Pbis Installation 8 7 0
Pbis Installation 8 7 0
Pbis Installation 8 7 0
Installation Guide
Revision/Update Information: August 2018
Corporate Headquarters
5090 N. 40th Street
Phoenix, AZ 85018
Phone: 1 818-575-4000
COPYRIGHT NOTICE
Copyright © 2018 BeyondTrust Software, Inc. All rights reserved. Use of this software and/or document, as and when
applicable, is also subject to the terms and conditions of the license between the licensee and BeyondTrust Software, Inc.
(“BeyondTrust”) or BeyondTrust’s authorized remarketer, if and when applicable.
DISCLAIMER
BeyondTrust makes no representations or warranties with respect to the contents hereof. Other than, any limited warranties
expressly provided pursuant to a license agreement, NO OTHER WARRANTY IS EXPRESSED AND NONE SHALL BE IMPLIED,
INCLUDING WITHOUT LIMITATION THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR USE OR FOR A PARTICULAR
PURPOSE.
TRADEMARK NOTICES
PowerBroker, PowerPassword, and PowerKeeper are registered trademarks of BeyondTrust. PowerSeries, PowerADvantage,
PowerBroker Password Safe, PowerBroker Directory Integrator, PowerBroker Management Console, PowerBroker Desktops,
PowerBroker Virtualization, PowerBroker Express, PowerBroker Databases, PowerBroker Windows Servers, PowerBroker
Windows Desktops, and PowerBroker Identity Services are trademarks of BeyondTrust.
ssh® is a registered trademark of SSH Communications Security Corp in the United States and in certain other jurisdictions. The
SSH logo, Tectia and tectia logo are trademarks of SSH Communications Security Corp and may be registered in certain
jurisdictions.
This application contains software powered by PKAIP®, the leading solution for enabling efficient and secure data storage and
transmission. PKAIP® is provided by PKWARE, the inventor and continuing innovator of the ZIP file format. Used with
permission.
OTHER NOTICES
If and when applicable the following additional provisions are so noted:
The PowerBroker Identity Services Open software is free to download and use according to the terms of the Limited GPL 2.1
for client libraries and the GPL 2 for daemons. The licenses for PowerBroker Identity Services Enterprise and for PowerBroker
Identity Services UID-GID Module are different. For complete information on the software licenses and terms of use for
BeyondTrust products, see www.beyondtrust.com.
Contents
Contents
Introduction 6
Conventions Used in This Guide 6
Font Conventions 6
Documentation Set for PBIS Enterprise 7
Contact Technical Support 8
Before Contacting Technical Support 8
Generating a Support Pack 9
Contacting Support 10
Configuring SELinux 42
Installing SELinux on Unsupported Platforms 42
Configuring SELinux After Installing 42
Introduction
This guide shows system administrators and security administrators how to use BeyondTrust PowerBroker Identity
Services Enterprise Edition (PBIS Enterprise).
PBIS Enterprise ships with a number of documents that help you to use the various features of the product. See the
following section for a list of the guides.
Font Conventions
The font conventions used for this document are:
• Courier New Font is used for program names, commands, command arguments, directory paths,
variable names, text input, text output, configuration file listings, and source code. For example:
C:\Documents and Settings\All Users
• Courier New Bold Font is used for information that should be entered into the system exactly as
shown. For example:
pbdeploy.exe
• Courier New Italics Font is used for input variables that need to be replaced by actual values. In the
following example, the variable MyServer, must be replaced by an actual environment server name and the
variable MyFolder must be replaced by an actual folder name:
\\MyServer\MyFolder\pbdcl32.msi
• Bold is used for Windows buttons. For example:
Click OK.
Segmentation Faults
Provide the following information when contacting Technical Support:
• Core dump of the PowerBroker Identity Services application:
ulimit - c unlimited
• Exact patch level or exact versions of all installed packages.
Program Freezes
Provide the following information when contacting Technical Support:
• Debug logs
• tcpdump
• An strace of the program
Domain-Join Errors
Provide the following information when contacting Technical Support:
• Debug logs (Copy the log file from /var/log/pbis-join.log.)
• tcpdump
• Lsass debug logs (See Generate an Authentication Agent Debug Log, in the PBIS Troubleshooting webhelp.)
