For full Safeguard Authentication Services functionality on Unix, you must join the Unix system on which you installed the Safeguard Authentication Services agent to the Active Directory domain. You can join an Active Directory domain either by running vastool join from the command line or the interactive join script, vasjoin.sh.
Before you join the Unix host to the Active Directory domain, you may want to determine if you are already joined.
To determine if you are joined to an Active Directory domain
# /opt/quest/bin/vastool info domain
If you are joined to a valid domain this command returns the domain name. If you are not joined to a domain, you will see the following error:
ERROR: No domain could be found. ERROR: VAS_ERR_CONFIG: at ctx.c:414 in _ctx_init_default_realm default_realm not configured in vas.conf. Computer may not be joined to domain
You can join your Unix host to Active Directory with the vastool join command directly from the command line.
Before you join the Safeguard Authentication Services agent to the Active Directory domain, collect the following information:
To join Active Directory using vastool join
# /opt/quest/bin/vastool -u <user> join <domain-name>
The vastool join results are shown on the shell’s standard output.
Note: vastool join supports many options that allow you to customize the way the computer is joined to the domain. You can specify the name of the computer object. You can join to a specific organizational unit or use a pre-created computer object. For a list of all vastool join options, refer to the vastool man page.
Using the vastool join command with the --autogen-posix-attrs option allows any user in Active Directory to authenticate to an Safeguard Authentication Services host. If a user is not Unix-enabled (meaning it does not have the uidnumber, gidnumber, gecos, home-directory, and login-shell attributes assigned in Active Directory), the Safeguard Authentication Services daemon automatically assigns those attributes for the user when it looks the user up by means of an LDAP search at the point of login.
This feature provides for the deployment of Safeguard Authentication Services in scenarios where the Unix provisioning of users is not desirable (for example, insufficient rights in Active Directory, not wanting to extend the schema, and so on). It stores each identity locally on the Unix host, not in Active Directory. It generates the uidnumber and gidnumber by an algorithm based on the Active Directory object's globally unique identifier (GUID), so it should yield the same value on every host (unless there happens to be a uid/gid conflict). You can configure the home directory prefix and the login shell per host.
An Administrator can use a Windows Offline Domain Join (ODJ) credential instead of a keytab for scripting an unattended installation of Safeguard Authentication Services to enhance security.
There must be connectivity from the Unix machine to domain controllers. When using this method of joining AD, the [domain] is not needed on the vastool join command, nor credentials. That information will come from the file. More information is in the vastool man page.
The join can work in the following ways:
To join with Windows Offline Domain Join (ODJ) credential
The option is -j <file>. The variable is AUTHENTICATION_SERVICES_DJOIN_FILE, so for example:
export AUTHENTICATION_SERVICES_DJOIN_FILE=/tmp/host.djoin.out
The file is /tmp/AUTHENTICATION_SERVICES_DJOIN.
During package installation, if AUTH_SERVICES_DJOIN_FILE is set to a valid file or /tmp/AUTHENTICATION_SERVICES_DJOIN is a valid file, the package install script will attempt to join Active Directory with the file’s information, and the output will be in ./tmp/AUTHENTICATION_SERVICES_DJOIN.join.out.
More information is in the vastool man page.
vastool join can use a djoin file generated from Window's djoin.exe. There are three ways to pass the file to vastool:
These options are checked in order. When using -j, the domain_name and server should not be set. If either are set, options 2 and 3 above are not checked.
Also, the options -n and -c are not supported, that information is read from the join file. -f is automatically set to use the pre-existing object.
During the join the credentials in the join file are used, and -u -w and -k from vastool are ignored.
This method is similar to the above "join itself", without the security risk as long as the djoin.exe /DEFPW flag isn't used.
© 2024 One Identity LLC. ALL RIGHTS RESERVED. Términos de uso Privacidad Cookie Preference Center