Summit IdM Lab User Guide 2015
Summit IdM Lab User Guide 2015
Summit Labs
Table of Contents
Lab Overview ................................................................................. 3
Background ................................................................................... 3
Red Hat Enterprise Linux Identity Management Overview ........................
Red Hat Enterprise Linux Identity Management Benefits: .........................
Enhances Security .................................................................................
Provides eSSO (enterprise Single Sign-on) ............................................
Centralizes Administration and Control .................................................
Implements Standards-Based, Integrated Components ........................
Reduces costs ........................................................................................
IdM Features ..............................................................................................
3
4
4
4
4
4
4
4
3 | Red Hat Summit 2015 Red Hat Enterprise Linux Identity Management
Lab Overview
This lab guide assumes that youre following instructor-led training and that this lab
guide is will try to simulate real life tasks and scenarios. It goes through a number of
labs that will enable your to create full functional environment using Red Hat
Enterprise Linux IdM. Also you will explore IdM features such as users, groups, policies
and access control rules management. The purpose is to give you a basic hands-on
overview of Red Hat Enterprise Linux Identity Management and how the components
are fit together. It will use a combination of command-line tools and the IdM web
interface. This lab is prepared to run on environment, the setup is descried in this
document on Lab Environment Section.
Your instructor will provide you with any additional information that you will require, primarily
the lab setup and required scenarios.
Background
Red Hat Enterprise Linux Identity Management Overview
Red Hat Enterprise Linux IdM is a way to create identity stores, centralized
authentication, domain control for Kerberos and DNS services, and
authorization policies all on Linux systems, using native Linux tools. It is
also supports Linux/Unix domains.
www.redhat.com
Copyright 2015 Red Hat, Inc. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, and JBoss
are trademarks of Red Hat, Inc., registered in other countries. Linux is the registered trademark of
Linus Torvalds in the U.S. and other countries.
4 | Red Hat Summit 2015 Red Hat Enterprise Linux Identity Management
IdM Features
Integrated, native user, host, and service authentication and access
control.
Consistent and manageable identity management for Linux and Unix
systems.
Interoperability with Microsoft Active Directory domains.
Standards-based, trusted technologies.
Easier and clearer to implement, maintain, and understand
authentication and access control policies.
Flexible access control rules based on sudo rules, host-based rules,
and other criteria.
Consistent and universal password policies for users.
Integrate established Linux/Unix services like NFS, automount, NIS,
NTP, Kerberos, and DNS into a single management domain.
Smooth migration paths from NIS and LDAP services.
Scalable operations with up to 20 servers and replicas and an
unlimited number of clients in a single domain.
www.redhat.com
Copyright 2015 Red Hat, Inc. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, and JBoss
are trademarks of Red Hat, Inc., registered in other countries. Linux is the registered trademark of
Linus Torvalds in the U.S. and other countries.
5 | Red Hat Summit 2015 Red Hat Enterprise Linux Identity Management
Element
URL
Username
Password
IdM Server
http://idm-server.example.com
admin
password
IdM Server
ssh: idm-server.example.com
root
redhat
IdM client
ssh: idm-client.example.com
root
redhat
IdM access
evaluation
ssh: idm-access.example.com
root
redhat
IdM Replication
ssh idm-replica.example.com
root
redhat
Windows Active
Directory
administrator Secret123
Copyright 2015 Red Hat, Inc. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, and JBoss
are trademarks of Red Hat, Inc., registered in other countries. Linux is the registered trademark of
Linus Torvalds in the U.S. and other countries.
6 | Red Hat Summit 2015 Red Hat Enterprise Linux Identity Management
Note: Make sure that all virtual machines starting with IdM-* are running.