• Contents of pam.d/pam.conf
• The sshd and ssh debug logs and syslog
Contacting Support
For support, go to our Customer Portal then follow the link to the product you need assistance with.
The Customer Portal contains information regarding contacting Technical Support by telephone and chat, along
with product downloads, product installers, license management, account, latest product releases, product
documentation, webcasts and product demos.
Telephone
Privileged Account Management Support
Within Continental United States: 800.234.9072
Outside Continental United States: 818.575.4040
Online
http://www.beyondtrust.com/Resources/Support/
Components
There are two installation packages that you need to install PBIS Enterprise:
• Management tools for Active Directory– Install on a Windows computer that connects to an Active Directory
domain controller.
Component Function
Agent n Runs on a Linux, Unix, or Mac OS X computer to connect it to Active Directory with the PBIS
Enterprise command-line interface or GUI. See Join Active Directory from the Command Line.
n Communicates with an Active Directory domain controller to authenticate and authorize users
and groups with the PBIS Enterprise Identity Service. See Log On with AD Credentials.
n Pulls and refreshes policy settings by using the Group Policy service, which is included only with
the PBIS Enterprise agent.
Enterprise n Runs on a Windows administrative workstation that connects to an Active Directory domain
Console controller to help manage Linux, Unix, and Mac OS X computers in Active Directory.
n Migrates users, checks status, and generates reports.
MMC Snap- n Extends Active Directory Users and Computers to include Unix and Linux users.
Ins for
n With PBIS Enterprise, it also extends the Group Policy Management Console (GPMC) to include
ADUC and
Linux, Unix, and Mac OS X Group Policy settings as well as a way to target them at specific
GPMC
platforms.
Cell A snap-in for the Microsoft Management Console to manage cells associated with Active Directory
Manager Organizational Units.
Reporting Stores security events and access logs for compliance reports.
Database
Operations A management application, or plug-in, for the BeyondTrust Management Console. The dashboard
Dashboard retrieves information from the PBIS Enterprise reporting database to display authentication
transactions, authorization requests, network events, and other security events that take place on
PBIS Enterprise clients.
Services
Prior to PowerBroker Identity Services 6.5, the agent was composed of separate daemon processes, and each was
started in sequence by the operating systems at start up.
In PowerBroker Identity Services 6.5, the daemons are replaced by libraries loaded by the service manager
daemon (/opt/pbis/sbin/lwsmd). The service lsass replaces the daemon lsassd.
At start up, the operating system is configured to start the service manager daemon. It is then instructed by the
operating system (with the command /opt/pbis/bin/lwsm autostart) to start all desired services.
The service manager daemon keeps track of the services already started and ensures the services are started and
stopped in the appropriate order.
The redirector multiplexes CIFS/SMB connections to remote systems. For instance, when two different processes
on a local Linux computer need to perform input-output operations on a remote system by using CIFS/SMB, with
either the same identity or different identities, the preferred method is to use the APIs in the lwio client library,
which routes the calls through the redirector. In this example, the redirector maintains a single connection to the
remote system and multiplexes the traffic from each client by using multiplex IDs.
The input-output service plays a key role in the PBIS Enterprise architecture because PBIS Enterprise uses DCE/RPC
(Distributed Computing Environment/Remote Procedure Calls). DCE/RPC uses SMB: Thus, the DCE-RPC client
libraries use the PBIS Enterprise input-output client library, which in turn makes calls to lwio with Unix domain
sockets.
When you join a domain, for example, PBIS Enterprise uses DCE-RPC calls to establish the machine password. The
PBIS Enterprise authentication service periodically refreshes the machine password by using DCE-RPC calls.
Authentication of users and groups in Active Directory takes place with Kerberos, not RPC.
The following data-flow diagram shows how systems interact when you join a domain.
In addition, when a joined computer starts up, the PBIS Enterprise authentication service enumerates Active
Directory trusts by using DCE-RPC calls that go through the redirector. With one-way trusts, the authentication
service uses RPC to look up domain users, groups, and security identifiers. With two-way trusts, lookup takes place
through LDAP, not RPC.
Because the authentication service registers trusts only when it starts up, you should restart lsass with the PBIS
Enterprise Service Manager after you modify a trust relationship.
