{"id":1497,"date":"2016-04-16T12:13:27","date_gmt":"2016-04-16T10:13:27","guid":{"rendered":"http:\/\/www.identitycosmos.com\/?p=1497"},"modified":"2016-04-16T12:13:27","modified_gmt":"2016-04-16T10:13:27","slug":"unix_nis_maps_active-directory","status":"publish","type":"post","link":"https:\/\/identitycosmos.com\/index.php\/2016\/04\/16\/unix_nis_maps_active-directory\/","title":{"rendered":"Tutorial: how to store or migrate UNIX NIS maps in Active Directory using the Centrify NIS Gateway"},"content":{"rendered":"<p>I received a lot, I mean a lot, of requests after I had published my 3 last posts about the storage of NIS maps in Active Directory [<a href=\"http:\/\/bit.ly\/1S4gKUG\">http:\/\/bit.ly\/1S4gKUG<\/a> &#8211; <a href=\"http:\/\/bit.ly\/1qvvyzr\">http:\/\/bit.ly\/1qvvyzr<\/a> &#8211; <a href=\"http:\/\/bit.ly\/1q8iAHi\">http:\/\/bit.ly\/1q8iAHi<\/a> ] \u2013 The main problem was my posts are in French \ud83d\ude09 and a lot of people tried to use Google Translate to get it, but it wasn&#8217;t perfect. So, from the popular demand, I decided to translate it in English. English is not my native language, so sorry in advance if you will find some &#8216;bugs&#8217; in the text.<\/p>\n<p>As I explained in one of my <a href=\"http:\/\/www.identitycosmos.com\/http:\/www.identitycosmos.com\/strategie\/microsoft-annonce-la-suppression-du-support-de-identity-management-for-unix-idmu-nis-server-role-dans-windows-server-2016-technical-preview-et-aprs\">last post<\/a> (sorry again in French !), Microsoft <a href=\"https:\/\/blogs.technet.microsoft.com\/activedirectoryua\/2016\/02\/09\/identity-management-for-unix-idmu-is-deprecated-in-windows-server\/\">announced<\/a> it will not implement some Unix Services in Windows 2016 and Active Directory 2016 anymore, including NIS Services.<\/p>\n<p>Through my different projects, I had meet a lot of organizations which are using mixt environment with Windows and Unix boxes and I can say the NIS usage is even nowadays very widespread. For sure, it is very bad to use NIS authentication and NIS authorizations, it is really better to use Kerberos ad LDAP instead. I will not go in the details now, but it is true that NIS is not something secured, however, the fact to totally eliminate the NIS Services is impossible for a lot of organizations. These organizations have a &#8220;IT history&#8221;, from years, and a lot of very important information still remain in the NIS maps (automount, etc.)<\/p>\n<p>So, the goal is to use Kerberos\/LDAP for authentication\/authorization services and a NIS Gateway service which expose to NIS client the maps NIS which are stored in Active Directory. Using this way, we get the best of the two worlds, we can secure the authentication with Kerberos and the organization is able to continue to use the NIS maps for the legacy needs.<\/p>\n<p><a href=\"http:\/\/identitycosmos.com\/wp-content\/uploads\/2016\/04\/capture20160403202213508.png\"><img decoding=\"async\" src=\"http:\/\/www.identitycosmos.com\/wp-content\/uploads\/2016\/04\/041616_1013_1.png\" alt=\"\" border=\"0\" \/><\/a><span style=\"font-family: Times New Roman; font-size: 12pt;\"><br \/>\n<\/span><\/p>\n<p>In this tutorial, we will use the NIS Gateway provided by Centrify and get a magic trick to improve security without abandon the NIS history.<\/p>\n<p>Inn this tutorial, we will use a Fedora 23 workstation as a NIS Gateway and Fedora 23 as a NIS client, in my example the Active Directory is a Windows 2012R2 one, but it will work with various flavors of Linux\/Unix and with different versions of Active Directory.<\/p>\n<p><span style=\"text-decoration: underline;\"><strong>A\/ First step: Centrify packages installation on the future NIS Server (=NIS Gateway)<br \/>\n<\/strong><\/span><\/p>\n<p>First, we need to set our NIS Gateway with a hostname and with a IP which permit to the NIS Gateway to communicate with the Active Directory world. Here, we consider that the basic settings regarding the Centrify Zones are already done (just refer to the Centrify Quick Start Guide to do it).<\/p>\n<p>1\/ Hostname settings<\/p>\n<p><a href=\"http:\/\/identitycosmos.com\/wp-content\/uploads\/2016\/04\/capture20160403204153493.png\"><img decoding=\"async\" src=\"http:\/\/www.identitycosmos.com\/wp-content\/uploads\/2016\/04\/041616_1013_2.png\" alt=\"\" border=\"0\" \/><\/a><span style=\"font-family: Times New Roman; font-size: 12pt;\"><br \/>\n<\/span><\/p>\n<p>In our example, the hostname of the NIS Gateway will be: nisserver01.demo.local<\/p>\n<p>2\/ SSH checking<\/p>\n<p>We will check that the SSH server service is present on the Linux box, we will need it to transfer the packages for the Centrify agent and the packages for the Centrify NIS Gateway on the NIS Server.<\/p>\n<p><a href=\"http:\/\/identitycosmos.com\/wp-content\/uploads\/2016\/04\/capture20160403204414276.png\"><img decoding=\"async\" src=\"http:\/\/www.identitycosmos.com\/wp-content\/uploads\/2016\/04\/041616_1013_3.png\" alt=\"\" border=\"0\" \/><\/a><span style=\"font-family: Times New Roman; font-size: 12pt;\"><br \/>\n<\/span><\/p>\n<p>If the SSH server is not installed, type the following command to install the SSH server packages:<\/p>\n<p><a href=\"http:\/\/identitycosmos.com\/wp-content\/uploads\/2016\/04\/capture20160403204724703.png\"><img decoding=\"async\" src=\"http:\/\/www.identitycosmos.com\/wp-content\/uploads\/2016\/04\/041616_1013_4.png\" alt=\"\" border=\"0\" \/><\/a><span style=\"font-family: Times New Roman; font-size: 12pt;\"><br \/>\n<\/span><\/p>\n<p>When the SSH packages are installed, you need to start the SSH service<\/p>\n<p><a href=\"http:\/\/identitycosmos.com\/wp-content\/uploads\/2016\/04\/capture20160403204915783.png\"><img decoding=\"async\" src=\"http:\/\/www.identitycosmos.com\/wp-content\/uploads\/2016\/04\/041616_1013_5.png\" alt=\"\" border=\"0\" \/><\/a><span style=\"font-family: Times New Roman; font-size: 12pt;\"><br \/>\n<\/span><\/p>\n<p>3\/ Centrify packages transfer to the machine<\/p>\n<p>We will use WinSCP to transfer the Centrify agent (Centrify Server Suite 2016) on the NIS server (\/tmp directory for example) \u2013 for a Fedora23 OS, the name of the package is <strong><em>centrify-suite-2016-rhel4-i386.tgz<\/em><\/strong><\/p>\n<p><a href=\"http:\/\/identitycosmos.com\/wp-content\/uploads\/2016\/04\/capture20160403205117288.png\"><img decoding=\"async\" src=\"http:\/\/www.identitycosmos.com\/wp-content\/uploads\/2016\/04\/041616_1013_6.png\" alt=\"\" border=\"0\" \/><\/a><span style=\"font-family: Times New Roman; font-size: 12pt;\"><br \/>\n<\/span><\/p>\n<p>4\/ Centrify agent installation<\/p>\n<p>Go the the \/tmp directory and check you have the agent package.