Adb Integration Guide
Adb Integration Guide
Adb Integration Guide
Integration Guide
©2003-2022 BeyondTrust Corporation. All Rights Reserved. Other trademarks identified on this page are owned by their respective owners. BeyondTrust is not a chartered bank or trust company, or TC:5/18/2022
depository institution. It is not authorized to accept deposits or trust accounts and is not licensed or regulated by any state or federal banking authority.
AD BRIDGE
INTEGRATION GUIDE
Table of Contents
Introduction to the AD Bridge Integration Guide 3
Standard Integrations with AD Bridge 4
NFS Integration for Systems Administrators 5
Requirements 5
Server Setup 5
Client Setup - CentOS 6 6
Client Setup - CentOS 7 6
Samba Integration for Systems Administrators 7
Requirements 7
Install Files 7
Upgrade 8
Configure Samba on a Linux or Unix Computer 8
Troubleshoot the Samba Integration 9
Configure Aliases in Samba Tips 11
Configure AD Bridge and Apache for SSO 12
Prerequisites 12
Configure Apache HTTP Server for SSO on RHEL 12
Configure a Microsoft Browser for SSO 15
Troubleshoot Single Sign-on and Kerberos Authentication 17
Requirements
The following prerequisites must be in place:
l Root access to the Linux or Unix file server where you want to run Samba and AD Bridge Enterprise.
l AD Bridge Enterprise
l DNS capable of resolving FQDN of the NFS server and clients
l The Linux or Unix computer must be connected to Active Directory with AD Bridge.
For instructions on how to join a domain, please see the AD Bridge Installation Guide at www.beyondtrust.com/docs/ad-
bridge/getting-started/installation.
Server Setup
1. Install AD Bridge 8.5.5 (or later).
2. Add NFS Service Principal Name(SPN) to the machine. This step should be done before we join the domain to make sure the right
SPNs are added to the machine account and the keytab file. If the system is already joined you need to run the domainjoin again
after the new ServicePrincipalName is set: /opt/pbis/bin/config ServicePrincipalName "host" "nfs".
3. Join the domain: domainjoin-cli join pbisdemo.com Administrator.
4. Check keytab file content for SPNs: /opt/pbis/bin/klist -e -k /etc/krb5.keytab. Look for:
4 nfs/[email protected]
4 nfs/[email protected]
4 nfs/[email protected]
4 nfs/[email protected]
/export/data/test *(rw,sec=sys:krb5:krb5i:krb5p,sync,nohide)
/export/data/department *(rw,sec=sys:krb5:krb5i:krb5p,sync,nohide)
vim /etc/auto.test
* -fstype=nfs4,rw,sec=krb5,intr,hard,exec,insecure,no_subtree_check,wsize=4096,rsize=4096
rhel7.pbisdemo.com:/export/data/&
Now each user should have a krb5 ticket to access the shares when they authenticate. If you su to a user as root you need to run kinit to
generate that users own krb5 ticket.
vim /etc/auto.test
* -fstype=nfs4,rw,sec=krb5,intr,hard,exec,insecure,no_subtree_check,wsize=4096,rsize=4096
rhel7.pbisdemo.com:/export/data/&
Note: Always use FQDNs when mounting NFS shares for SPNs to match the keytab entries.
Note: Autofs is not needed; it is provided as a use case. Manual mount example:
For information about installing and configuring Samba, please see the Samba documentation at
https://www.samba.org/samba/docs/.
Requirements
The following prerequisites must be in place:
l Root access to the Linux or Unix file server where you want to run Samba and AD Bridge Enterprise.
l AD Bridge Enterprise 6.0.8330 or later.
l The Linux or Unix computer must be connected to Active Directory with AD Bridge.
l Samba 3.6 or later.
l Samba 4.x support requires AD Bridge 8.5.2 or later.
l Samba package must support ADS security. AD Bridge relies on ADS security in a Samba and AD Bridge configuration.
l Samba 4.10 and later, run the following commands:
/opt/pbis/bin/samba-interop-install --uninstall
/opt/pbis/bin/samba-interop-install --install
Install Files
AD Bridge includes a tool to install the files necessary to use Samba: /opt/pbis/bin/samba-interop-install –install.