The PBIS Enterprise Group Policy agent also uses the input-output client library and the redirector when it copies
files from the sysvol share of a domain controller.
To troubleshoot remote procedure calls that go through the input-output service and its redirector, use a
Wireshark trace or a TCP dump to capture the network traffic. Wireshark, a free open-source packet analyzer, is
recommended.
PAM Options
PowerBroker Identity Services Enterprise Edition uses the following standard PAM options:
• try_first_pass
• use_first_pass
• use_authtok
• debug
Additionally, there are non-standard options to the PAM configuration on some systems:
• unknown_ok – Allows local users to continue down the stack (first line succeeds but second line fails) while
blocking domain users who do not meet group membership requirements.
• remember_chpass – On AIX systems, which have both PAM and LAM modules, the remember_chpass
prevents the AIX computer from trying to change the password twice and prompting the user twice.
• set_default_repository – On Solaris systems, the set_default_repository option is used to
make sure password changes work as expected.
• smartcard_prompt – Enables smartcard prompts.
• no_require_membership – Allows the require membership check to be skipped.
You can change the cache to store the information in a SQLite database. For more information, refer to the PBIS
Enterprise Administration Guide, "lsass Cache Settings".
The PBIS Enterprise site affinity service, netlogon, caches information about the optimal domain controller and
global catalog in the PBIS Enterprise registry.
The following files are in /var/lib/pbis/db:
File Description
registry.db The SQLite 3.0 database in which the PBIS Enterprise registry service, lwreg, stores data.
sam.db Repository managed by the local authentication provider to store information about local
users and groups.
lwi_events.db The database in which the event logging service, eventlog, records events.
lsass- Cache managed by the Active Directory authentication provider to store user and group
adcache.filedb.FQDN information. The file is in /var/lib/pbis/db. In the name of the file, FQDN is replaced
by your fully qualified domain name.
Since the default UIDs that PBIS Enterprise generates are large, the entries made by the operating system in the
lastlog file when AD users log in make the file appear to increase to a large size. This is normal and should not
cause concern. The lastlog file (typically /var/log/lastlog) is a sparse file that uses the UID and GID of the
users as disk addresses to store the last login information. Because it is a sparse file, the actual amount of storage
used by it is minimal.
Additional information about a computer's Active Directory domain name, machine account, site affinity, domain
controllers, forest, the computer's join state, and so forth is stored in the PBIS Enterprise registry. Here is an
example of the kind of information that is stored under the netlogon key:
[HKEY_THIS_MACHINE\Services\netlogon\cachedb\example.com-0]
"DcInfo-ClientSiteName"="Default-First-Site-Name"
"DcInfo-DCSiteName"="Default-First-Site-Name"
"DcInfo-DnsForestName"="example.com"
"DcInfo-DomainControllerAddress"="192.168.92.20"
"DcInfo-DomainControllerAddressType"=dword:00000017
"DcInfo-DomainControllerName"="w2k3-r2.example.com"
"DcInfo-DomainGUID"=hex:71,c1,9e,b5,18,35,f3,45,ba,15,05,95,fb,5b,62,e3
"DcInfo-Flags"=dword:000003fd
"DcInfo-FullyQualifiedDomainName"="example.com"
"DcInfo-LMToken"=dword:0000ffff
"DcInfo-NetBIOSDomainName"="EXAMPLE"
"DcInfo-NetBIOSHostName"="W2K3-R2"
"DcInfo-NTToken"=dword:0000ffff
"DcInfo-PingTime"=dword:00000006
"DcInfo-UserName"=""
"DcInfo-Version"=dword:00000005
"DnsDomainName"="example.com"
"IsBackoffToWritableDc"=dword:00000000
"LastDiscovered"=hex:c5,d9,86,4b,00,00,00,00
"LastPinged"=hex:1b,fe,86,4b,00,00,00,00
"QueryType"=dword:00000000
"SiteName"=""
Time Synchronization
For the PBIS Enterprise agent to communicate over Kerberos with the domain controller, the clock of the client
must be within the domain controller's maximum clock skew, which is 300 seconds, or 5 minutes, by default. (For
more information, see http://web.mit.edu/kerberos/krb5-1.4/krb5-1.4.2/doc/krb5-admin/Clock-Skew.html.)