<\/p>\n<p><a href=\"http:\/\/identitycosmos.com\/wp-content\/uploads\/2016\/04\/capture20160403210045886.png\"><img decoding=\"async\" src=\"http:\/\/www.identitycosmos.com\/wp-content\/uploads\/2016\/04\/041616_1013_7.png\" alt=\"\" border=\"0\" \/><\/a><span style=\"font-family: Times New Roman; font-size: 12pt;\"><br \/>\n<\/span><\/p>\n<p>Unzip the package:<\/p>\n<p><a href=\"http:\/\/identitycosmos.com\/wp-content\/uploads\/2016\/04\/capture20160403210228837.png\"><img decoding=\"async\" src=\"http:\/\/www.identitycosmos.com\/wp-content\/uploads\/2016\/04\/041616_1013_8.png\" alt=\"\" border=\"0\" \/><\/a><span style=\"font-family: Times New Roman; font-size: 12pt;\"><br \/>\n<\/span><\/p>\n<p>Instal the agent, using the install.sh script:<\/p>\n<p><a href=\"http:\/\/identitycosmos.com\/wp-content\/uploads\/2016\/04\/capture20160403210414251.png\"><img decoding=\"async\" src=\"http:\/\/www.identitycosmos.com\/wp-content\/uploads\/2016\/04\/041616_1013_9.png\" alt=\"\" border=\"0\" \/><\/a><span style=\"font-family: Times New Roman; font-size: 12pt;\"><br \/>\n<\/span><\/p>\n<p>The install.sh script will check everything to be sure your system is able to get it \u2013 if you don&#8217;t have any &#8216;failed&#8221; result, you will be able to install the agent \u2013 if you get some &#8216;warning&#8217; result, it is not really important (we are doing a POC !)<\/p>\n<p><a href=\"http:\/\/identitycosmos.com\/wp-content\/uploads\/2016\/04\/capture20160403210626167.png\"><img decoding=\"async\" src=\"http:\/\/www.identitycosmos.com\/wp-content\/uploads\/2016\/04\/041616_1013_10.png\" alt=\"\" border=\"0\" \/><\/a><span style=\"font-family: Times New Roman; font-size: 12pt;\"><br \/>\n<\/span><\/p>\n<p>Choose the Enterprise or the Standard version, it doesn&#8217;t matter for the NIS Gateway itself, so let&#8217; choose Enterprise [E] in our example:<\/p>\n<p><a href=\"http:\/\/identitycosmos.com\/wp-content\/uploads\/2016\/04\/capture20160403210930120.png\"><img decoding=\"async\" src=\"http:\/\/www.identitycosmos.com\/wp-content\/uploads\/2016\/04\/041616_1013_11.png\" alt=\"\" border=\"0\" \/><\/a><span style=\"font-family: Times New Roman; font-size: 12pt;\"><br \/>\n<\/span><\/p>\n<p>Choose the run <strong>adcheck<\/strong> again (just to be sure\u2026) et provide the needed information linked to Active Directory during the installation process \u2013 In our example, we will join a zone named <strong>arizona<\/strong>, so our NIS server will provide &#8220;NIS service&#8221; for this zone \u2013 and choose to not reboot at the end of the installation:<\/p>\n<p><a href=\"http:\/\/identitycosmos.com\/wp-content\/uploads\/2016\/04\/capture20160403211412414.png\"><img decoding=\"async\" src=\"http:\/\/www.identitycosmos.com\/wp-content\/uploads\/2016\/04\/041616_1013_12.png\" alt=\"\" border=\"0\" \/><\/a><span style=\"font-family: Times New Roman; font-size: 12pt;\"><br \/>\n<\/span><\/p>\n<p>As soon the information will be provided, the install process will start, but just before the installation process will ask you to verify your different values.<\/p>\n<p><a href=\"http:\/\/identitycosmos.com\/wp-content\/uploads\/2016\/04\/capture20160403211646995.png\"><img decoding=\"async\" src=\"http:\/\/www.identitycosmos.com\/wp-content\/uploads\/2016\/04\/041616_1013_13.png\" alt=\"\" border=\"0\" \/><\/a><span style=\"font-family: Times New Roman; font-size: 12pt;\"><br \/>\n<\/span><\/p>\n<p>The installation process is starting \u2013 after the <strong>adcheck<\/strong> final check, just validate the agent installation process:<\/p>\n<p><a href=\"http:\/\/identitycosmos.com\/wp-content\/uploads\/2016\/04\/capture20160403211958028.png\"><img decoding=\"async\" src=\"http:\/\/www.identitycosmos.com\/wp-content\/uploads\/2016\/04\/041616_1013_14.png\" alt=\"\" border=\"0\" \/><\/a><span style=\"font-family: Times New Roman; font-size: 12pt;\"><br \/>\n<\/span><\/p>\n<p><a href=\"http:\/\/identitycosmos.com\/wp-content\/uploads\/2016\/04\/capture20160403212104744.png\"><img decoding=\"async\" src=\"http:\/\/www.identitycosmos.com\/wp-content\/uploads\/2016\/04\/041616_1013_15.png\" alt=\"\" border=\"0\" \/><\/a><span style=\"font-family: Times New Roman; font-size: 12pt;\"><br \/>\n<\/span><\/p>\n<p>At the end of the process, the Centrify agent installation proceeds:<\/p>\n<p><a href=\"http:\/\/identitycosmos.com\/wp-content\/uploads\/2016\/04\/capture20160403212219329.png\"><img decoding=\"async\" src=\"http:\/\/www.identitycosmos.com\/wp-content\/uploads\/2016\/04\/041616_1013_16.png\" alt=\"\" border=\"0\" \/><\/a><span style=\"font-family: Times New Roman; font-size: 12pt;\"><br \/>\n<\/span><\/p>\n<p>Now, we will install the package which will update the SSH Server packages with the Centrify packages \u2013 this is not 100% mandatory, but it will provide a better integration with Kerberos authentication, so let&#8217;s do it:<\/p>\n<p><a href=\"http:\/\/identitycosmos.com\/wp-content\/uploads\/2016\/04\/capture20160403213437402.png\"><img decoding=\"async\" src=\"http:\/\/www.identitycosmos.com\/wp-content\/uploads\/2016\/04\/041616_1013_17.png\" alt=\"\" border=\"0\" \/><\/a><span style=\"font-family: Times New Roman; font-size: 12pt;\"><br \/>\n<\/span><\/p>\n<p>Now, we will install the Centrify NIS Gateway package:<\/p>\n<p><a href=\"http:\/\/identitycosmos.com\/wp-content\/uploads\/2016\/04\/capture20160403213822508.png\"><img decoding=\"async\" src=\"http:\/\/www.identitycosmos.com\/wp-content\/uploads\/2016\/04\/041616_1013_18.png\" alt=\"\" border=\"0\" \/><\/a><span style=\"font-family: Times New Roman; font-size: 12pt;\"><br \/>\n<\/span><\/p>\n<p>At the end, just reboot the system, again this is not 100% mandatory, but let&#8217;s do it easier and reboot the system.<\/p>\n<p>At this stage the first big step is over. Let&#8217;s see now how to set Centrify NIS Gateway.<\/p>\n<p><span style=\"text-decoration: underline;\"><strong>B\/ Second step: Centrify NIS Gateway settings<br \/>\n<\/strong><\/span><\/p>\n<p>1\/ Active Directory integration of the NIS Gateway Linux box<\/p>\n<p>We will integrate the NIS Server in the zone named <strong>arizona<\/strong>. We consider here that you already performed the basic step of the Centrify installation procedure (refer to the Centrify Quick Start guide for details) and we consider you already created some Centrify zones in Active Directory.<\/p>\n<p>First, let&#8217;s connect to the NIS Server and execute the following command to perform the Active Directory join to the <strong>arizona<\/strong> zone:<\/p>\n<p><a href=\"http:\/\/identitycosmos.com\/wp-content\/uploads\/2016\/04\/capture20160405142931118.png\"><img decoding=\"async\" src=\"http:\/\/www.identitycosmos.com\/wp-content\/uploads\/2016\/04\/041616_1013_19.png\" alt=\"\" border=\"0\" \/><\/a><span style=\"font-family: Times New Roman; font-size: 12pt;\"><br \/>\n<\/span><\/p>\n<p><span style=\"font-family: Times New Roman; font-size: 12pt;\">In our example, the domain is named <strong>demo.local<\/strong>, the Centrify zone is named <strong>arizona<\/strong> and the Active Directory service account used to perform the Active Directory join is named <strong>centrify<\/strong>. And the password for the service account is \u2026no, for sure, just kidding ;-)) \u2013 but the join process will ask you the password for the Active Directory service account.