Run the tool with the install option:
Upgrade
If any of the following occur then it is recommended to reinstall the samba-interop tool. This is to correct any synchronization that might
have been broken.
l Samba is updated
l Operating system is updated
l AD Bridge is upgraded
l Joining a new domain
l Rejoining your existing domain
[global]
security = ADS
workgroup = DEMO
realm = DEMO.COM
machine password timeout = 0
The ADS value for the security setting is required. Replace the values of workgroup and realm with the values for the network. The
workgroup is the computer's NetBIOS domain name. The realm is the computer's Active Directory domain.
Note: If the machine password option is not added to the smb.conf and set to 0, Samba will change the machine account
password without notifying the AD Bridge authentication service, leaving AD Bridge unable to connect to the domain.
2. If an alternate hostname is used, then set that hostname as the NetBIOS name: netbios name = CENTOS-TEST.
3. Create a new section to define a shared resource and constrain access to the Active Directory group pbis_group. Limit write
access to pbisadmin:
[testshare]
comment = This is a test share
path = /share
valid users = +DEMO\pbis_group
write list = DEMO\pbisadmin
4. Run the testparm command to make sure smb.conf contains no syntax errors.
5. Make sure the path exists and permissions for the share are set:
mkdir /share
chmod 750 /share
chown DEMO\\pbisadmin:DEMO\\pbis_group /share
The computer is now ready to access the share from a Windows computer and log on with an Active Directory account.
Home Shares
[homes]
comment = Home Directory of User %U in Domain %D
path = /home/%D/%U
browseable = no
create mask = 640
directory mask = 0750
valid users = %U
Debug
To help troubleshoot, turn on Samba logging by adding the following settings to the global section of the Samba configuration file,
smb.conf:
[global]
...
#Debugging settings:
log level = 10
debug pid = true
log file = /var/log/samba/smbd.log
max log size = 50 # max 50KB per log file, then rotate
If there is an issue, manually compare the machine password that is stored in secrets.tdb (location varies across the Linux distributions)
with the machine password that is used by AD Bridge.
Use tdbtool to check the machine password in secrets.tdb:
# cd /var/lib/samba/private/; ls
msg.sock passdb.tdb secrets.ldb secrets.tdb
# tdbtool
tdb> open secrets.tdb
tdb> dump
Make sure that the SAM account name exactly matches the first component of the UPN used Samba, as shown in the following examples.
2. Compare the SAM account name with the first component of the UPN used by Samba in the logs:
If the SAM account name and the first component of the UPN do not match, resolve the mismatch by doing the following:
If you get an error in the log that looks something like the following entries (the time stamps and the machine name have been removed),
you must add the machine password timeout option to the global section of smb.conf and set it to 0 to integrate AD Bridge with Samba:
lsassd[1722]: 0x7fafc3ff7700:Error:
Failed to refresh machine TGT [Error code: 40022]
lsassd[1722]: 0x7fafc3ff7700:Error:
Failed to refresh machine TGT [Error code: 40022]
Note: If the machine password option is not added to the smb.conf and set to 0, Samba will change the machine account
password without notifying the AD Bridge authentication service, leaving AD Bridge unable to connect to the domain.
With Samba 3.0.25, you can use the non-SAM account aliases of AD Bridge Enterprise by including a user name map:
To make an alias for an Active Directory group, use the form !alias = @DOMAIN\group. The exclamation point triggers Samba to stop
processing on the first matching alias, preventing issues with multiple alias matches from wildcards.
For more information about how to add users to a user name map, please see the Samba documentation .
Prerequisites
l AD Bridge Enterprise installed on the Linux computer running your Apache HTTP Server
l The Apache module ships with the AD Bridge Enterprise agent and is located in either /opt/pbis/lib64/ or /opt/pbis/lib/
l The Linux or Unix computer that is hosting the Apache web server is joined to Active Directory
l An Apache HTTP Server 2.0, 2.2, or 2.4 that supports dynamically loaded modules
To check whether your Apache web server supports dynamically loaded modules, execute the following command and verify that mod_
so.c appears in the list of compiled modules: /usr/sbin/httpd -l or /usr/sbin/apache2 -1.
Compiled in modules:
core.c
prefork.c
http_core.c
mod_so.c
For Apache installations that are compiled from the source code, make sure that --enable-module=so is specified when ./configure is
executed: ./configure --enable-module=so.