The clock skew tolerance is a server-side setting. When a client communicates with a domain controller, it is the
domain controller's Kerberos key distribution center that determines the maximum clock skew. Since changing the
maximum clock skew in a client's krb5.conf file does not affect the clock skew tolerance of the domain
controller, the change will not allow a client outside the domain controller's tolerance to communicate with it.
The clock skew value that is set in the /etc/pbis/krb5.conf file of Linux, Unix, and Mac OS X computers is
useful only when the computer is functioning as a server for other clients. In such cases, you can use a PBIS
Enterprise Group Policy setting to change the maximum tolerance; for more information, see Set the Maximum
Tolerance for Kerberos Clock Skew in the PowerBroker Identity Services Group Policy Administration Guide.
The domain controller uses the clock skew tolerance to prevent replay attacks by keeping track of every
authentication request within the maximum clock skew. Authentication requests outside the maximum clock skew
are discarded. When the server receives an authentication request within the clock skew, it checks the replay
cache to make sure the request is not a replay attack.
However, if another global catalog is unavailable within the forest, the PBIS Enterprise agent will be unable to find
the Unix and Linux information of users and groups. The PBIS Enterprise agent must have access to the global
catalog to function. Therefore, it is a recommended that each forest has redundant domain controllers and
redundant global catalogs.
Cached Credentials
Both PBIS Open and PBIS Enterprise cache credentials so users can log on when the computer is disconnected
from the network or Active Directory is unavailable.
Trust Support
The PBIS Enterprise agent supports the following Active Directory trusts:
Trust Type Transitivity Direction PBIS Enterprise Default Cell Support Named Cells
Parent and child Transitive Two-way Yes Yes
External Nontransitive One-way No Yes
External Nontransitive Two-way No Yes
Forest Transitive One-way No Yes
Forest Transitive Two-way Yes: Must enable default cell in both forests. Yes
Notes on Trusts
The following is general information about working with trusts.
• You must place the user or group that you want to give access to the trust in a cell other than the default cell.
• In a two-way forest or parent-child trust, PBIS Enterprise merges the default cells. When merged, users in one
domain can log on computers in another domain, and vice-versa.
• To put a user in a child domain but not the parent domain, you must put the user in a named cell, which is a
cell associated with an organizational unit.
• If there is a UID conflict across two domains, one domain will be dropped.
• In a cross-forest transitive one- or two-way trust, the root of the trusted forest must have a default cell.
• In a one-way trust in which Forest A trusts Forest B, a computer in Forest A cannot get group information from
Forest B, because Forest B does not trust Forest A. The computer in Forest A can obtain group information if
the user logs on with a password for a domain user, but not if the user logs on with Kerberos single sign-on
credentials. Only the primary group information, not the secondary group information, is obtained.
• To support a 1-way trust without duplicating user accounts, you must use a cell associated with an OU, not a
default cell. If Domain A trusts Domain B (but not the reverse) and if Domain B contains all the account
information in cells associated with OUs, then when a user from Domain B logs on a machine joined to Domain
A, Domain B will authenticate the user and authorize access to the machine in Domain A.
In such a scenario, you should also add a domain user from the trusted domain to an administrative group in
the trusting domain so you can manage the trusting domain with the appropriate level of read access to
trusted user and group information. However, before you add the domain user from the trusted domain to the
trusting domain, you must first add to the trusting domain a group that includes the user because Unix and
Linux computers require membership in at least one group and Active Directory does not enumerate a user's
membership in foreign groups.
• If you have a network topology in which the "front" domain trusts the "back" domain, and you join a machine
to the front domain using a back domain administrator, as in the following example, the attempt to join the
domain will fail: domainjoin-cli join front.example.com back\\administrator
password. However, the attempt to join the domain will succeed if you use the following nomenclature:
domainjoin-cli join front.example.com administrator@BACK.example.COM
password
• With PBIS Enterprise, aliased user names are supported in the default cell and in named cells.
Supported Platforms
PBIS Open and PBIS Enterprise run on a broad range of Unix, Mac OS X, and Linux platforms. BeyondTrust
frequently adds new vendors and distributions. See the BeyondTrust website for the list of supported platforms.
