Sssd experts,

We have an app that’s having AD users connect to their app -- users that
don’t have UIDs and GIDs stored in AD.  They’re allowing these remote
connections for DB queries and our cybersecurity team wants to see the
username/ip addresses from which these queries originate.

That is, the app team has this.  In /etc/pam.d/krb5 file:



auth sufficient /usr/lib64/security/pam_krb5.so no_user_check realm=
APAC.COMPANY.COM try_first_pass
auth sufficient /usr/lib64/security/pam_krb5.so no_user_check realm=
EMEA.COMPANY.COM try_first_pass
auth sufficient /usr/lib64/security/pam_krb5.so no_user_check realm=
AMER.COMPANY.COM use_first_pass


Our company has 3 regional AD domains.  AMER, EMEA, APAC.


Here’s the logs from /var/log/secure.  Cybersecurity is happy with these
logs, because they give the incoming AD account and the remote IP address.


Nov 19 07:17:26 cepnlmemf01 memsqld[159234]: pam_krb5(krb5:auth): unknown
option no_user_check

Nov 19 07:17:26 cepnlmemf01 memsqld[159234]: pam_krb5(krb5:auth):
authentication failure; logname=karunakanti_chiranje uid=7202893
euid=7202893 tty= ruser= rhost=10.107.18.78

Nov 19 07:17:26 cepnlmemf01 memsqld[159234]: pam_krb5(krb5:auth): unknown
option no_user_check

Nov 19 07:17:26 cepnlmemf01 memsqld[159234]: pam_krb5(krb5:auth):
authentication failure; logname=karunakanti_chiranje uid=7202893
euid=7202893 tty= ruser= rhost=10.107.18.78

Nov 19 07:17:26 cepnlmemf01 memsqld[159234]: pam_krb5(krb5:auth): unknown
option no_user_check

Nov 19 07:17:26 cepnlmemf01 memsqld[159234]: pam_krb5(krb5:auth): user
karunakanti_chiranje authenticated as karunakanti_chira...@amer.company.com

Nov 19 07:17:26 cepnlmemf01 memsqld[159234]: pam_krb5(krb5:account):
unknown option no_user_check



This approach is functional, but has several drawbacks.

1.      If the incoming user is in AMER, this login will fail twice (APAC,
EMEA), then finally succeed for u...@amer.company.com

2.      Pam_krb5 has no caching, so every DB query results in hitting the
AD domain controllers.  (Multiple times, if user in EMEA or AMER).



We’re using pam_sss successfully for ssh logins.  It works great!  With the
caveat that all AD users and groups have to have a UID and GID.  Otherwise
the AD user cannot login via ssh.  They have to be realm permitted also
(usually by group).


Can the above pam file be replaced by similar pam_sss.so invocations?
I.e., at which PAM phase is the UID and GID required?  Is it required in
the auth phase?  Account phase?  Or only in the session phase?



Spike
-- 
_______________________________________________
sssd-users mailing list -- sssd-users@lists.fedorahosted.org
To unsubscribe send an email to sssd-users-le...@lists.fedorahosted.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedorahosted.org/archives/list/sssd-users@lists.fedorahosted.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue

Reply via email to