IMPORTANT!
Configuring web servers is complex. Implement and test your configuration in a test environment first. Before you change your web
server's configuration:
1. Determine whether your Apache server is 2.0, 2.2 or 2.4 by running one of the following commands:
l /usr/sbin httpd -v
l /usr/sbin/apache2 -1
Example:
2. Edit the Apache configuration file to add a directive to load the AD Bridge Enterprise auth_kerb_module for your version of
Apache. Use one of the following:
l
/etc/httpd/conf/httpd.conf
l
/etc/apache2/apache2.conf
Since this Red Hat computer is running Apache 2.4.6, the 2.4 version of the module is added, as demonstrated in the following
example output.
Example:
Example:
<Directory "/var/www/html/secure">
Options Indexes MultiViews FollowSymLinks
Order deny,allow
Deny from all
Allow from 192.0.0.0/8
AuthType Kerberos
AuthName "Kerberos Login"
KrbAuthRealms EXAMPLE.COM
krb5Keytab /etc/httpd/httpd.keytab
AllowOverride None
Require valid-user
</Directory>
4. Restart the web server, using the appropriate command for your Apache version:
Tip: You can require that a user be a member of a security group to access the Apache web server by replacing Require
valid-user with Require unix-group name-of-your-group, as shown in the example below. To control group access by
requiring group membership, however, you must first install and load mod_authz_unixgroup. For instructions on how to set
up mod_authz_unixgroup, see https://github.com/DRN88/mod_authz_unixgroup.
<Directory "/var/www/html/secure">
Options Indexes MultiViews FollowSymLinks
Order deny,allow
Deny from all
Allow from 192.0.0.0/8
AuthType Kerberos
AuthName "Kerberos Login"
KrbAuthRealms EXAMPLE.COM
Krb5Keytab /etc/httpd/httpd.keytab
AllowOverride None
Require unix-group example\linuxusers
</Directory>
For instructions on configuring your web server for SSL, please see the Apache HTTP Server documentation at
https://httpd.apache.org/docs/current/.
IMPORTANT!
If SSO fails and you have not turned on SSL, your server will prompt you for an ID and password, which will be sent in clear text. SSL
encrypts all data that passes between the client browser and the web server. SSL can also perform Basic Authentication securely,
providing a fallback mechanism if Kerberos authentication fails. Using SSL is especially important if the protected website also needs
to be accessible from outside the corporate network. For more information, please see
http://modauthkerb.sourceforge.net/configure.html.
In Active Directory, create a user account for the Apache web server in the same OU (or Cell, with AD Bridge Enterprise) to which the
Linux computer hosting the web server is joined. Set the password of the user account to never expire. In the examples that follow, the
user account for the Apache web server is named httpUser.
On the domain controller, create an RC4-HMAC keytab for the Apache web server using Microsoft's ktpass utility. The keytab that you
must create can vary by Windows version.
Example:
1. Use secure FTP or another method to transfer the keytab file to the Linux computer that hosts your Apache web server and copy
the file to the location specified in your <Directory> configuration in httpd.conf. For example, using the configuration shown in
Step 3 above, copy the keytab file to /etc/apache2/http.ktb.
2. Set the permissions of the keytab file to be readable by the ID under which the Apache web server runs and no one else.
IMPORTANT!
The Kerberos keytab file is necessary to authenticate incoming requests. It contains an encrypted, local copy of the host’s key and, if
compromised, might allow unrestricted access to the host computer. It is therefore crucial to protect it with file-access permissions.
7. Return to the Security tab for Internet Options and set your web server as a trusted site.
8. Restart the browser.
The location of the Apache error logs is specified in the Apache configuration file under the ErrorLog directive. The default value is,
depending on your Apache version, one of the following:
l /var/log/httpd/
l /var/log/apache2/
Klist Utility
You can use the klist utility in /opt/pbis/bin/klist to check the Kerberos keytab file on a Linux or Unix computer. The command shows all
the service principal tickets contained in the keytab file so you can verify that the correct service principal names appear.
Confirm that HTTP/[email protected] and HTTP/[email protected] appear in the list. It is normal to see
multiple entries for the same name.