After finishing Lab1, you can start the Windows-DC machine which is running
the Active Directory
idm-server
Run as root:
[root@idm-server ~]# ipa-server-install --setup-dns --ssh-trust-dns \
--mkhomedir
When you prompt for these questions use the respective answers:
Existing BIND configuration detected, overwrite? [no]: <Yes>
Server host name [idm-server.example.com]: <Press Enter>
Please confirm the domain name [example.com]: <Press Enter>
Please provide a realm name [EXAMPLE.COM]: <Press Enter>
Directory Manager password: <Use password>
Password (confirm): <Use Password>
IPA admin password: <Use Password>
Password (confirm): <Use Password>
Do you want to configure DNS forwarders? [yes]: Yes
Enter IP address for a DNS forwarder: 192.168.10.254
Enter IP address for a DNS forwarder: <Press Enter>
Do you want to configure the reverse zone? [yes]: Yes
Continue to configure the system with these values? [no]: Yes
Domain name:
example.com
www.redhat.com
idm-server.example.com
192.168.10.10
Copyright 2015 Red Hat, Inc. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, and JBoss
are trademarks of Red Hat, Inc., registered in other countries. Linux is the registered trademark of
Linus Torvalds in the U.S. and other countries.
7 | Red Hat Summit 2015 Red Hat Enterprise Linux Identity Management
Domain name:
example.com
Realm name:
EXAMPLE.COM
BIND DNS server will be configured to serve IPA domain with:
Forwarders:
Reverse zone:
8.8.8.8
10.168.192.in-addr.arpa.
After
installation:
Check
the
IdM
web
interface
server.example.com, use the admin username and password.
via
idm-
www.redhat.com
Copyright 2015 Red Hat, Inc. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, and JBoss
are trademarks of Red Hat, Inc., registered in other countries. Linux is the registered trademark of
Linus Torvalds in the U.S. and other countries.
8 | Red Hat Summit 2015 Red Hat Enterprise Linux Identity Management
Then on the idm-server check the logs (Just to know where to start
debugging, not needed):
/var/log/pki-ca/debug
/var/log/pki-ca-install.log
/var/log/dirsrv/ (permissions!)
/var/log/messages
www.redhat.com
Copyright 2015 Red Hat, Inc. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, and JBoss
are trademarks of Red Hat, Inc., registered in other countries. Linux is the registered trademark of
Linus Torvalds in the U.S. and other countries.
9 | Red Hat Summit 2015 Red Hat Enterprise Linux Identity Management
www.redhat.com
Copyright 2015 Red Hat, Inc. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, and JBoss
are trademarks of Red Hat, Inc., registered in other countries. Linux is the registered trademark of
Linus Torvalds in the U.S. and other countries.
10 | Red Hat Summit 2015 Red Hat Enterprise Linux Identity Management
7. As Admin:
ipa pwpolicy-mod --minlife=0 --maxfail=3
ipa pwpolicy-show
8. As mwell, login to the idm-server, change the 1st time password and
then, change password with ipa passwd , it will succeed as we
changed the minimum lifetime of users password.
9. On the Web UI check the following:
Add a user.
Check password expiry.
Edit user details.
Reference:
Red Hat Documentation : Managing User Groups
www.redhat.com
Copyright 2015 Red Hat, Inc. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, and JBoss
are trademarks of Red Hat, Inc., registered in other countries. Linux is the registered trademark of
Linus Torvalds in the U.S. and other countries.
11 | Red Hat Summit 2015 Red Hat Enterprise Linux Identity Management
www.redhat.com
Copyright 2015 Red Hat, Inc. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, and JBoss
are trademarks of Red Hat, Inc., registered in other countries. Linux is the registered trademark of
Linus Torvalds in the U.S. and other countries.
12 | Red Hat Summit 2015 Red Hat Enterprise Linux Identity Management
Log out from the admin session, login with jsmith, then navigate to OTP
Tokens then click on Add. In the Add OTP token, make sure that you fill the
required filled as the figure below:
After adding the token, the a QR code will show, scan this QR through
FreeOTP or any other Soft token (FreeOTP is recommended):
www.redhat.com
Copyright 2015 Red Hat, Inc. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, and JBoss
are trademarks of Red Hat, Inc., registered in other countries. Linux is the registered trademark of
Linus Torvalds in the U.S. and other countries.