<br \/>\n<\/span><\/p>\n<p><a href=\"http:\/\/identitycosmos.com\/wp-content\/uploads\/2016\/04\/capture20160405142947712.png\"><img decoding=\"async\" src=\"http:\/\/www.identitycosmos.com\/wp-content\/uploads\/2016\/04\/041616_1013_20.png\" alt=\"\" border=\"0\" \/><\/a><span style=\"font-family: Times New Roman; font-size: 12pt;\"><br \/>\n<\/span><\/p>\n<p><span style=\"font-family: Times New Roman; font-size: 12pt;\">After few seconds, the following window will appear, saying everything is ok:<br \/>\n<\/span><\/p>\n<p><a href=\"http:\/\/identitycosmos.com\/wp-content\/uploads\/2016\/04\/capture20160405143023882.png\"><img decoding=\"async\" src=\"http:\/\/www.identitycosmos.com\/wp-content\/uploads\/2016\/04\/041616_1013_21.png\" alt=\"\" border=\"0\" \/><\/a><span style=\"font-family: Times New Roman; font-size: 12pt;\"><br \/>\n<\/span><\/p>\n<p><span style=\"font-family: Times New Roman; font-size: 12pt;\">It is not mandatory to reboot the server itself, but to make it easier, let&#8217;s reboot the server:<br \/>\n<\/span><\/p>\n<p><a href=\"http:\/\/identitycosmos.com\/wp-content\/uploads\/2016\/04\/capture20160405143109675.png\"><img decoding=\"async\" src=\"http:\/\/www.identitycosmos.com\/wp-content\/uploads\/2016\/04\/041616_1013_22.png\" alt=\"\" border=\"0\" \/><\/a><span style=\"font-family: Times New Roman; font-size: 12pt;\"><br \/>\n<\/span><\/p>\n<p><span style=\"font-family: Times New Roman; font-size: 12pt;\">2\/ Let&#8217;s check some important things<br \/>\n<\/span><\/p>\n<p><span style=\"font-family: Times New Roman; font-size: 12pt;\">Now let&#8217;s set some accurate parameters of the Centrify NIS Gateway. We will start to start the management tool Centrify Access Manager, we will find a new machine account in the zone names arizona, it is nisserver01:<br \/>\n<\/span><\/p>\n<p><a href=\"http:\/\/identitycosmos.com\/wp-content\/uploads\/2016\/04\/capture20160405143154356.png\"><img decoding=\"async\" src=\"http:\/\/www.identitycosmos.com\/wp-content\/uploads\/2016\/04\/041616_1013_23.png\" alt=\"\" border=\"0\" \/><\/a><span style=\"font-family: Times New Roman; font-size: 12pt;\"><br \/>\n<\/span><\/p>\n<p><span style=\"font-family: Times New Roman; font-size: 12pt;\">This is another view with the list of the machines in the Centrify zone. We will use a other machine from this zone to be NIS client (ypbind) of our NIS Gateway. For sure, the NIS Gateway as a NIS server only for the machines which are in the same zone.<br \/>\n<\/span><\/p>\n<p><a href=\"http:\/\/identitycosmos.com\/wp-content\/uploads\/2016\/04\/capture20160405143220837.png\"><img decoding=\"async\" src=\"http:\/\/www.identitycosmos.com\/wp-content\/uploads\/2016\/04\/041616_1013_24.png\" alt=\"\" border=\"0\" \/><\/a><span style=\"font-family: Times New Roman; font-size: 12pt;\"><br \/>\n<\/span><\/p>\n<p><span style=\"font-family: Times New Roman; font-size: 12pt;\">As we didn&#8217;t specify a specific container during the Active Directory join of the NIS Gateway, the computer object which represents the NIS server is stored by the containers <strong>Computers<\/strong> in Active Directory or any default container if you changed your Active Directory configuration:<br \/>\n<\/span><\/p>\n<p><a href=\"http:\/\/identitycosmos.com\/wp-content\/uploads\/2016\/04\/capture20160405143259227.png\"><img decoding=\"async\" src=\"http:\/\/www.identitycosmos.com\/wp-content\/uploads\/2016\/04\/041616_1013_25.png\" alt=\"\" border=\"0\" \/><\/a><span style=\"font-family: Times New Roman; font-size: 12pt;\"><br \/>\n<\/span><\/p>\n<p><span style=\"font-family: Times New Roman; font-size: 12pt;\">Because we will apply some specific GPOs on the computer object which represents the NIS Gateway, we will create a new organization unit (OU) and we will move the computer object in it- in our example, the OU is named <strong>NIS_Gateway<\/strong>:<br \/>\n<\/span><\/p>\n<p><a href=\"http:\/\/identitycosmos.com\/wp-content\/uploads\/2016\/04\/capture20160405143414531.png\"><img decoding=\"async\" src=\"http:\/\/www.identitycosmos.com\/wp-content\/uploads\/2016\/04\/041616_1013_26.png\" alt=\"\" border=\"0\" \/><\/a><span style=\"font-family: Times New Roman; font-size: 12pt;\"><br \/>\n<\/span><\/p>\n<p><span style=\"font-family: Times New Roman; font-size: 12pt;\">Now, we will start our NIS Gateway computer. When the computer will be started, it would be possible the use any AD account with a UNIX profile in the Centrify zone to log on it, but we will log as root to make it more convenient for the future manipulations.<br \/>\n<\/span><\/p>\n<p><span style=\"font-family: Times New Roman; font-size: 12pt;\">As soon you are logged on the system, just type the <strong>adinfo<\/strong> command, you will obtain information about the state of the adclient daemon which represents more or less a Active Directory client for UNIX\/Linux:<br \/>\n<\/span><\/p>\n<p><a href=\"http:\/\/identitycosmos.com\/wp-content\/uploads\/2016\/04\/capture20160405143515949.png\"><img decoding=\"async\" src=\"http:\/\/www.identitycosmos.com\/wp-content\/uploads\/2016\/04\/041616_1013_27.png\" alt=\"\" border=\"0\" \/><\/a><span style=\"font-family: Times New Roman; font-size: 12pt;\"><br \/>\n<\/span><\/p>\n<p><span style=\"font-family: Times New Roman; font-size: 12pt;\">The most important thing is to have the value &#8216;connected&#8217; for the attribute &#8216;CentrifyDC mode&#8217;, this means the system is truly connected to Active Directory and communicate with it. At this stage, our Linux server is integrated in Active Directory and it is totally secured, thanks to Centrify technology.<br \/>\n<\/span><\/p>\n<p><span style=\"font-family: Times New Roman; font-size: 12pt;\">3\/ Apply specific settings on the Centrify NIS Gateway<br \/>\n<\/span><\/p>\n<p><span style=\"font-family: Times New Roman; font-size: 12pt;\">Let&#8217;s set some settings to set the correct behavior of Centrify NIS Gateway (adnisd).<br \/>\n<\/span><\/p>\n<p><span style=\"font-family: Times New Roman; font-size: 12pt;\">First, we will use the Centrify extension for the GPMC to create some specific GPOs to set the NIS Gateway, <strong>nisserver01<\/strong>. Centrify provides some ADMX files if you just want to use the classic GPMC provided by Microsoft, so you can import the administration model in the GPMC. Or you can install some Centrify GPMC snap-in to create the UNIX\/Linux GPOS. It is up to you, but you need to do one or the other.