Example:
$ /opt/pbis/bin/klist -k /etc/httpd/httpd.ktb
Keytab name: WRFILE:/etc/httpd/httpd.ktb
KVNO Principal
---- --------------------------------------------------------------------------
5 HTTP/[email protected]
If your service principal names are incorrect, generate a new Kerberos keytab file.
Tip: Because you cannot store credentials for more than one principal in a Kerberos credentials cache at a time, you must
maintain two or more credential caches by using the KRB5CCNAME environment variable and then switch to the cache that
you want to use. To use an alternate Kerberos cache with AD Bridge Enterprise, for example, you could execute the following
sequence of commands as root:
Klist can be used on the current user to verify that they receive a service ticket for HTTP.
Run Klist on Linux and UNIX systems running AD Bridge or on Windows from the command prompt.
Linux klist:
apacheuser@rhel7:/home/apacheuser$ /opt/pbis/bin/klist
Ticket cache: FILE:/tmp/krb5cc_2066220575
Default principal: [email protected]
Valid starting Expires Service principal
04/05/17 11:46:28 04/05/17 21:46:28
krbtgt/[email protected]
renew until 04/05/17 23:46:28
04/05/17 11:46:28 04/05/17 21:46:28
host/[email protected]
renew until 04/05/17 23:46:28
04/05/17 11:46:28 04/05/17 21:46:28 ldap/[email protected]
renew until 04/05/17 23:46:28
04/05/17 11:46:28 04/05/17 21:46:28 HTTP/[email protected]
renew until 04/05/17 23:46:28
Windows klist:
C:\>klist
Current LogonId is 0:0x816aded2
Cached Tickets: (5)
#0> Client: apacheuser @ EXAMPLE.COM
Server: krbtgt/EXAMPLE.COM @ EXAMPLE.COM
KerbTicket Encryption Type: AES-256-CTS-HMAC-SHA1-96
Ticket Flags 0x60a00000 -> forwardable forwarded renewable pre_authent
Start Time: 4/5/2017 9:09:52 (local)
End Time: 4/5/2017 19:09:52 (local)
Renew Time: 4/12/2017 9:09:52 (local)
Session Key Type: AES-256-CTS-HMAC-SHA1-96
Cache Flags: 0x2 -> DELEGATION
Kdc Called: dc1.example.com
#1> Client: apacheuser @ EXAMPLE.COM
Server: krbtgt/EXAMPLE.COM @ EXAMPLE.COM
KerbTicket Encryption Type: AES-256-CTS-HMAC-SHA1-96
Ticket Flags 0x40e00000 -> forwardable renewable initial pre_authent
Start Time: 4/5/2017 9:09:52 (local)
End Time: 4/5/2017 19:09:52 (local)
Renew Time: 4/12/2017 9:09:52 (local)
Session Key Type: AES-256-CTS-HMAC-SHA1-96
Cache Flags: 0x1 -> PRIMARY
Kdc Called: dc1.example.com
#2> Client: apacheuser @ EXAMPLE.COM
Authentication problems can be difficult to diagnose. First, check all the configuration parameters, including the validity of the keytab file.
Second, review the common problems in the following table.
Problem Solution
The system's clock is out of The Kerberos standard requires that system clocks be no more than 5 minutes apart. Make sure that
sync. the system clocks on the Active Directory domain controller, the Linux or Unix web server, and the
client are synchronized.
The user accessing the website If the Kerberos ticket was obtained on the client or the user correctly entered his credentials during
is not on the require list. the Basic Authentication prompt, it might be because authentication worked but the authorization
failed. If so, the Apache error_log will contain a line like this:
Problem Solution
The user accessing the website If the client user is logged on a domain different from the domain of the web server, one of two things
is logged on the wrong domain. will happen:
1. If the KrbMethodK5Passwd directive is set to on, or was not specified and thus defaults to
on, the user will be prompted for credentials.
2. If KrbMethodK5Passwd is set to off, authentication will fail and the Authorization Required
page will be displayed.
Internet Explorer does not This problem commonly occurs when the website is accessed by using a URL that includes the full
consider the URL to be part of domain name, such as https://myserver.example.com. Internet Explorer tries to obtain Kerberos
the Local Intranet zone or the tickets only for websites that are in the Local Intranet zone.
Trusted sites.
Try to access the website by using only the server name, for example https://myserver.
Or, you can add the URL to a list of Local Intranet sites or the trusted sites by changing your options in
Internet Explorer.