SELinux Support
The PBIS Enterprise SELinux implementation supports the following operating systems:
• Fedora 13—Fedora 17
• RedHat Enterprise Linux version 6 (and Centos) 6.x—7.x
When you install on RedHat Enterprise Linux, PBIS runs under the unconfined_t domain (as of 8.3.4).
The PBIS post install script checks if /usr/sbin/semodule and /etc/selinux/targeted/policy are
present. If both checks pass then the targeted policy file - pbis.pp - will get installed if found in
/opt/pbis/share/<os>/<version>/pbis.pp
Storage Modes
PBIS Enterprise has two operating modes: Directory Integrated mode and Schemaless mode.
Note: Directory Integrated mode is the preferred mode.
The modes provide a method for storing Unix and Linux information in Active Directory—including UIDs and GIDs—
so that PBIS Enterprise can map SIDs to UIDs and GIDs and vice versa.
The mapping lets PBIS Enterprise use an Active Directory user account to grant a user access to a Unix or Linux
resource that is governed by a UID-GID scheme. When an AD user logs on a Unix or Linux computer, the PBIS
Enterprise agent communicates with the Active Directory Domain Controller through standard LDAP protocols to
obtain the following authorization data:
• UID
• Primary GID
• Secondary GIDs
• Home directory
• Login shell
PBIS Enterprise uses this information to control the user's access to Unix and Linux resources.
If the container is created at the level of the root domain, it is known as a default cell. In this case, the Unix-specific
data is stored directly in the AD user or group account.
Schemaless Mode
In contrast, Schemaless mode stores Linux and Unix data without requiring RFC 2307 object classes and attributes
and without modifying the schema. Instead, Schemaless mode uses existing object classes and attributes to store its
data.
• To store information about a cell, PBIS Enterprise creates a container object and stores data in its
description attribute.
• To store information about a group or user, PBIS Enterprise creates a serviceConnectionPoint object
and stores data in its keywords attribute. Both keywords and description are multi-valued attributes
that can have multiple values while still allowing AD searches for specific values.
In Schemaless mode, PBIS Enterprise uses RFC 2307 attribute names to store values in the keywords and
description attributes in the form name=value, where name is the attribute name and value is its value.
Requirements
This section lists the requirements to use PBIS Enterprise with Active Directory.
You must have at least the following components:
• An Active Directory domain controller.
• A Windows administrative workstation that is running ADUC and is connected to your Active Directory domain
controller.
• One or more Unix or Linux computers running an operating system that PBIS Enterprise supports, such as
versions of Mac OS X, Red Hat, SUSE Linux, Fedora, CentOS, Debian, Sun Solaris, IBM AIX, HP-UX, and Ubuntu.
For a complete list of supported platforms, see www.beyondtrust.com.
Requirements for the agent—the software that runs on the Linux, Unix, and Mac OS X computers that you want to
connect to AD—are listed in Installing the Agent.
Administrator Privileges
• Root access or sudo permission on the Unix, Linux, and Mac OS X computers that you want to join to the
domain.
• Active Directory credentials that allow you to add computers to an Active Directory domain—for example,
membership in the Domain Administrators security group or the Enterprise Administrators security group.
Networking
The subnets with your Linux, Unix, and Mac computers must be added to Active Directory sites before joining the
computers to Active Directory so that the PBIS Enterprise agent can detect the optimal domain controller and
global catalog.
Replication
Make sure your AD replication system is up to date and functioning properly by using the following diagnostic tools
from http://www.microsoft.com/download to test replication. For instructions, see the Microsoft documentation
for each tool.
• DCDiag. Part of Microsoft's support tools for Windows Server 2003, dcdiag.exe should be run with the /v /c
/e switches to test all the domain controllers in all your sites.
• FRSDiag. Use frsdiag.exe tool, available from the Microsoft Resource Kit tools, to check the File Replication
Service (FRS).
In addition, the following tools can help you review and troubleshoot FRS problems.
• Sonar. Optionally use it to perform a quick review of FRS status.
• Ultrasound. Optionally use it to monitor and troubleshoot FRS.
• ReplMon. Included in the Microsoft Resource Kit Tools. Use it to investigate replication problems across links
where DCDiag showed failures.
Platforms
PBIS Enterprise supports many Unix, Linux, Mac, and virtualization platforms. For a list, visit www.beyondtrust.com.