<br \/>\n<\/span><\/p>\n<p><span style=\"font-family: Times New Roman; font-size: 12pt;\">Here we will use the ADMX files method, and e consider we already import the different ADMX files in the GPMC. Open the GPMC and go the node &#8220;computer configuration \/ Strategy \/ Administration model \/ Centrify Settings \/ DirectControl Settings \/ NIS Daemon Settings:<br \/>\n<\/span><\/p>\n<p><a href=\"http:\/\/identitycosmos.com\/wp-content\/uploads\/2016\/04\/capture20160405143959120.png\"><img decoding=\"async\" src=\"http:\/\/www.identitycosmos.com\/wp-content\/uploads\/2016\/04\/041616_1013_28.png\" alt=\"\" border=\"0\" \/><\/a><span style=\"font-family: Times New Roman; font-size: 12pt;\"><br \/>\n<\/span><\/p>\n<p><span style=\"font-family: Times New Roman; font-size: 12pt;\">Edit the &#8216;<strong>Specify allowed client machines for NIS daemon<\/strong>&#8216; property and set the value to <strong>0\/0<\/strong>:<br \/>\n<\/span><\/p>\n<p><a href=\"http:\/\/identitycosmos.com\/wp-content\/uploads\/2016\/04\/capture20160405144020742.png\"><img decoding=\"async\" src=\"http:\/\/www.identitycosmos.com\/wp-content\/uploads\/2016\/04\/041616_1013_29.png\" alt=\"\" border=\"0\" \/><\/a><span style=\"font-family: Times New Roman; font-size: 12pt;\"><br \/>\n<\/span><\/p>\n<p><span style=\"font-family: Times New Roman; font-size: 12pt;\">We need to do so, because by default, the NIS Gateway only accept NIS request from itself (I will not go in the details, but in some specific secured configurations where you need to deploy the NIS Gateway packages on all the UNIX systems, this &#8220;by default&#8221; behavior is useful). So we need to define the is of the IP addresses which are authorized to request the NIS service, if you set the value to <strong>0\/0<\/strong>, the NIS server will accept all the request from all the client.<br \/>\n<\/span><\/p>\n<p><span style=\"font-family: Times New Roman; font-size: 12pt;\">Let&#8217;s edit also the &#8216;<strong>Specify NIS daemon update interval<\/strong>&#8216; property and set the value to <strong>60<\/strong>.<br \/>\n<\/span><\/p>\n<p><a href=\"http:\/\/identitycosmos.com\/wp-content\/uploads\/2016\/04\/capture20160405144101425.png\"><img decoding=\"async\" src=\"http:\/\/www.identitycosmos.com\/wp-content\/uploads\/2016\/04\/041616_1013_30.png\" alt=\"\" border=\"0\" \/><\/a><span style=\"font-family: Times New Roman; font-size: 12pt;\"><br \/>\n<\/span><\/p>\n<p><span style=\"font-family: Times New Roman; font-size: 12pt;\">This property will allow us to set the synchronization time between Active Directory and the NIS Gateway. Because of performance reasons, the NIS Gateway maintains a local cache of the values from Active Directory, so in our example, the values will be replicate every minute. In a production environment, a value between 16 and 30 minutes seems a good choice.<br \/>\n<\/span><\/p>\n<p><span style=\"font-family: Times New Roman; font-size: 12pt;\">Just validate the GPO and close the GPMC. If you want to update the NIS Server with these new settings, it is just matter to execute the <strong>adgpupdate command on the NIS Server, this command will refresh the GPOs settings from Active Directory. You can also wait for the next GPO application process (the time period will depend of your Active Directory settings):<\/strong><br \/>\n<\/span><\/p>\n<p><a href=\"http:\/\/identitycosmos.com\/wp-content\/uploads\/2016\/04\/capture20160405200401273.png\"><img decoding=\"async\" src=\"http:\/\/www.identitycosmos.com\/wp-content\/uploads\/2016\/04\/041616_1013_31.png\" alt=\"\" border=\"0\" \/><\/a><span style=\"font-family: Times New Roman; font-size: 12pt;\"><br \/>\n<\/span><\/p>\n<p><span style=\"font-family: Times New Roman; font-size: 12pt;\">It is possible to check which GPO is applied or not by executing the <strong>adgpresult<\/strong> command on the system, here, we will see the settings we just created in the new GPO we created:<br \/>\n<\/span><\/p>\n<p><a href=\"http:\/\/identitycosmos.com\/wp-content\/uploads\/2016\/04\/capture20160405200555997.png\"><img decoding=\"async\" src=\"http:\/\/www.identitycosmos.com\/wp-content\/uploads\/2016\/04\/041616_1013_32.png\" alt=\"\" border=\"0\" \/><\/a><span style=\"font-family: Times New Roman; font-size: 12pt;\"><br \/>\n<\/span><\/p>\n<p><span style=\"text-decoration: underline;\"><strong>C\/ Third step: Verify some elements on the Centrify NIS Gateway settings<br \/>\n<\/strong><\/span><\/p>\n<p><span style=\"font-family: Times New Roman; font-size: 12pt;\">As you may know, to have a consistent NIS Server on a system, we need to have RPC services up and running. If you don&#8217;t know so much about NIS, I recommend to read this book which is for me a sort of &#8220;NIS bible&#8221; [ <em>special thanks to <a href=\"https:\/\/in.linkedin.com\/in\/randipmalakar\/\">Randip M<\/a> to let me know about this book. \ud83d\ude09<\/em> ]<\/span><\/p>\n<p><iframe loading=\"lazy\" style=\"width: 120px; height: 240px;\" src=\"\/\/ws-eu.amazon-adsystem.com\/widgets\/q?ServiceVersion=20070822&amp;OneJS=1&amp;Operation=GetAdHtml&amp;MarketPlace=FR&amp;source=ac&amp;ref=tf_til&amp;ad_type=product_link&amp;tracking_id=gpomasterscom-21&amp;marketplace=amazon&amp;region=FR&amp;placement=1565925106&amp;asins=1565925106&amp;linkId=&amp;show_border=true&amp;link_opens_in_new_window=true\" width=\"300\" height=\"150\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\">&nbsp;<\/p>\n<p><\/iframe><\/p>\n<p><span style=\"font-family: Times New Roman; font-size: 12pt;\">I will not go in the very details, but globally the RPC server service will receive the requests from the NIS\/RPC client from the network, so the RPC server service will decide to use a certain port number, using the port mapper, then the communication between the client and the server will use this specific RPC port for the rest of session. So to have a NIS server running in the right shape we need to have a RPC server running in the right shape.<br \/>\n<\/span><\/p>\n<p><span style=\"font-family: Times New Roman; font-size: 12pt;\">To verify if everything is ok for the RPC server, execute the following command: <strong>rpcinfo \u2013p localhost<\/strong><br \/>\n<\/span><\/p>\n<p><a href=\"http:\/\/identitycosmos.com\/wp-content\/uploads\/2016\/04\/capture20160405144954620.png\"><img decoding=\"async\" src=\"http:\/\/www.identitycosmos.com\/wp-content\/uploads\/2016\/04\/041616_1013_33.png\" alt=\"\" border=\"0\" \/><\/a><span style=\"font-family: Times New Roman; font-size: 12pt;\"><br \/>\n<\/span><\/p>\n<p><span style=\"font-family: Times New Roman; font-size: 12pt;\">Here we can see we have six port mappers waiting for a RPC connection, so everything is ok.