Configure AD bridging

This topic describes how to configure PSM for SSH to integrate with Active Directory.

To learn about how AD bridging works, see AD bridging through PSM for SSH.

Perform the following steps to configure PSM for SSH to integrate with Active Directory:

  1. Configure the Vault

  2. Create a platform for user provisioning

  3. Add a target machine account

  4. Associate the target machine with a user provisioning account

  5. Confirm required permissions

  6. Create logon accounts for the user provisioning account

  7. Synchronize groups with Vault groups

  8. Verify SFTP on the target machine

  9. Set the default shell

  10. Manage users’ UID

  11. Customize AD Bridge scripts

  12. Customize user profiles

Configure the Vault

Configure the Vault to integrate with your enterprise Active Directory. For more information, see Configure transparent user management using LDAP.

Create a platform for user provisioning

Duplicate the Unix via SSH platform to create a new platform for user provisioning.

To create the platform:

  1. In the PVWA, click Administration > Platform Management.

  2. In the Target Platforms tab, select Unix via SSH, click the ellipsis button, and then click Duplicate.

  3. On the Duplicate platform dialog box, enter a platform name: Unix via SSH with Provisioning, and then click Create .

  4. Select the platform that you created, and then click Edit.

  5. In the left pane, open UI & Workflow PropertiesRequired, and delete the value from the Username field. The field will no longer appear in the left pane.

  6. Open UI & Workflow Linked Accounts, and delete the configured linked accounts.
  7. Open UI & Workflow Privileged Session Management, and do the following:

    • Set EnablePrivilegedSSO to No.
    • Make sure that UsePersonalPassword is set to No.

  8. Open Privileged Session Management , right-click SSH Proxy, and click Add User Provisioning.
  9. Open User Provisioning, and set Enable User Provisioning to Yes.
  1. Click Apply .

  2. Select the Unix via SSH with Provisioning platform and change its status to Active.

Add a target machine account

Create a target *nix account and associate it with the Unix via SSH with Provisioning platform. For details, see Add Accounts in V10 Interface.

 

To connect to remote machines on IPv6, specify the IPv6 address using the global format, as shown in the following example: 1000:1000:1000:1000:1000:1000:1000:0055

Associate the target machine with a user provisioning account

An additional privileged user account is required to create ad-hoc users on target machines. This account is associated with the target machine account, and is used to create users transparently.

To associate the target machine with a user provisioning account

  1. In the Account Details page of the target machine account, click Additional details and actions in classic interface, and then click the User Provisioning tab.

  2. In the User Provisioning tab, click Associate.

    The Associate Account window lists the frequently used accounts. If the account that you require does not appear in this list, search for the required account.

  3. Select the required account, and then click Associate.

    The selected account is linked to the target machine account and its details are listed in the User Provisioning tab.

     

    The user provisioning account can use password or SSH Key to authenticate to target systems.

Confirm required permissions

Before configuring PSM for SSH, make sure that the users used to configure PSM for SSH have the relevant permissions in the safes where the accounts required to access the target machine and the provisioning account are stored.

User

Machine

Permissions

PSM for SSH-ADBridge application user

On the provisioning account

  • List accounts
  • Retrieve accounts

End user

On the target machine account

  • List accounts
  • Use accounts

Users can be allocated permissions for entire safes or for specific accounts. For more information about both options and for details about configuring them, refer to Safes and Safe members, or Use Object Level Access Control in Safes.

Create logon accounts for the user provisioning account

A logon account can be used to enable the Provisioning account to log on to machines that do not permit direct logon  and create ad-hoc users. When a logon account is associated with a Provisioning account, it is used to log on to the remote machine and then elevates itself to the role of the provisioning user.

 

A logon account can be either a regular account or an SSH Key account. However, if a logon account is used, the provisioning account must be a password account.

For more information, refer to Connection Component Configuration.

Synchronize groups with Vault groups

During user provisioning, Vault users are added to all groups on the target machine that have corresponding groups in the Vault to which they belong. Corresponding groups in the Vault must have the same name as the group on the target machine, with ADB_ as a prefix. Groups that do not exist on the target machine will not be created.

For example, a user called David belongs to ADB_Group1 in the Vault. On the target machine there is a group called “Group1” to which David will be added when his user is provisioned. If “Group1” does not exist on the target machine, David’s user will be created but he will not be allocated to a corresponding group.

In the Vault, create user groups that correspond to the user groups in the Active Directory, with an ADB_ prefix. For more information about creating user groups in the Vault, refer to Manage groups.

Verify SFTP on the target machine

SFTP must be enabled on the remote target UNIX machine. It is usually enabled by default. This can be verified in the main sshd configuration file, /etc/ssh/sshd_config, on the remote target UNIX machine.

Set the default shell

When a user logs on to the target machine for the first time, their user is provisioned automatically with a predefined default shell.

To set the default shell:

  1. On the remote target UNIX machine, open the /etc/default/useradd file.
  2. Define the default shell that determines how new users will be provisioned.

Manage users’ UID

You can manage UIDs through Active Directory or through AD Bridge for all users who use AD Bridge to log on to remote UNIX machines.

  • To manage UIDs through Active Directory, set SyncUnixAttributes and ADBridgeManageUID to Yes.

    If a user does not have a UID in Active Directory, AD Bridge will assign a new UID to the user when the user connects for the first time through AD Bridge. If this user already has a UID on the target, AD Bridge will assign this existing UID to the user. The UID assigned by AD Bridge will be used in all subsequent connections by this user through AD Bridge.

  • To manage UIDs through AD Bridge, set SyncUnixAttributes to No and ADBridgeManageUID to Yes.

    AD Bridge will assign a new UID to the user when the user connects for the first time through AD Bridge. If this user already has a UID on the target, AD Bridge will assign this existing UID to the user. The UID assigned by AD Bridge will be used in all subsequent connections by this user through AD Bridge.

  • To let the target machine OS assign UIDs to provisioned users, set ADBridgeManageUID to No.
 

When assigning UIDs to users in the Active Directory, you must give each user a unique UID to avoid UID conflicts.

This is also important when working in an environment with multiple domains.

Customize AD Bridge scripts

The AD Bridge provisioning and deprovisioning scripts enable you to customize provisioning and deprovisioning processes according to your enterprise standards. You can customize scripts for existing platforms and you can also create new scripts for platforms that PAM - Self-Hosted does not store out of the box.

During installation, the following safes are created to store the provisioning and deprovisioning scripts:

The following diagram shows the process of customizing provisioning and deprovisioning steps:

Customize user profiles

You can customize user profiles for users who are automatically provisioned by PSM for SSH-AD Bridge. This enables you to assign a single shell configuration file to customize the user when it is created, such as user profile attributes, environment variables, etc.

You create your own profile configuration files and store them in the PSMPADBUserProfile safe, which is configured for Object Level Access Control. When the PSM for SSH-ADBridge provisions users, it checks this safe for a profile configuration file that is relevant to the user being provisioned and, if it finds one, it provisions the user with the customizations defined in the file.

To customize user profile scripts, users require the following permissions in the PSMPADBUserProfile safe:

List Files
Rename Files
Retrieve Files
Delete Files
Create Files
View Owners
Update Files
Manage safe Owners