extra work, in the sssd.conf and elsewhere in ways that
upgrades to sssd tend to erase. If you have to use it, be prepared to
spend time tuning the sssd itself with Ansible and managing
credentials with which to register the ansible target hosts in AD.
Nico Kadel-Garia
Email: nkadel@gmail.com
Interesting. None of that has been our experience, but then we only have about 45,000 people in our AD.
I had issues with sssd and nested groups, basically it didn’t work with nesting. This was some time ago so it may have been resolved. We have multiple domains and members from one or more that need to authenticate to a server so PowerBroker worked for us at the time and still does.
We have nested groups and the GPO evaluation properly unrolls them for deep group membership evaluation. SSSD has come a long ways in the last three years. The developers are very responsive.
Walter
We do a lot of our group management - upstream from AD - using Grouper (https://incommon.org/software/grouper/). Being an academic institution, we have way too many tails for one (like an upstart AD) to suddenly sprout a dog. But none of that has complicated our success with SSSD on Linux, or provisioning with Ansible.