13 | Red Hat Summit 2015 Red Hat Enterprise Linux Identity Management
On the smartphone,
open FreeOTP, click on
the QR Code Sign, then
scan the QR code
Click
on
the
new
created id to generate a
new token.
Now logout user jsmith and try to login using the token. The password will be
the original jsmith password+ the generated number. So if the password was
"redhat" the login password should be "redhat283857".
Please note that "redhat" as password will still be able to authenticate jsmith
because we selected 2 authentication methods in the global IdM
configuration.
www.redhat.com
Copyright 2015 Red Hat, Inc. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, and JBoss
are trademarks of Red Hat, Inc., registered in other countries. Linux is the registered trademark of
Linus Torvalds in the U.S. and other countries.
14 | Red Hat Summit 2015 Red Hat Enterprise Linux Identity Management
on IdM server, make sure that PRT records are created/updated in new
client installations:
ipa dnszone-mod --allow-sync-ptr=TRUE
Zone name: example.com
Client installation:
ipa-client-install --enable-dns-updates --mkhomedir --ssh-trust-dns
User authorized to enroll computers: <admin>
Password for [email protected]: <password>
www.redhat.com
Copyright 2015 Red Hat, Inc. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, and JBoss
are trademarks of Red Hat, Inc., registered in other countries. Linux is the registered trademark of
Linus Torvalds in the U.S. and other countries.
15 | Red Hat Summit 2015 Red Hat Enterprise Linux Identity Management
Some adjustment.
The default shell for new users is /bin/sh, which should probably be
changed if you are using Linux only, On idm-server:
[root@idm-server ~]# ipa config-mod --defaultshell=/bin/bash
Try to access both machines with the above created users from idmclient.example.com.
ssh [email protected]
Creating home directory for jsmith.
Note: make sure that you have domainname and hostname in your
hosts file. Example: in idm-access.example.com:
192.168.10.12 idm-access.example.com idm-access
www.redhat.com
Copyright 2015 Red Hat, Inc. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, and JBoss
are trademarks of Red Hat, Inc., registered in other countries. Linux is the registered trademark of
Linus Torvalds in the U.S. and other countries.
16 | Red Hat Summit 2015 Red Hat Enterprise Linux Identity Management
www.redhat.com
Copyright 2015 Red Hat, Inc. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, and JBoss
are trademarks of Red Hat, Inc., registered in other countries. Linux is the registered trademark of
Linus Torvalds in the U.S. and other countries.
17 | Red Hat Summit 2015 Red Hat Enterprise Linux Identity Management
www.redhat.com
Copyright 2015 Red Hat, Inc. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, and JBoss
are trademarks of Red Hat, Inc., registered in other countries. Linux is the registered trademark of
Linus Torvalds in the U.S. and other countries.
18 | Red Hat Summit 2015 Red Hat Enterprise Linux Identity Management
Now the host group is created, click on restricted to add the hosts
www.redhat.com
Copyright 2015 Red Hat, Inc. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, and JBoss
are trademarks of Red Hat, Inc., registered in other countries. Linux is the registered trademark of
Linus Torvalds in the U.S. and other countries.
19 | Red Hat Summit 2015 Red Hat Enterprise Linux Identity Management
Then you will find a created host group named restricted, click on the
restricted then Add.
access.
The idm-access machines should be in access group, follow the
same steps in creating and adding machines to restricted group.
www.redhat.com
Copyright 2015 Red Hat, Inc. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, and JBoss
are trademarks of Red Hat, Inc., registered in other countries. Linux is the registered trademark of
Linus Torvalds in the U.S. and other countries.
20 | Red Hat Summit 2015 Red Hat Enterprise Linux Identity Management
On winad.example.com:
Open the powershell/cmd and run the following to add the example.com
zone:
dnscmd 127.0.0.1 /ZoneAdd example.com /Secondary 192.168.10.10
Just in case you didn't know how to open PowerShell, here is the icon:
www.redhat.com
Copyright 2015 Red Hat, Inc. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, and JBoss
are trademarks of Red Hat, Inc., registered in other countries. Linux is the registered trademark of
Linus Torvalds in the U.S. and other countries.
