I have some linux boxes that use Windows Active Directory authentication, that works just fine (Samba + Winbind).
What I would like to do now though is only allow certain people or certain groups to login using Active Directory credentials. Currently anyone with a valid AD account can login. I want to limit this to only a few groups. Is this doable?
Assuming the groups are available to the Linux system, I recommend editing
/etc/security/access.conf
for Ubuntu, RedHat distributions (and their forks) and probably a bunch of others. This doesn't require editing PAM files, and is a nicely standard place to do it. There are usually examples in the file, commented out.I currently use the
AllowGroups
directive in/etc/ssh/sshd_config
to limit who's able to log in. Specify a one or more AD groups on that line, and those people will be the only ones able to log in.Keep in mind that this only works if your users are only accessing the server remotely via ssh. If they're singing in locally, you'll need to find another solution.
(I'm talking about samba 3 here, no experience on samba 4 now.)
There is no need to edit those /etc/pam.d/xxx files. pam_winbind.conf is the file you want, it is usually located at /etc/security/pam_winbind.conf.
It is the configuration file of pam_winbind module, and it works for both CentOS/Redhat and Debian/Ubuntu. You can read the man page of pam_winbind.conf for reference.
Here is an example file.
Yes, there are a few ways of doing this depending on what you're trying to accomplish exactly.
The first method can be done through the samba config. This will only allow these users to connect to Samba, other users can still login through other services (ssh, local term, etc). With this, you'll want to add a line to your [global] section in smb.conf:
The other method is by modifying PAM rules. Different distributions have slight differences here, but generally speaking there are PAM rules per service as well as common rules, you can decide what is best. You'll want to add an account restriction using the pam_require module. An example on my laptop (Fedora 13) would be to modify the account section in /etc/pam.d/system-auth to:
To simplify administration, you might want to create a new group in AD for the purpose of tracking users that can login to this server.
I struggled with getting any of the above to work for me in RHEL 7. Below is what I was able to get to work.
/etc/sssd/sssd.conf
Change
access_provider = ad
toaccess_provider = simple
+simple_allow_groups = @[email protected], @[email protected]
visudo
%[email protected] ALL=(ALL) ALL
restart the sssd service.
I have achieved let only one AD_USER or AD_GROUP to ssh login the linux box via AD authentication.
The details are listed as here: (pay attention to step 7 and 8)
https://gist.githubusercontent.com/xianlin/8c09d916994dac7630b9/raw/ee07817a03bc5904a5404a7e7c94e08ea0c7560a/CentOS_AD_Integration