<br \/>\n<\/span><\/p>\n<p><span style=\"font-family: Times New Roman; font-size: 12pt;\">We will now check if the Centrify NIS Gateway service (adnisd) is up and running by executing the following command: <strong>systemctl status adnisd \u2013l<br \/>\n<\/strong><\/span><\/p>\n<p><a href=\"http:\/\/identitycosmos.com\/wp-content\/uploads\/2016\/04\/capture20160405202502019.png\"><img decoding=\"async\" src=\"http:\/\/www.identitycosmos.com\/wp-content\/uploads\/2016\/04\/041616_1013_34.png\" alt=\"\" border=\"0\" \/><\/a><span style=\"font-family: Times New Roman; font-size: 12pt;\"><br \/>\n<\/span><\/p>\n<p><span style=\"font-family: Times New Roman; font-size: 12pt;\">If the adnisd service is not running, execute the following command to start it: <strong>systemctl start adnisd \u2013l<\/strong><br \/>\n<\/span><\/p>\n<p><span style=\"font-family: Times New Roman; font-size: 12pt;\">When we execute the command <strong>systemctl status adnisd \u2013l <\/strong>to check the status of the service, we have a message saying that we don&#8217;t have any NIS map stored in Active Directory, at this stage it is totally normal, we will publish NIS maps in Active Directory latter.<br \/>\n<\/span><\/p>\n<p><span style=\"text-decoration: underline;\"><strong>D\/ Fourth step: Check the configuration of the NIS client<br \/>\n<\/strong><\/span><\/p>\n<p><span style=\"font-family: Times New Roman; font-size: 12pt;\">1\/ some thoughts about what we are doing here\u2026<br \/>\n<\/span><\/p>\n<p><span style=\"font-family: Times New Roman; font-size: 12pt;\">At the Linux client level, it is very important to understand that we have two different components:<br \/>\n<\/span><\/p>\n<p><span style=\"font-family: Times New Roman; font-size: 12pt;\">\u2013 The Centrify DirectControl agent which provides the ability of the system to be fully integrated in Active Directory and provides the Kerberos and LDAP layers for authentication and authorization against Active Directory \u2013 Even if we have a NIS client on system to use NIS maps, the authentication is not managed by NIS but by Kerberos<br \/>\n<\/span><\/p>\n<p><span style=\"font-family: Times New Roman; font-size: 12pt;\">\u2013 The NIS client of the Linux system \u2013 this is not a component provided by Centrify agent installation, here we are using a generic client, which could be slightly different from different Linux\/UNIX forks \u2013 never mind, the generic NIS client will use &#8220;classic&#8221; NIS exchange with the Centrify NIS Gateway, so it will work<br \/>\n<\/span><\/p>\n<p><span style=\"font-family: Times New Roman; font-size: 12pt;\">The good thing with this scenario, is we will get all the advantage provided by the Centrify agent but we will be able to use legacy NIS maps. As the NIS gateway server itself is using a Centrify agent, all the communication between the NIS gateway and Active Directory is secured. Another big advantage is the fact that we will not have any more a dependency with one single NIS Master \u2013 in this scenario, the &#8220;NIS master role&#8221; is technically provided by the different AD domain controllers, as the AD domain controllers are using multi-master replication, we don&#8217;t have any single point of failure there \u2013 The NIS gateway will act as a NIS slave and will cache the information from AD on his own system, and we reply to the NIS requests from the network.<br \/>\n<\/span><\/p>\n<p><span style=\"font-family: Times New Roman; font-size: 12pt;\">It is existing other scenarios, where the NIS authentication (ok, I don&#8217;t like to use the expression &#8220;NIS authentication&#8221; because NIS is <span style=\"text-decoration: underline;\">NOT<\/span> an authentication protocol, but I make the things simple here by comparing with Kerberos\u2026) will be provided by NIS even if the NIS maps are stored in Active Directory \u2013 but in this scenario we will need to store in Active Directory a hashed version of the user passwords compatible with NIS, we will not review this particular scenario there because it is not really used anymore and above all because it is not really secured (I will even say it is not secured at all\u2026).<br \/>\n<\/span><\/p>\n<p><span style=\"font-family: Times New Roman; font-size: 12pt;\">2\/ Apply some settings at the NIS client level<br \/>\n<\/span><\/p>\n<p><span style=\"font-family: Times New Roman; font-size: 12pt;\">Perform a connection, using root, to the NIS client, in our example, the NIS client hostname is\u00a0: <strong>fedora23<\/strong>.<br \/>\n<\/span><\/p>\n<p><span style=\"font-family: Times New Roman; font-size: 12pt;\">We will first check if the <strong>ypbind<\/strong> service (the NIS client) is up and running, so let&#8217;s execute the following command: <strong>systemctl status ypbind \u2013l<\/strong><br \/>\n<\/span><\/p>\n<p><span style=\"font-family: Times New Roman; font-size: 12pt;\">If you get something like this\u00a0:<br \/>\n<\/span><\/p>\n<p><a href=\"http:\/\/identitycosmos.com\/wp-content\/uploads\/2016\/04\/capture20160406205428817.png\"><img decoding=\"async\" src=\"http:\/\/www.identitycosmos.com\/wp-content\/uploads\/2016\/04\/041616_1013_35.png\" alt=\"\" border=\"0\" \/><\/a><span style=\"font-family: Times New Roman; font-size: 12pt;\"><br \/>\n<\/span><\/p>\n<p><span style=\"font-family: Times New Roman; font-size: 12pt;\">It means the service is not started, and it means the ypbind packages are even not installed at all.<br \/>\n<\/span><\/p>\n<p><span style=\"font-family: Times New Roman; font-size: 12pt;\">To check is the package are installed or not, let&#8217;s try to start the service using this command: <strong>systemctl start ypbind \u2013l<\/strong><br \/>\n<\/span><\/p>\n<p><span style=\"font-family: Times New Roman; font-size: 12pt;\">The following message will confirm that the ypbind packages are not installed at all:<br \/>\n<\/span><\/p>\n<p><a href=\"http:\/\/identitycosmos.com\/wp-content\/uploads\/2016\/04\/capture20160406205753580.png\"><img decoding=\"async\" src=\"http:\/\/www.identitycosmos.com\/wp-content\/uploads\/2016\/04\/041616_1013_36.png\" alt=\"\" border=\"0\" \/><\/a><span style=\"font-family: Times New Roman; font-size: 12pt;\"><br \/>\n<\/span><\/p>\n<p><span style=\"font-family: Times New Roman; font-size: 12pt;\">To install the NIS client packages, execute the following command: <strong>dnf -y install ypbind rpcbind<\/strong><br \/>\n<\/span><\/p>\n<p><span style=\"font-family: Times New Roman; font-size: 12pt;\">If rpcbind was already installed, you will get this message, it is not a big deal, just ignore it\u00a0:<br \/>\n<\/span><\/p>\n<p><a