21 | Red Hat Summit 2015 Red Hat Enterprise Linux Identity Management
On the Windows Desktop, You will find DNS icon (shortcut), it will open DNS
service on windows, we want to verify the new resources created, double
click on DNS icon and follow the DNS tree as shown blow:
Also we need to add the NS record for winad (AD domain name)
[root@idm-server ~]# ipa dnsrecord-add example.com winad --ns-hostname=dc.winad
Record name: winad
NS record: dc.winad
www.redhat.com
Copyright 2015 Red Hat, Inc. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, and JBoss
are trademarks of Red Hat, Inc., registered in other countries. Linux is the registered trademark of
Linus Torvalds in the U.S. and other countries.
22 | Red Hat Summit 2015 Red Hat Enterprise Linux Identity Management
SRV
;; ANSWER SECTION:
_ldap._tcp.winad.example.com. 468 IN
SRV
;; AUTHORITY SECTION:
winad.example.com.
86400
IN
NS
dc.winad.example.com.
;; ADDITIONAL SECTION:
dc.winad.example.com.
3468
IN
192.168.10.253
After verifying that IdM server can resolve SRV records of AD, we will verify
that SRV records of IdM server are resolvable from AD server (you will type
the yellow underlined nslookup commands):
We can verify that the record it add to the ldap using ldapsearch:
ldapsearch -Y GSSAPI -b cn=dns,dc=example,dc=com idnsname=example.com.
www.redhat.com
Copyright 2015 Red Hat, Inc. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, and JBoss
are trademarks of Red Hat, Inc., registered in other countries. Linux is the registered trademark of
Linus Torvalds in the U.S. and other countries.
23 | Red Hat Summit 2015 Red Hat Enterprise Linux Identity Management
The next configuration required will be installing the AD trust IdM server, it
will add all necessary objects and configuration to allow IdM server to create
a trust to the Active Directory domain.
ipa-adtrust-install -U --netbios-name="EXAMPLE"
--enable-compat -a "password"
Before adding the trust relationship, we need to make sure that both server
are in the same timezone, using PowerShell on Windows first command will
show the configured timezone and the second command will set it to EST,
windows will need to be restarted, reboot the windows machine after running
the below commands:
Then, we can start adding the trust relationship (If IdM and AD are having
different timezone it will fail):
ipa trust-add --type=ad winad.example.com --admin Administrator --password
-------------------------------------------------Re-established trust to domain "winad.example.com"
-------------------------------------------------Realm name: winad.example.com
Domain NetBIOS name: WINAD
Domain Security Identifier: S-1-5-21-3652195975-17874612-2275940394
SID blacklist incoming: S-1-5-20, S-1-5-3, S-1-5-2, S-1-5-1, S-1-5-7, S-1-5-6, S-1-5-5,
S-1-5-4, S-1-5-9, S-1-5-17, S-1-5-16, S-1-5-15, S-1-5-14,
SID blacklist outgoing: S-1-5-20, S-1-5-3, S-1-5-2, S-1-5-1, S-1-5-7, S-1-5-6, S-1-5-5,
S-1-5-4, S-1-5-9, S-1-5-8, S-1-5-17, S-1-5-16, S-1-5-15, S-1-5-14
Trust direction: Two-way trust
Trust type: Active Directory domain
Trust status: Established and verified
Add AD Admins group to IdM, Create IdM group that will be flagged as
external group:
[root@idm-server ~]# ipa group-add --desc='ad_domain admins external map' \
ad_admins_external --external
-------------------------------Added group "ad_admins_external"
--------------------------------
www.redhat.com
Copyright 2015 Red Hat, Inc. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, and JBoss
are trademarks of Red Hat, Inc., registered in other countries. Linux is the registered trademark of
Linus Torvalds in the U.S. and other countries.