Applications
Advanced Group Policy Management (AGPM) Tool
You can use the AGPM tool to manage your GPOs. Any PBIS Enterprise settings applied to your GPOs will be
maintained.
Checkpoint
– Review the requirements before proceeding with the installation. See Requirements.
– Ensure the account you are using to run the install is a member of the Domain Admins group or Enterprise
Admins group. The account needs privileges to change objects and child objects in Active Directory.
– Ensure the Microsoft management tools for Active Directory are installed before you install the console.
See Microsoft Management Tools.
During the installation, checks are in place to ensure that your environment meets successful installation
requirements. For more information, a log file is created here during the install:
%UserProfile%AppData\Local\Temp\PBIS.Logs.
1. Locate and copy the install file to your Windows workstation:
SetupPBIS64-*.exe
The installer file includes the version and build number.
2. Run SetupPBIS64-*.exe.
3. On the License Agreement page, click Accept to go through the installation.
4. Click Install.
5. On the Directory Integrated Mode Configuration page, click Configure to set up Directory Integrated mode.
Otherwise, click Skip.
6. On the Default Cell Creation page, click Create Cell to build the default cell. Otherwise, click Skip.
7. On the Reporting Options page, configure the following:
– Report Viewer - Click Install to install the Report viewer.
– SQL Server database instance - Click Search Server to create the PBIS database.
– Event Collector services - Click Install to go through the wizard to configure the PBIS Database utilities.
8. Click Finish.
Silent Install
Run a silent install or uninstall of the console using the msiexec.exe
To see a complete list of options run msiexec.exe.
Example:
msiexec.exe /i PBISEnterprise64-x.x.x.xxx.msi /quiet /qn
msiexec.exe /x PBISEnterprise64-x.x.x.xxx.msi /quiet /qn
• uidNumber
Promotes (but does not index) the following attributes to the global catalog:
• gecos
• loginShell
• unixHomeDirectory
Configure nsswitch.conf
Before you attempt to join an Active Directory domain, make sure the /etc/nsswitch.conf file contains the
following line:
hosts: files dns
The hosts line can contain additional information, but it must include the dns entry, and it is recommended that
the dns entry appear after the files entry.
Computers running Solaris, in particular, may not contain this line in nsswitch.conf until you add it.
When you use PowerBroker Identity Services with Multicast DNS 4 (mDNS4) and have a domain in your
environment that ends in .local, you must place the dns entry before the mdns4_minimal entry and before
the mdns4 entry:
hosts: files dns mdns4_minimal [NOTFOUND=return] mdns4
The default setting for many Linux systems is to list the mdns4 entries before the dns entry—a configuration that
leaves PBIS Enterprise unable to find the domain.
For PBIS Enterprise to work correctly, the nsswitch.conf file must be readable by user, group, and world.
For more information on configuring nsswitch, see the man page for nsswitch.conf.
Restart Services
After you update nsswitch.conf (or netsvc.conf), you must restart the PBIS Enterprise input-output service (lwio)
and the authentication service (lsass).
Run the following command as root to restart both services:
/opt/pbis/bin/lwsm restart lwio
Configure resolv.conf
Before you attempt to join an Active Directory domain, make sure that /etc/resolv.conf on your Linux, Unix,
or Mac client includes a DNS server that can resolve SRV records for your domain.
Example:
search example.com
nameserver 192.168.100.132
For more information on resolv.conf, see your operating system's man page.
Tip: To view the firewall rules on a Linux computer using iptables, execute the following command:
iptables - nL
Environment Variables
Before installing the PBIS Enterprise agent, make sure that the following environment variables are not set:
LD_LIBRARY_PATH, LIBPATH, SHLIB_PATH, LD_PRELOAD
Setting any of these environment variables violates best practices for managing Unix and Linux computers because
it causes PBIS Enterprise to use non-PBIS Enterprise libraries for its services. For more information on best
practices, see http://linuxmafia.com/faq/Admin/ld-lib-path.html.
If you must set LD_LIBRARY_PATH, LIBPATH, or SHLIB_PATH for another program, put the PBIS Enterprise
library path (/opt/pbis/lib or /opt/pbis/lib64) before any other path—but keep in mind that doing so
may result in side effects for other programs, as they will now use PBIS Enterprise libraries for their services.