The service principal name of Although this problem is rare, it is difficult to diagnose because the error messages are vague. The
the website is mapped to more problem can occur after the ktpass utility was used repeatedly to generate a Kerberos keytab file for
than one object in the Active the web server.
Directory.
To check for this problem, log on your Active Directory domain controller and open the Event Viewer.
Look for an event of type=Error, source=KDC, and event ID=11. The text of the event will be similar
to the message below:
There are multiple accounts with name HTTP/myserver.example.com of type DS_SERVICE_
PRINCIPAL_NAME.
To fix the problem, find the computer or user objects that were used to map the service principal name
in Active Directory and then use the ADSI Edit to manually remove the
HTTP/myserver.example.com string from the servicePrincipalName object property.
Below the table is a screen shot that provides an example of how to find an object named HTTP by
using LDAP.
Because some operating systems, such as the 64-bit version of Red Hat Enterprise Linux 5, use an outdated version of /lib/libcom_
err.so, the AD Bridge Enterprise authentication agent cannot the locate the proper system library, leading to an error that looks like this:
Solution: Force the httpd daemon to use the AD Bridge Enterprise krb5 libraries by opening the startup script for the Apache HTTP
Server: /etc/init.d/httpd Additionally, add the path to the AD Bridge Enterprise Kerberos libraries on the line that starts Apache. The line
that starts the daemon can vary by operating system. Example on a 64-bit system: LD_LIBRARY_PATH=/opt/pbis/lib64
LANG=$HTTPD_LANG daemon $httpd $OPTIONS
Note: This modification changes the version of the Kerberos libraries that are used by the Apache HTTP Server. The change
might result in compatibility issues with other modules of Apache that use Kerberos.
To configure SSH:
2. Either use lsof to find out which configuration file it is reading or start it up with debugging to figure out the default path.
Example:
3. Verify that UsePAM is enabled in the config file. As a best practice, make a backup copy of the configuration file before you
change it.
4. Run ldd on sshd to make sure it links with libpam.
Logging onto a system with keys does not provide that system with the means of getting a PAC from the domain controller. Without a PAC
there is no group membership information for the user. Automated Kerberos ticket renewal will also be unavailable. So, when the ssh login
hits the login restrictions in the account phase as it tests for the group memberships, it will not find the user's group information, causing an
ssh error like this:
A workaround is to have each user log in once with a password. Subsequent logins with keys should work until the AD cache is flushed,
after which the user will have to log in again.
Although AD Bridge Enterprise automatically configures OpenSSH to support SSO through Kerberos using GSSAPI, it is worthwhile to
review how AD Bridge Enterprise does. Since you might need to configure or troubleshoot other applications for SSO, understanding the
process will make it easier to apply the technique to other applications.
Note: Not all versions of OpenSSH support Kerberos. Versions older than 4.2p1 might not work or might work improperly.
The first thing that needs to be considered is the Kerberos service principal name (SPN) used by ssh and sshd. The SPN is a string that
identifies the service for which an authentication ticket is to be generated. In the case of ssh, the SPN has the form:
host/<server name>@<REALMNAME>
For example, when a user uses ssh to connect to a computer named fozzie.mycorp.com, the ssh program requests a service ticket for
the SPN:
host/[email protected]
In order for Microsoft Active Directory to generate a Kerberos ticket for this SPN, a service account must exist for it. Additionally, a keytab
must be created for the service account and placed on the sshd server. AD Bridge Enterprise completely automates this operation. When
a Linux or Unix computer is joined to AD, a machine account is created for the computer. If the computer is called fozzie, a machine
account called fozzie$ is created in AD. AD Bridge Enterprise then automatically creates a keytab for the SPN and places it in the
standard system location (typically, /etc/krb5.keytab).
When the user runs the ssh program and OpenSSH determines that it will use Kerberos authentication, it will need to access a keytab for
the user so that it can obtain a service ticket for the service or computer to which it is trying to connect. This keytab must be created using
the user's account name and password. Manually, this can be performed by using the kinit utility. AD Bridge Enterprise, however, does it
automatically when the user logs on the computer. On most systems, the user keytab is placed in the /tmp directory and named krb5cc_
UID where UID is the numeric user ID assigned by the system.