24 | Red Hat Summit 2015 Red Hat Enterprise Linux Identity Management
Group name: ad_admins_external
Description: ad_domain admins external map
--group ad_admins_external
The last commands that we need run are to add the AD users to IdM:
ipa
ipa
ipa
ipa
www.redhat.com
Copyright 2015 Red Hat, Inc. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, and JBoss
are trademarks of Red Hat, Inc., registered in other countries. Linux is the registered trademark of
Linus Torvalds in the U.S. and other countries.
25 | Red Hat Summit 2015 Red Hat Enterprise Linux Identity Management
Now, this is the testing time; wbinfo will retrieve the SID associated with the
username specified:
kinit admin
kvno -S HTTP `hostname`
ipa trust-show winad.example.com
kdestroy
klist
kinit [email protected]
klist
kvno -S cifs dc.winad.example.com
wbinfo -n 'WINAD\Domain Admins'
S-1-5-21-66505577-848503339-3105483033-512 SID_DOM_GROUP (2)
We can create a shared disk to AD Admins, these commands will create and
new directory /linuxshare and make it available to AD admins:
mkdir /linuxshare
SID=`wbinfo -n 'WINAD\Domain Admins'|awk '{print$1}'`
net conf setparm 'share' 'comment' 'Trust test share'
net conf setparm 'share' 'read only' 'no'
net conf setparm 'share' 'valid users' "$SID"
net conf setparm 'share' 'path' '/linuxshare'
cd /linuxshare
touch IdM-rocks
www.redhat.com
Copyright 2015 Red Hat, Inc. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, and JBoss
are trademarks of Red Hat, Inc., registered in other countries. Linux is the registered trademark of
Linus Torvalds in the U.S. and other countries.
26 | Red Hat Summit 2015 Red Hat Enterprise Linux Identity Management
A new dialog will open as dialog will be opened to define the share it will ask
for the user password, use the administrator as user and the password is
Secret123:
You will find the contens of /linuxshare available, the file that we created
IdM-rocks will be there accessible. You can create folders on Windows and
check them back on the idm-server.example.com.
Now, the administrator user can login to Linux machines without passwords,
remember that we didn't configure the Host Based Access Control, so all
users can login to all servers it is not recommend to run this configuration in
the production. Next lab we will have a HBAC configured and it will show how
to define new rules and examining the existing rules.
www.redhat.com
Copyright 2015 Red Hat, Inc. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, and JBoss
are trademarks of Red Hat, Inc., registered in other countries. Linux is the registered trademark of
Linus Torvalds in the U.S. and other countries.
27 | Red Hat Summit 2015 Red Hat Enterprise Linux Identity Management
On the Windows Desktop you will find putty (a ssh client) use idmclient.example.com as the Host Name:
www.redhat.com
Copyright 2015 Red Hat, Inc. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, and JBoss
are trademarks of Red Hat, Inc., registered in other countries. Linux is the registered trademark of
Linus Torvalds in the U.S. and other countries.
28 | Red Hat Summit 2015 Red Hat Enterprise Linux Identity Management
www.redhat.com
Copyright 2015 Red Hat, Inc. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, and JBoss
are trademarks of Red Hat, Inc., registered in other countries. Linux is the registered trademark of
Linus Torvalds in the U.S. and other countries.
29 | Red Hat Summit 2015 Red Hat Enterprise Linux Identity Management
2
3
www.redhat.com
Copyright 2015 Red Hat, Inc. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, and JBoss
are trademarks of Red Hat, Inc., registered in other countries. Linux is the registered trademark of
Linus Torvalds in the U.S. and other countries.
30 | Red Hat Summit 2015 Red Hat Enterprise Linux Identity Management
Click on the access-rule HBAC and add users or users groups that this rule
will be applied on.
Add clients users group to the access-rule in WHO field.