If joining the domain fails with an error message that one of these environment variables is set, stop all the PBIS
Enterprise services, clear the environment variable, make sure it is not automatically set when the computer
restarts, and then try to join the domain again.
Patch Requirements
It is recommended that the latest patches for an operating system be applied before installing PBIS Enterprise.
Sun Solaris
All Solaris versions require the md5sum utility, which can be found on the companion CD.
Visit the Oracle Technology Network Patching Center to ensure the latest patches are deployed to Solaris targets.
HP-UX
Visit the HP Software Depot to download patches.
Secure Shell: For all HP-UX platforms, it is recommended that a recent version of HP's Secure Shell be installed.
Sudo: By default, the versions of sudo available from the HP-UX Porting Center do not include the Pluggable
Authentication Module, or PAM, which PBIS Enterprise requires to allow domain users to execute sudo commands
with super-user credentials. It is recommended that you download sudo from the HP-UX Porting Center and make
sure that you use the with-pam configuration option when you build it.
HP-UX 11iv1 requires the following patches: PHCO_36229, PHSS_35381, PHKL_34805, PHCO_31923, PHCO_
31903, and PHKL_29243.
The patches listed here represent the minimum patch level for proper operation. The patches might be
superceded by later patches.
Kerberos client libraries: For single sign-on with HP-UX 11.11 and 11.23, install the latest KRB5-Client libraries from
the HP Software Depot. By default, HP-UX 11.31 includes the libraries.
Locale
Configure the locale with UTF-8 encoding for every target computer.
Secure Shell
To properly process logon events with PBIS Enterprise, the SSH server or client must support the UsePam yes
option.
For single sign-on, both the SSH server and the SSH client must support GSSAPI authentication.
Other Software
Telnet, rsh, rcp, rlogin, and other programs that use PAM for processing authentication requests are compatible
with PBIS Enterprise.
Networking Requirements
Each Unix, Linux, or Mac computer must have fully routed network connectivity to all the domain controllers that
service the computer's Active Directory site. Each computer must be able to resolve A, PTR, and SRV records for
the Active Directory domain, including at least the following:
• A domain.tld
• SRV _kerberos._tcp.domain.tld
• SRV _ldap._tcp.domain.tld
• SRV _kerberos._udp.sitename.Sites._msdcs.domain.tld
• A domaincontroller.domain.tld
AIX
On AIX computers, PAM must be enabled. LAM is supported only on AIX 5.x. PAM must be used exclusively on AIX
6.x.
./pbis-enterprise-x.x.x.xxxx.solaris.i386.pkg.sh -- --help
./pbis-enterprise-x.x.x.xxxx.solaris.i386.pkg.sh -- --all-zones
./pbis-enterprise-x.x.x.xxxx.solaris.i386.pkg.sh -- --current-zone
Post Install
After a new child zone is installed, booted, and configured, you must run the following command as root to
complete the installation:
/opt/pbis/bin/postinstall.sh
You cannot join zones to Active Directory as a group. Each zone, including the global zone, must be joined to the
domain independently of the other zones.
Caveats
There are some caveats when using PBIS Enterprise with Solaris zones:
• When you join a non-global zone to AD, an error occurs when PBIS Enterprise tries to synchronize the Solaris
clock with AD.
The error occurs because the root user of the non-global zone does not have root access to the underlying
global system and thus cannot set the system clock. If the clocks are within the 5-minute clock skew permitted
by Kerberos, the error will not be an issue.
Otherwise, you can resolve the issue by manually setting the clock in the global zone to match AD or by joining
the global zone to AD before joining the non-global zone.
• Some Group Policy settings may log PAM errors in the non-global zones even though they function as
expected. The cron Group Policy setting is one example:
Depending on the Group Policy setting, these errors may result from file access permissions, attempts to write
to read-only directories, or both.
• By default, Solaris displays auth.notice syslog messages on the system console. Some versions of PBIS
Enterprise generate significant authentication traffic on this facility-priority level, which may lead to an
undesirable amount of chatter on the console or clutter on the screen.
To redirect the traffic to a file instead of displaying it on the console, edit your /etc/syslog.conf file as
follows:
Change this:
*.err;kern.notice;auth.notice /dev/sysmsg
To this:
*.err;kern.notice /dev/sysmsg
auth.notice /var/adm/authlog
Important: Make sure that you use tabs, not spaces, to separate the facility.priority information (on the left) from
the action field (on the right). Using spaces will cue syslog to ignore the entire line.