Configure OpenSSH
AD Bridge Enterprise automatically configures OpenSSH at both the client and server computer. On the client, the ssh_config file
(typically in /etc/ssh/ssh_config) is modified. On the server, ssh_config (typically in /etc/ssh/ssh_config) is modified. AD
Bridge Enterprise adds the following lines of code to the right files if they are not already present and if they are required by the system's
version of sshd:
In the server, the following lines must be present in sshd_config. if you are troubleshooting, make sure these lines are there:
GSSAPIAuthentication yes
GSSAPICleanupCredentials yes
GSSAPIAuthentication yes
On the client, GSSAPIDelegateCredentials yes is an optional setting that instructs the ssh client to delegate the krb5 TGT to the
destination machine when SSH single sign-on is used.
In addition, if any of the following options are valid for the system's version of sshd, they are required and configured by AD
Bridge Enterprise:
ChallengeResponseAuthentication yes
UsePAM yes
PAMAuthenticationViaKBDInt yes
KbdInteractiveAuthentication yes
Setting these options to yes instructs ssh to use the kbdinteractive ssh authentication mechanism and allows that mechanism to use
PAM, settings that are required for AD Bridge Enterprise to function properly.
For more information, see the man pages for ssh, sshd, and the comments in the ssh and sshd configuration files.
Test SSO
With OpenSSH properly configured, demonstrating SSO support is simple: Log on a Linux or Unix machine running AD Bridge Enterprise
by using your Active Directory credentials and then use ssh to connect to another machine that is also running AD Bridge Enterprise.
OpenSSH should establish a connection without prompting for a username or password.
Note: AD Bridge Enterprise 8.5.3 or later. ActiviIdentity's 32-bit driver ActiveClient is no longer installed.
l Linux computers (64-bit) need a 3rd party Smart Card driver installed. For example, OpenSC provides support for PIV II Smart
Cards.
The AD Bridge Enterprise Smart Card service supports 64-bit versions of Red Hat Enterprise Linux 6.x or later.
To check the version of your Red Hat computer: cat /etc/redhat-release.
Example:
On 64-bit systems, you must install a 3rd party Smart Card driver and Smart Card reader. OpenSC provides opensc-tool and pkcs11-
tool and a PCSC daemon.
To install AD Bridge Enterprise to support Smart Cards, you must include the smartcard option when you run the installer. If AD
Bridge Enterprise is already installed, run the installer again with the smartcard option.
Replace x.x.x.xxxx with the version and build number indicated in the installer file name: ./pbis-enterprise-x.x.x.xxxx.linux.x86_
64.rpm.sh -- --smartcard install
If OpenSC is used, it is recommended that the following two commands are used to verify the Smart Card reader is installed correctly and
certificates on the Smart Card can be read:
AD Bridge Enterprise depends on the presence of a package, pcsc-lite. To confirm the package is installed, run the following command:
rpm -q pcsc-lite.
Example:
When this initial configuration is in place, you are ready to install AD Bridge Enterprise on your Linux computer and add the computer to
Active Directory.
For information on installing the AD Bridge Enterprise agent and joining a domain, please see the AD Bridge Enterprise
Installation Guide at www.beyondtrust.com/docs/ad-bridge/getting-started/installation.
Using the config tool's ModuleSearchList option, set the registry with the directory location of the third party pkcs11 library. Lwpkcs11d
will reference the registry to determine which library to load. Currently three locations are hardcoded in lwpkcs11 daemon.
Troubleshoot
The following section provides information on troubleshooting the card and reader. Verify:
Install OpenSC
OpenSC provides a PCSC driver and several command line tools like opensc-tool and pkcs11-tool. Restart the server after you install
OpensSC: yum install opensc.
Run the following command. The Smart Card reader should be listed: lsusb.
Example:
Bus 002 Device 005: ID 058f:9540 Alcor Micro Corp. AU9540 Smartcard Reader
OpenSC Commands
# opensc-tool --list-readers
# Detected readers (pcsc)
Nr. Card Features Name
0 Yes Alcor Micro AU9540 00 00
# opensc-tool --reader 0 --name -v
Connecting to card in reader Alcor Micro AU9540 00 00...
Using card driver PIV-II for multiple cards.