href=\"http:\/\/identitycosmos.com\/wp-content\/uploads\/2016\/04\/capture20160406210235398.png\"><img decoding=\"async\" src=\"http:\/\/www.identitycosmos.com\/wp-content\/uploads\/2016\/04\/041616_1013_37.png\" alt=\"\" border=\"0\" \/><\/a><span style=\"font-family: Times New Roman; font-size: 12pt;\"><br \/>\n<\/span><\/p>\n<p><span style=\"font-family: Times New Roman; font-size: 12pt;\">In all the situations, you may obtain something like that at the end of the packages installation:<br \/>\n<\/span><\/p>\n<p><a href=\"http:\/\/identitycosmos.com\/wp-content\/uploads\/2016\/04\/capture20160406210435735.png\"><img decoding=\"async\" src=\"http:\/\/www.identitycosmos.com\/wp-content\/uploads\/2016\/04\/041616_1013_38.png\" alt=\"\" border=\"0\" \/><\/a><span style=\"font-family: Times New Roman; font-size: 12pt;\"><br \/>\n<\/span><\/p>\n<p><span style=\"font-family: Times New Roman; font-size: 12pt;\">After packages installation, I advise you to restart the system, it is not purely technically a requirement, but I was used to be a Microsoft Guy\u00a0\ud83d\ude09<br \/>\n<\/span><\/p>\n<p><span style=\"font-family: Times New Roman; font-size: 12pt;\">Never mind if you just installed the NIS client packages or if you were using it during years before this tuto, we will now stop the ypbind service on the client to apply some settings at the NIS client level: <strong>systemctl status ypbind \u2013l<\/strong><br \/>\n<\/span><\/p>\n<p><span style=\"font-family: Times New Roman; font-size: 12pt;\">To be sure we will not have bad behavior because of previous settings\/usage, we will delete all the files which are in the var\/yp\/binding directory: <strong>rm -rf \/var\/yp\/binding\/*<\/strong><br \/>\n<\/span><\/p>\n<p><span style=\"font-family: Times New Roman; font-size: 12pt;\">Now, we will define the NIS domain name at the client level \u2013 remember, by default, the NIS domain name is equal to the Centrify zone name where our NIS Gateway is acting, in our example, the zone name is <strong>arizona<\/strong>. So let&#8217;s execute the command: <strong>domainname arizona<\/strong><br \/>\n<\/span><\/p>\n<p><a href=\"http:\/\/identitycosmos.com\/wp-content\/uploads\/2016\/04\/capture20160406211557943.png\"><img decoding=\"async\" src=\"http:\/\/www.identitycosmos.com\/wp-content\/uploads\/2016\/04\/041616_1013_39.png\" alt=\"\" border=\"0\" \/><\/a><span style=\"font-family: Times New Roman; font-size: 12pt;\"><br \/>\n<\/span><\/p>\n<p><span style=\"font-family: Times New Roman; font-size: 12pt;\">Then, we will edit the <strong>\/etc\/yp.conf<\/strong> file to set the NIS domain name and the NIS Gateway hostname \u2013 in our example, we need to add the value: <strong>domain arizona server nisserver01<\/strong><br \/>\n<\/span><\/p>\n<p><span style=\"font-family: Times New Roman; font-size: 12pt;\">Example, with the <strong>nano<\/strong> editor:<br \/>\n<\/span><\/p>\n<p><a href=\"http:\/\/identitycosmos.com\/wp-content\/uploads\/2016\/04\/capture20160406211932335.png\"><img decoding=\"async\" src=\"http:\/\/www.identitycosmos.com\/wp-content\/uploads\/2016\/04\/041616_1013_40.png\" alt=\"\" border=\"0\" \/><\/a><span style=\"font-family: Times New Roman; font-size: 12pt;\"><br \/>\n<\/span><\/p>\n<p><span style=\"font-family: Times New Roman; font-size: 12pt;\">If you are using nano, after editing the value, let&#8217;s use Ctrl+O &amp; Ctrl+X<br \/>\n<\/span><\/p>\n<p><span style=\"font-family: Times New Roman; font-size: 12pt;\">Now, let&#8217;s start the ypbind service: <strong>systemctl start ypbind \u2013l<\/strong><br \/>\n<\/span><\/p>\n<p><span style=\"font-family: Times New Roman; font-size: 12pt;\">You can check the service status using this command\u00a0: <strong>systemctl status ypbind \u2013l<\/strong><br \/>\n<\/span><\/p>\n<p><a href=\"http:\/\/identitycosmos.com\/wp-content\/uploads\/2016\/04\/capture20160406213506789.png\"><img decoding=\"async\" src=\"http:\/\/www.identitycosmos.com\/wp-content\/uploads\/2016\/04\/041616_1013_41.png\" alt=\"\" border=\"0\" \/><\/a><span style=\"font-family: Times New Roman; font-size: 12pt;\"><br \/>\n<\/span><\/p>\n<p><span style=\"font-family: Times New Roman; font-size: 12pt;\"><span style=\"text-decoration: underline;\">Note<\/span>: if the NIS client is not able to contact the NIS server, so the NIS client service will not start. If you get an error when you try to start the NIS client service, the first thing to do is to disable the firewall service on the NIS server (use the following command to stop the firewall on a fedora system: <strong>systemctl stop firewalld \u2013l<\/strong> )<br \/>\n<\/span><\/p>\n<p><span style=\"font-family: Times New Roman; font-size: 12pt;\">At this stage, we have a NIS server and a NIS client which are able to communicate each other, let&#8217;s publish some NIS maps in Active Directory now !<br \/>\n<\/span><\/p>\n<p><span style=\"text-decoration: underline;\"><strong>E\/ Fifth step: Publish some NIS maps in Active DIrectory<br \/>\n<\/strong><\/span><\/p>\n<p><span style=\"font-family: Times New Roman; font-size: 12pt;\">In this tutorial, we will use the Centrify graphical tool &#8220;Centrify Access Manager&#8221; to publish some information in the NIS maps, but you can do it using different ways (LDP command for example).<br \/>\n<\/span><\/p>\n<p><span style=\"font-family: Times New Roman; font-size: 12pt;\">Start the Centrify Access Manager tool, and go the Centrify zone (<strong>arizona<\/strong> in our example) \u2013 Then go to &#8216;Unix Data&#8217;, then &#8216;NIS maps&#8217; node. Right-click on the node and choose &#8216;New \/ Generic Map&#8217;:<br \/>\n<\/span><\/p>\n<p><a href=\"http:\/\/identitycosmos.com\/wp-content\/uploads\/2016\/04\/capture20160406214146188.png\"><img decoding=\"async\" src=\"http:\/\/www.identitycosmos.com\/wp-content\/uploads\/2016\/04\/041616_1013_42.png\" alt=\"\" border=\"0\" \/><\/a><span style=\"font-family: Times New Roman; font-size: 12pt;\"><br \/>\n<\/span><\/p>\n<p><span style=\"font-family: Times New Roman; font-size: 12pt;\">In our example, we will create a Generic Map, i.e. a map used to store text information with no direct relation with something used by the Linux system itself. For sure, you create some &#8216;classic&#8217; NIS maps like Automount or Netgroup, but we will not cover the usage of these NIS maps in this article.