Chat now with support
Chat with Support

Safeguard Authentication Services 4.2 - Mac OS X/macOS Administration Guide

One Identity Privileged Access Suite for Unix Installation The Authentication Services Mac OS X components Configuring the Authentication Services client Special Mac OS X features Authentication Services limitations on Mac OS X Authentication Services Group Policy for Mac OS X Certificate Autoenrollment

System changes made by the join process

When joining an Active Directory Domain, Authentication Services automatically modifies the following system configurations:

  • Authentication Services is added to the DirectoryService search path.
  • The Authentication Services startup items are configured to startup automatically
  • The system MIT Kerberos configuration file is configured to use the Active Directory servers that Authentication Services detects.
  • The system authorization rules contained in /etc/authorization are modified to use the VASMechanism for Authentication Services logins.
  • Group Policies configured for the Mac OS X system are applied by the Group Policy components if they are installed.

Once you have successfully completed the Authentication Services join process, you are immediately able to log into the Mac OS X system through both the Mac OS X Login Window and remotely through SSH.

When leaving a domain, the Authentication Services unjoin process reverts the above changes that were made by the Authentication Services join process. Also, uninstalling Authentication Services automatically reverts the above changes as well.

Note: You can re-join on top of existing computer accounts created with the Mac OS X Active Directory Plugin by default using the Authentication Services Active Directory plugin, but we recommend disabling the Mac OS X Active Directory plugin so that the domain will not appear in the Directory Servers window as not responding.

Verify the installation and configuration

It is important to verify that your system is configured correctly to use the Active Directory account information provided by Authentication Services.

To verify the Authentication Services installation and configuration

  1. Run the following shell commands.

    • To show a list of the available Unix-enabled Active Directory users, enter

      dscl /VAS list /Users
    • To show a list of the available Unix-enabled Active Directory groups, enter

      dscl /VAS list /Groups
    • To ensure that the system can read user information for Authentication Services users, enter

      dscl /Search read /Users/<Username>

      where <Username> is the username of a Authentication Services user.

    • To perform an authentication for a Authentication Services user, enter

      dscl /Search auth <Username>

      where <Username> is the username of a Authentication Services user.

    If any of the previous commands do not work, capture debug information from the Authentication Services Directory Service plugin.

  2. Add the following items to the vas.conf [vas_macos] section:
       dslog-mode = /Library/Logs/vasds.log
       dslog-components = plugin,auth
  3. After adding those items, run the following shell command in a Terminal session to trigger the Authentication Services Directory Services Plugin to reload its logger configuration:
    $ sudo /opt/quest/libexec/vas/macos/vasdsreload
  4. Execute the previous verification commands that failed and send the contents of /Library/Logs/vasds.log to One Identity Support who will assist in resolving the problems.

Logging in with Active Directory accounts

Authentication Services for Mac OS X allows you to authenticate to your Mac OS X system, but before you can use any given account for authentication, you can prepare it for Mac OS X authentication from a Windows Administrative Console through a process called Unix-enabling. However, if you do not have access or permissions to modify user account information in Active Directory, you can join and specify that you want the Authentication Services client to locally generate Unix identity information.

To locally generate Unix identity information, select the Generate Unix Identity Attributes option when you join (or, if you are joining using the command line utility, specify the --autogen-posix-attrs flag). This allows you to use all the features of the Authentication Services client, without requiring any modification to user information in Active Directory. If you plan to manage identity data in Active Directory globablly, proceed to the Unix-enable a User section.

Unix-enable a user

You Unix-enable a user by entering the Unix attributes on the Unix Account tab in Active Directory Users and Computers (ADUC) MMC Snapin.

To Unix-enable a user

  1. Logon to a Windows Administrative workstation.
  2. Start ADUC.
  3. Locate the user object that you would like to Unix-enable.
  4. Right-click on the user and select Properties.
  5. Select the Unix Account tab.
  6. Select the Unix-enabled check box.

    Default values are generated for the user.

  7. Adjust values as necessary and click OK.
Related Documents

The document was helpful.

Select Rating

I easily found the information I needed.

Select Rating