Card name: PIV-II card
PKCS 11 commands
It is preferred that the enrolled certificate is in slot ID 1. If not, reference the enrollment workstation and ensure the enrolled certificate is
mapped to PivCert9A. See above.
lwpkcs11
lwsc
l Restart the AD Bridge Enterprise server after installing AD Bridge Enterprise with the --smartcard option.
l Increase the log level on lsass and identify issues in logs.
Note: The following instructions assume that Password Safe is successfully installed.
For more information about configuration, refer to the Password Safe Administration Guide at
https://www.beyondtrust.com/docs/beyondinsight-password-safe/ps/index.htm.
1. In the BeyondInsight management console, go to the Users & Groups configuration page.
2. Create a group.
3. Set permissions and select at least one Smart Rule.
4. Check the Enable Application API box, and then check the box for the application (created in "Configure the API" on page 29).
5. After the group is created, create a user account. Create a user name that will easily identify the user (for example, apiuser).
l The managed account must be the same as the account in Active Directory.
l The account will be used for the domain join. This user must have permissions to complete a domain join on a Linux/Unix agent.
l On the Managed Account Settings page, the user needs the Enable for API access box checked.
l The domain information needs to be populated for the domain you want to join.
Option 1
If the API key created does not require the user to have a certificate, then a user name and password combination can be used in the
djpbp.config.template. This can be done by defining the API user and password and leaving the Certificate section commented out.
Sample djpbps.config.template:
[Version]
Template = 1 # Do not modify.
[DomainJoin]
# User account to use for domain join. In addition, this account must
# also be a managed account in Password Safe with API access enabled.
DomainJoinUser = ' '
[PasswordSafe]
# Password Safe URL
ServerUrl = 'https://0.0.0.0.' # eg. https://server-name
# From Password Safe web console Configuration->Users & Groups->User Group.
# Check box "Enable Application API"
RunAsUser = ''
# Optional. Needed if Password Safe web console shows "User Password Required"
# is checked in Configuration->API Registration. Uncomment if required.
#RunAsUserPassword = ''
# From Password Safe web console Configuration->API Registration->Key
ApiKey = ' ' #eg.
4b2c430dbe2b6aff66b016cc8e11b0f78b4d7cc426d3fd4c53c92a261226fbe8ce8f0b5f42974789210420196c6539135
c492834123c93ed6f7d53023dfa9a4a'
# Minutes PBPS credential is valid until it expires.
# Optional. Valid range is between 1 and 10079 inclusive.
# Default is 1 minute. Uncomment if required.
#DurationMinutes = 1
# Client Certificate.
# Optional. Needed if Password Safe web console shows "Client Certificate
# Required" is checked in Configuration->API Registration.
Option 2
Certificates can be exported from the U-Series Appliance appliance Maintenance page.
To export a certificate:
1. Log on to the U-Series Appliance appliance Maintenance page URL (for example, PasswordSafe_URL/Maintenance).
2. Select Security Settings from the menu.
3. Select Export Client Certificate.
To expedite support, collect the following information to provide to BeyondTrust Technical Support:
l AD Bridge Enterprise version: available in the AD Bridge Enterprise Console by clicking Help > About on the menu bar
l AD Bridge Enterprise Agent version and build number
l Linux or Unix version
l Windows or Windows Server version
If you are contacting BeyondTrust Technical Support about one of the following problems, also provide the diagnostic information
specified.
Segmentation Faults
ulimit - c unlimited
Program Freezes
l Debug logs
l tcpdump
l An strace of the program
Domain-Join Errors
l Run /opt/pbis/bin/get-status
l Contents of nsswitch.conf
l Output of id <user>
l Output of su -c 'su <user>' <user>
l lsass debug logs
For more information, please see Generate Debug Logs in the AD Bridge Troubleshooting Guide at
www.beyondtrust.com/docs/ad-bridge/how-to/troubleshoot.
l Contents of pam.d/pam.conf
l The sshd and ssh debug logs and syslog
l Output of id <user>
l The lsass debug log
l Copy of lsass cache file.
For more information about the file name and location of the cache files, please see the AD Bridge Linux Administration Guide
at www.beyondtrust.com/docs/ad-bridge/getting-started/linux-admin.
l tcpdump
The AD Bridge support script will copy system files that AD Bridge needs to function into an archive. This archive can then be sent to
support to assist in the investigation.
Installed location:
/opt/pbis/libexec/pbis-support.pl