<br \/>\n<\/span><\/p>\n<p><span style=\"font-family: Times New Roman; font-size: 12pt;\">In this example, the NIS maps name is <strong>test<\/strong> and we have a key <strong>test01<\/strong> with the value <strong>test0101<\/strong>:<br \/>\n<\/span><\/p>\n<p><a href=\"http:\/\/identitycosmos.com\/wp-content\/uploads\/2016\/04\/capture20160406214457532.png\"><img decoding=\"async\" src=\"http:\/\/www.identitycosmos.com\/wp-content\/uploads\/2016\/04\/041616_1013_43.png\" alt=\"\" border=\"0\" \/><\/a><span style=\"font-family: Times New Roman; font-size: 12pt;\"><br \/>\n<\/span><\/p>\n<p><span style=\"font-family: Times New Roman; font-size: 12pt;\">From the NIS client, execute the following command: <strong>ypcat test<\/strong> \u2013 you may get the values from the NIS map <strong>test<\/strong>\u00a0:<br \/>\n<\/span><\/p>\n<p><a href=\"http:\/\/identitycosmos.com\/wp-content\/uploads\/2016\/04\/capture20160406214750560.png\"><img decoding=\"async\" src=\"http:\/\/www.identitycosmos.com\/wp-content\/uploads\/2016\/04\/041616_1013_44.png\" alt=\"\" border=\"0\" \/><\/a><span style=\"font-family: Times New Roman; font-size: 12pt;\"><br \/>\n<\/span><\/p>\n<p><span style=\"font-family: Times New Roman; font-size: 12pt;\">Here we go, it is working fine !<br \/>\n<\/span><\/p>\n<p><span style=\"font-family: Times New Roman; font-size: 12pt;\">With the <strong>ypwhich<\/strong> command you will be able to confirm the NIS server name used by the NIS client (so in our example, it is the NIS Gateway hostname:<br \/>\n<\/span><\/p>\n<p><a href=\"http:\/\/identitycosmos.com\/wp-content\/uploads\/2016\/04\/capture20160407091449128.png\"><img decoding=\"async\" src=\"http:\/\/www.identitycosmos.com\/wp-content\/uploads\/2016\/04\/041616_1013_45.png\" alt=\"\" border=\"0\" \/><\/a><span style=\"font-family: Times New Roman; font-size: 12pt;\"><br \/>\n<\/span><\/p>\n<p><span style=\"text-decoration: underline;\"><strong>F\/ One step beyond\u2026<br \/>\n<\/strong><\/span><\/p>\n<p><span style=\"font-family: Times New Roman; font-size: 12pt;\">1\/ Generated NIS maps<br \/>\n<\/span><\/p>\n<p><span style=\"font-family: Times New Roman; font-size: 12pt;\">Let&#8217;s now explore, some advance details. To get the list of NIS maps from a NIS master server you need to execute the following command <strong>ypwhich \u2013m<br \/>\n<\/strong><\/span><\/p>\n<p><a href=\"http:\/\/identitycosmos.com\/wp-content\/uploads\/2016\/04\/capture20160407091953853.png\"><img decoding=\"async\" src=\"http:\/\/www.identitycosmos.com\/wp-content\/uploads\/2016\/04\/041616_1013_46.png\" alt=\"\" border=\"0\" \/><\/a><span style=\"font-family: Times New Roman; font-size: 12pt;\"><br \/>\n<\/span><\/p>\n<p><span style=\"font-family: Times New Roman; font-size: 12pt;\">Here you can note two important things:<br \/>\n<\/span><\/p>\n<p><span style=\"font-family: Times New Roman; font-size: 12pt;\">(1) from a NIS client, the NIS gateway is considered as NIS master server<br \/>\n<\/span><\/p>\n<p><span style=\"font-family: Times New Roman; font-size: 12pt;\">(2) we created only one NIS map (test) in d&#8217;Active Directory but the NIS client is able the \u00ab\u00a0see\u00a0\u00bb four other NIS maps\u00a0: <strong>passwd.byuid<\/strong> \/ <strong>passwd.byname<\/strong> \/ <strong>group.byname<\/strong> \/ <strong>group.bygid<\/strong> \u2013 These four maps are what we call &#8216;derived maps&#8217;, there are implicited generated from Active Directory data \u2013 In fact, at the system level (NIS client side), the NIS client needs to have a visibility of these four maps, so you don&#8217;t need to create it, the Centrify NIS gateway will create it and update it for you. So the <strong>passwd.byuid<\/strong> and <strong>passwd.byname<\/strong> maps will be automatically generated from the UNIX user profiles from the <strong>arizona<\/strong> zone, and the <strong>group.byname<\/strong> and <strong>group.bygid<\/strong> maps will be automatically generated from the UNIX group profiles from the <strong>arizona<\/strong> zone. Remember, behind the scene, the UNIX user profiles and the UNIX group profiles are linked with &#8216;real&#8217; Active Directory user and group objects.<br \/>\n<\/span><\/p>\n<p><span style=\"font-family: Times New Roman; font-size: 12pt;\">If you are using the command <strong>ypwhich \u2013x<\/strong> you will be able to see the correspondence between NIS maps aliases and the real technical name of such NIS maps.<br \/>\n<\/span><\/p>\n<p><a href=\"http:\/\/identitycosmos.com\/wp-content\/uploads\/2016\/04\/capture20160407092842774.png\"><img decoding=\"async\" src=\"http:\/\/www.identitycosmos.com\/wp-content\/uploads\/2016\/04\/041616_1013_47.png\" alt=\"\" border=\"0\" \/><\/a><span style=\"font-family: Times New Roman; font-size: 12pt;\"><br \/>\n<\/span><\/p>\n<p><span style=\"font-family: Times New Roman; font-size: 12pt;\">If you are using the command <strong>ypcat passwd<\/strong> you will be able to see the content of the generated map <strong>passwd.byname<\/strong> which is the list of the UNIX user profiles from the zone <strong>arizona<\/strong>\u00a0:<br \/>\n<\/span><\/p>\n<p><a href=\"http:\/\/identitycosmos.com\/wp-content\/uploads\/2016\/04\/capture20160407093232688.png\"><img decoding=\"async\" src=\"http:\/\/www.identitycosmos.com\/wp-content\/uploads\/2016\/04\/041616_1013_48.png\" alt=\"\" border=\"0\" \/><\/a><span style=\"font-family: Times New Roman; font-size: 12pt;\"><br \/>\n<\/span><\/p>\n<p><span style=\"font-family: Times New Roman; font-size: 12pt;\">To fully understand this feature, you can open the graphical tool Centrify Access Manager and check the list of UNIX user profiles from the <strong>arizona<\/strong> zone, you will exactly the same list\u00a0:<br \/>\n<\/span><\/p>\n<p><a href=\"http:\/\/identitycosmos.com\/wp-content\/uploads\/2016\/04\/capture20160407093603198.png\"><img decoding=\"async\" src=\"http:\/\/www.identitycosmos.com\/wp-content\/uploads\/2016\/04\/041616_1013_49.png\" alt=\"\" border=\"0\" \/><\/a><span style=\"font-family: Times New Roman; font-size: 12pt;\"><br \/>\n<\/span><\/p>\n<p><span style=\"font-family: Times New Roman; font-size: 12pt;\">2\/ NIS maps objects in Active Directory<br \/>\n<\/span><\/p>\n<p><span style=\"font-family: Times New Roman; font-size: 12pt;\">We can check how the NIS maps objects are stored in Active Directory \u2013 let&#8217;s use Microsoft Active Directory Users and Computers tool (ADUC) or a basic LDAP client to do so.<br \/>\n<\/span><\/p>\n<p><span style=\"font-family: Times New Roman; font-size: 12pt;\">If you go to the zones containers, you will be able to see all the Centrify zones you created (not cover by this article) \u2013 select the <strong>arizona<\/strong> zone, and the NisMaps container, you will list the NIS map we created, means the <strong>test<\/strong> NIS map.