Installing Solaris 11
This guide is intended for administrators installing PBIS Enterprise to Solaris targets.
Example
pbis/install.sh --ips <repository>
If you only have the p5p file you can use the pkgrecv command.
Example
pkgrecv –s ./PBISEnterprise-X.X.X.XXXX-solaris11-<ARCH>.p5p –d <repository>
PBISEnterprise.<ARCH>
Configuring SELinux
Be sure to review the latest SELinux documentation. You can start with the SELinux wiki,
http://www.selinuxproject.org/page/Main_Page
The file pbislocal.pp will be a compiled policy module and can be loaded with semodule -i pbislocal.pp.
To build a compiled policy, execute the following command in the directory where pbislocal.te is located:
make -f /usr/share/selinux/devel/Makefile
Overview
When PBIS Enterprise joins a computer to an Active Directory domain, it uses the hostname of the computer to
create the name of the computer object in Active Directory. From the hostname, the PBIS Enterprise domain join
tool attempts to derive a fully qualified domain name. By default, the PBIS Enterprise domain join tool creates the
Linux and Unix computer accounts in the default Computers container in Active Directory.
After you join a domain for the first time, you must restart the computer before you can log on. If you cannot
restart the computer, you must restart each service or daemon that looks up users or groups through the standard
nsswitch interface, which includes most services that authenticate users, groups, or computers. You must, for
instance, restart the services that use Kerberos, such as sshd.
If either of these tests fails, see Check System Health Before Installing the Agent and Troubleshooting Domain-Join
Problems.
• /etc/hosts (To join a domain without modifying /etc/hosts, see Join Active Directory Without Changing
/etc/hosts.)
• /etc/apparmor.d/abstractions/nameservice
• /etc/X11/gdm/PreSession/Default
• /etc/vmware/firewall/services.xml
• /usr/lib/security/methods.cfg
• /etc/security/user
• /etc/security/login.cfg
• /etc/netsvc.conf
• /etc/krb5.conf
• /etc/krb5/krb5.conf
• /etc/rc.config.d/netconf
• /etc/nodename
• /etc/{hostname,HOSTNAME,hostname.*}
• /etc/sysconfig/network/config
• /etc/sysconfig/network/dhcp
• /etc/sysconfig/network/ifcfg-*
• /etc/sysconfig/network-scripts/ifcfg-*
• /etc/init.d or /sbin/init.d
• /etc/rcX.d/ (new files and links created)
• /etc/inet/ipnodes
As an example, the following table lists the files that are modified for the default configuration of the operating
system of a few selected platforms.
UPN Names
To use UPN names, you must raise your Active Directory forest functional level to Windows Server 2003, but
raising the forest functional level to Windows Server 2003 will exclude Windows 2000 domain controllers from
the domain. For more information, see Storage Modes.
Leave a Domain
When a computer is removed from a domain, PBIS Enterprise retains the settings that were made to the
computer's configuration when it was joined to the domain. Changes to the nsswitch module are also preserved
until you uninstall PBIS Enterprise, at which time they are reverted.
Before leaving a domain, run the following command to view the changes that will take place:
domainjoin-cli leave --advanced --preview domainName
Example:
[root@rhel4d example]# domainjoin-cli leave --advanced --preview exmple.com
Leaving AD Domain:
EXAMPLE.COM
[X] [S] ssh - configure ssh and sshd
[X] [N] pam - configure pam.d/pam.conf
[X] [N] nsswitch - enable/disable PowerBroker Identity Services nsswitch module
[X] [N] stop - stop daemons
[X] [N] leave - disable machine account
[X] [N] krb5 - configure krb5.conf
[F] keytab - initialize kerberos keytab
Key to flags
[F]ully configured - the system is already configured for this step
[S]ufficiently
- the system meets the minimum configuration requirements for this step
configured
[N]ecessary - this step must be run or manually performed
[X] - this step is enabled and will make changes
[ ] - this step is disabled and will not make changes
For information on advanced commands for leaving a domain, see Join Active Directory from the Command Line.
/opt/pbis/bin/uninstall.sh purge