2
1
Then add the resources that will have these rules applied either host groups
or specific hosts (to access-rule), in this lab the access group should be
used, if you didn't create it, you can add host instead of host group, select
the idm-access.example.com.
www.redhat.com
Copyright 2015 Red Hat, Inc. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, and JBoss
are trademarks of Red Hat, Inc., registered in other countries. Linux is the registered trademark of
Linus Torvalds in the U.S. and other countries.
31 | Red Hat Summit 2015 Red Hat Enterprise Linux Identity Management
Now we want to add the service that will be allowed, select the sshd and
login services:
www.redhat.com
Copyright 2015 Red Hat, Inc. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, and JBoss
are trademarks of Red Hat, Inc., registered in other countries. Linux is the registered trademark of
Linus Torvalds in the U.S. and other countries.
32 | Red Hat Summit 2015 Red Hat Enterprise Linux Identity Management
www.redhat.com
Copyright 2015 Red Hat, Inc. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, and JBoss
are trademarks of Red Hat, Inc., registered in other countries. Linux is the registered trademark of
Linus Torvalds in the U.S. and other countries.
33 | Red Hat Summit 2015 Red Hat Enterprise Linux Identity Management
Click the Add and Edit button to save the new role and go to the
configuration page.
Click on the Role that you just created, then click on Add
www.redhat.com
Copyright 2015 Red Hat, Inc. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, and JBoss
are trademarks of Red Hat, Inc., registered in other countries. Linux is the registered trademark of
Linus Torvalds in the U.S. and other countries.
34 | Red Hat Summit 2015 Red Hat Enterprise Linux Identity Management
Select the users on the left and use the ">" button to move them to the
Prospective column.
www.redhat.com
Copyright 2015 Red Hat, Inc. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, and JBoss
are trademarks of Red Hat, Inc., registered in other countries. Linux is the registered trademark of
Linus Torvalds in the U.S. and other countries.
35 | Red Hat Summit 2015 Red Hat Enterprise Linux Identity Management
Select the privileges on the left and use the ">" button to move them to the
Prospective column.
www.redhat.com
Copyright 2015 Red Hat, Inc. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, and JBoss
are trademarks of Red Hat, Inc., registered in other countries. Linux is the registered trademark of
Linus Torvalds in the U.S. and other countries.
36 | Red Hat Summit 2015 Red Hat Enterprise Linux Identity Management
Log out the admin user, and login with mwell user. Navigate through
Network Services, then DNS subtab menu then click on example.com.
After getting example.com resources; click on Add:
1
2
2
We need to test that user mwell can add new records, create new record
notify TXT record with text data Important note :
1
1
www.redhat.com
Copyright 2015 Red Hat, Inc. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, and JBoss
are trademarks of Red Hat, Inc., registered in other countries. Linux is the registered trademark of
Linus Torvalds in the U.S. and other countries.
37 | Red Hat Summit 2015 Red Hat Enterprise Linux Identity Management
On idm-replica.example.com run:
ipa-replica-install --no-forwarders --skip-conncheck --setup-dns \
/var/replica-info-idm-replica.example.com.gpg
Other options:
ipa-replica-install --forwarder=<our forward DNS> --setup-dns <replica
file.gpg>
Replication verification.
ipa-replica-manage list
ipa-replica-conncheck --replica idm-replica.example.com
www.redhat.com
Copyright 2015 Red Hat, Inc. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, and JBoss
are trademarks of Red Hat, Inc., registered in other countries. Linux is the registered trademark of
Linus Torvalds in the U.S. and other countries.
38 | Red Hat Summit 2015 Red Hat Enterprise Linux Identity Management
www.redhat.com
Copyright 2015 Red Hat, Inc. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, and JBoss
are trademarks of Red Hat, Inc., registered in other countries. Linux is the registered trademark of
Linus Torvalds in the U.S. and other countries.
39 | Red Hat Summit 2015 Red Hat Enterprise Linux Identity Management
www.redhat.com
Copyright 2015 Red Hat, Inc. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, and JBoss
are trademarks of Red Hat, Inc., registered in other countries. Linux is the registered trademark of
Linus Torvalds in the U.S. and other countries.