<br \/>\n<\/span><\/p>\n<p><span style=\"font-family: Times New Roman; font-size: 12pt;\">Under the <strong>test<\/strong> container (our NIS map), you will see the entry we create named <strong>test01<\/strong>:<br \/>\n<\/span><\/p>\n<p><a href=\"http:\/\/identitycosmos.com\/wp-content\/uploads\/2016\/04\/capture20160407084650968.png\"><img decoding=\"async\" src=\"http:\/\/www.identitycosmos.com\/wp-content\/uploads\/2016\/04\/041616_1013_50.png\" alt=\"\" border=\"0\" \/><\/a><span style=\"font-family: Times New Roman; font-size: 12pt;\"><br \/>\n<\/span><\/p>\n<p><span style=\"font-family: Times New Roman; font-size: 12pt;\">If you do right-click on the <strong>test01<\/strong> object and choose &#8216;Properties&#8217; (with ADUC, Attribut Editor), you will see the different values from the different attributes used by Centrify to store the information:<br \/>\n<\/span><\/p>\n<p><a href=\"http:\/\/identitycosmos.com\/wp-content\/uploads\/2016\/04\/capture20160407085502254.png\"><img decoding=\"async\" src=\"http:\/\/www.identitycosmos.com\/wp-content\/uploads\/2016\/04\/041616_1013_51.png\" alt=\"\" border=\"0\" \/><\/a><span style=\"font-family: Times New Roman; font-size: 12pt;\"><br \/>\n<\/span><\/p>\n<p><span style=\"font-family: Times New Roman; font-size: 12pt;\">If you look at three specific attributes, we will review the values we put in the system with the Centrify Access Manager tool for our test map \u2013 as a reminder:<br \/>\n<\/span><\/p>\n<p><a href=\"http:\/\/identitycosmos.com\/wp-content\/uploads\/2016\/04\/capture20160407085643363.png\"><img decoding=\"async\" src=\"http:\/\/www.identitycosmos.com\/wp-content\/uploads\/2016\/04\/041616_1013_52.png\" alt=\"\" border=\"0\" \/><\/a><span style=\"font-family: Times New Roman; font-size: 12pt;\"><br \/>\n<\/span><\/p>\n<p><span style=\"font-family: Times New Roman; font-size: 12pt;\">These are the three attributes:<br \/>\n<\/span><\/p>\n<p><span style=\"font-family: Times New Roman; font-size: 12pt;\">KEY: (description)<br \/>\n<\/span><\/p>\n<p><a href=\"http:\/\/identitycosmos.com\/wp-content\/uploads\/2016\/04\/capture20160407085942866.png\"><img decoding=\"async\" src=\"http:\/\/www.identitycosmos.com\/wp-content\/uploads\/2016\/04\/041616_1013_53.png\" alt=\"\" border=\"0\" \/><\/a><span style=\"font-family: Times New Roman; font-size: 12pt;\"><br \/>\n<\/span><\/p>\n<p><span style=\"font-family: Times New Roman; font-size: 12pt;\">VALUE: (adminDescription)<br \/>\n<\/span><\/p>\n<p><a href=\"http:\/\/identitycosmos.com\/wp-content\/uploads\/2016\/04\/capture20160407085806729.png\"><img decoding=\"async\" src=\"http:\/\/www.identitycosmos.com\/wp-content\/uploads\/2016\/04\/041616_1013_54.png\" alt=\"\" border=\"0\" \/><\/a><span style=\"font-family: Times New Roman; font-size: 12pt;\"><br \/>\n<\/span><\/p>\n<p><span style=\"font-family: Times New Roman; font-size: 12pt;\">COMMENTS: (wWWHomePage)<br \/>\n<\/span><\/p>\n<p><a href=\"http:\/\/identitycosmos.com\/wp-content\/uploads\/2016\/04\/capture20160407090045656.png\"><img decoding=\"async\" src=\"http:\/\/www.identitycosmos.com\/wp-content\/uploads\/2016\/04\/041616_1013_55.png\" alt=\"\" border=\"0\" \/><\/a><span style=\"font-family: Times New Roman; font-size: 12pt;\"><br \/>\n<\/span><\/p>\n<p><span style=\"font-family: Times New Roman; font-size: 12pt;\">For sure, you will be able to use Active Directory ACLs Active Directory to provide access and delegation for such NIS map or even some specific rights on a specific value: this is very useful to define the NIS administrators AD group which will be able to create or update NIS map values in the future:<br \/>\n<\/span><\/p>\n<p><a href=\"http:\/\/identitycosmos.com\/wp-content\/uploads\/2016\/04\/capture20160407090422802.png\"><img decoding=\"async\" src=\"http:\/\/www.identitycosmos.com\/wp-content\/uploads\/2016\/04\/041616_1013_56.png\" alt=\"\" border=\"0\" \/><\/a><span style=\"font-family: Times New Roman; font-size: 12pt;\"><br \/>\n<\/span><\/p>\n<p><span style=\"font-family: Times New Roman; font-size: 12pt;\">The main difference for the UNIX administrator will be the interface. As now the NIS maps are stored in Active Directory, they will use a LDAP Browser, the Centrify graphical tool or some LDAP script to maintain the NIS maps contain.<br \/>\n<\/span><\/p>\n<p><span style=\"font-family: Times New Roman; font-size: 12pt;\">At the end, the ideal situation will be to use a IAM tool such MIM for example to manage the NIS maps lifecycle with delegation, workflow, approval and activity logs !<br \/>\n<\/span><\/p>\n<p><span style=\"font-family: Times New Roman; font-size: 12pt;\"><strong>We did it\u00a0!<br \/>\n<\/strong><\/span><\/p>\n<p><span style=\"font-family: Times New Roman; font-size: 12pt;\">Now, this tutorial is finished. Don&#8217;t hesitate to add some comments or contact me if you have any questions. Let&#8217;s discuss on twitter (@sylvaincortes) or by <a href=\"http:\/\/www.identitycosmos.com\/sylvain-cortes_mvp\">email<\/a> if you have a NIS migration project, we can help you \ud83d\ude09<br \/>\n<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>I received a lot, I mean a lot, of requests after I had published my 3 last posts about the storage of NIS maps in Active Directory [http:\/\/bit.ly\/1S4gKUG &#8211; http:\/\/bit.ly\/1qvvyzr &#8211; http:\/\/bit.ly\/1q8iAHi ] \u2013 The main problem was my posts are in French \ud83d\ude09 and a lot of people tried to use Google Translate to get it, but it wasn&#8217;t perfect. So, from the popular demand, I decided to translate it in English. English is not my native language, so sorry in advance if you will find some &#8216;bugs&#8217; in the text.<\/p>\n<p>As I explained in one of my last post (sorry again in French !), Microsoft announced it will not implement some Unix Services in Windows 2016 and Active Directory 2016 anymore, including NIS Services.<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3,7],"tags":[14,62,135,138,160,239],"class_list":["post-1497","post","type-post","status-publish","format-standard","hentry","category-centrify","category-technique","tag-active-directory","tag-centrify","tag-ldap","tag-linux","tag-nis","tag-unix"],"_links":{"self":[{"href":"https:\/\/identitycosmos.com\/index.php\/wp-json\/wp\/v2\/posts\/1497","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/identitycosmos.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/identitycosmos.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/identitycosmos.com\/index.php\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/identitycosmos.com\/index.php\/wp-json\/wp\/v2\/comments?post=1497"}],"version-history":[{"count":0,"href":"https:\/\/identitycosmos.com\/index.php\/wp-json\/wp\/v2\/posts\/1497\/revisions"}],"wp:attachment":[{"href":"https:\/\/identitycosmos.com\/index.php\/wp-json\/wp\/v2\/media?parent=1497"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/identitycosmos.com\/index.php\/wp-json\/wp\/v2\/categories?post=1497"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/identitycosmos.com\/index.php\/wp-json\/wp\/v2\/tags?post=1497"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}