IT Configuration Guide
Transcription
IT Configuration Guide
SAMPLE PAGES IT Configuration Guide For Your Mac Evaluation (Version 4.0) IT Configuration Guide—For Your Mac Evaluation (Version 4.0) SAMPLE PAGES Table of Contents Introduction .......................................................................................1 1 Imaging ...............................................................................2 1.1 1.2 1.2.1 1.2.1.1 1.2.2 1.3 1.3.1 1.3.2 1.3.3 1.3.4 1.3.5 1.3.5.1 1.3.5.2 1.3.5.3 1.3.5.4 1.3.5.5 1.3.5.6 1.4 1.4.1 1.4.1.1 1.4.1.2 1.4.1.3 1.4.2 1.4.3 1.5 1.5.1 Imaging Mac Computers ........................................................................................2 Creating Packages .....................................................................................................3 Creating Packages with PackageMaker............................................................4 Creating a Snapshot Package with PackageMaker......................................8 Creating Packages with Third-Party Utilities ................................................15 Creating Images with System Image Utility ................................................16 NetInstall from Installer ........................................................................................17 NetRestore from Installer .....................................................................................20 Using NetRestore from a Prepared Volume .................................................23 Creating NetRestore NetBoot Sets...................................................................26 Automations with System Image Utility .......................................................29 Creating an Installation DVD ..............................................................................36 Adding Patches and Upgrades ..........................................................................38 Adding Post-Install Scripts ..................................................................................39 Adding Additional Software ...............................................................................40 Adding Configuration Profiles ...........................................................................41 Additional System Image Utility Preferences ..............................................42 Creating an Image via a Configured Mac .....................................................43 Preparing a System for Imaging........................................................................44 Removing Unneeded LKDC Information.......................................................45 Removing .DS_Store Files ....................................................................................47 Removing Other System Files ............................................................................48 Customizing the Default User Template .......................................................49 Self-Removing Scripts ...........................................................................................50 Creating Images with Disk Utility .....................................................................52 Creating a Disk Image from the Command Line .......................................56 2 Deployment .....................................................................57 2.1 2.1.1 2.1.2 2.2 2.2.1 2.2.2 2.2.3 2.2.4 2.2.5 2.2.6 2.2.7 2.2.8 2.3 Local Deployment ..................................................................................................58 Creating a Bootable Disk or Volume Using NetInstall .............................59 Deploying with Disk Utility .................................................................................61 NetInstall Image Creation ....................................................................................62 Configuring a NetBoot Server............................................................................65 Custom Source NetRestore .................................................................................68 Unicast Apple Software Restore (ASR) ...........................................................70 Multicast Apple Software Restore (mASR) ...................................................71 Third-Party Deployment Solutions...................................................................73 Setting Clients to NetBoot Using the Bless Command ...........................74 Using NetBoot DHCP Helpers ............................................................................75 bootpd Relay ............................................................................................................76 Minimal Touch Deployments .............................................................................77 3 Support and Maintenance .............................................78 3.1 Asset Tags ...................................................................................................................79 ii IT Configuration Guide—For Your Mac Evaluation (Version 4.0) SAMPLE PAGES 3.2 3.2.1 3.2.2 3.2.3 3.2.4 3.3 3.4 3.4.1 3.4.2 3.5 3.6 Apple Remote Desktop ........................................................................................80 Apple Remote Desktop and Computer Lists ...............................................81 Deploying Applications ........................................................................................85 Inventory Tools .........................................................................................................88 Apple Remote Desktop Task Server ................................................................90 Software Update Policy ........................................................................................91 OS X Lion Server Software Update Service ..................................................92 Configuring Software Update Server Clients ..............................................95 Cascading Software Update Service ...............................................................97 Third-Party Software Update Service .............................................................99 Client Management Suites ...............................................................................100 4 Directory Services .........................................................101 4.1 4.1.1. 4.1.1.1 Local Directory Services ....................................................................................102 Creating Local Administrative Accounts .....................................................104 Creating a Local Administrative Account Using System Preferences ......................................................................................................................................105 Creating a Local Administrative Account Using the Command Line ......................................................................................................................................107 Hiding a Local Account ......................................................................................109 Making Changes to the Local Administrative Account ........................110 Nesting Network Admins in a Local Administrative Group ................111 Creating a Local Administrative Account with a Package or Script.113 Open Directory ......................................................................................................114 Setting Up an Open Directory Master .........................................................115 Preparing for Binding to Open Directory ...................................................121 Binding to Open Directory Using the Users & Groups Pane in System Preferences ..............................................................................................................123 Custom Binding Operations ............................................................................127 Binding to Open Directory Using the Command Line .........................134 Binding to Open Directory Using a Post-Installation Script ...............136 Using Workgroup Manager to Create New Users ...................................137 Setting Up an Open Directory Replica ........................................................142 Active Directory ....................................................................................................145 Binding to Active Directory ..............................................................................146 Binding to Active Directory Using Directory Utility ...............................147 Testing and Verifying Active Directory Binding Information ..............151 Binding to Active Directory from the Command Line ..........................155 Binding to Active Directory Using a Script ................................................158 Binding to Active Directory Using a Post-Install Script.........................159 Active Directory Plug-in Troubleshooting Commands .........................160 Mapping the UID and GID with Directory Utility ....................................164 Mapping UID, User GID, and Group GID Using dsconfigad.................168 Setting a User Home Directory .......................................................................169 Namespace Support Using dsconfigad.......................................................174 Active Directory Packet Encryption Options.............................................175 SSL Binding Instructions ....................................................................................176 Managing Certificates from the Command Line.....................................177 Active Directory Computer Password Changes .......................................178 Third-Party Active Directory Plug-Ins ...........................................................179 4.1.1.2 4.1.1.3 4.1.1.4 4.1.2 4.1.3 4.2 4.2.1 4.2.2 4.2.2.1 4.2.2.2 4.2.3 4.2.4 4.2.5 4.2.6 4.3 4.3.1 4.3.1.1 4.3.1.2 4.3.1.3 4.3.1.4 4.3.1.5 4.3.1.6 4.3.2 4.3.2.1 4.3.3 4.3.4 4.3.5 4.3.6 4.3.7 4.3.8 4.4 iii IT Configuration Guide—For Your Mac Evaluation (Version 4.0) SAMPLE PAGES 4.5 4.5.1 4.5.1.1 4.5.1.2 4.5.2 4.6 4.7 4.8 4.8.1 4.8.2 4.9 4.9.1 4.9.2 4.9.3 LDAP ..........................................................................................................................180 Binding to LDAP....................................................................................................181 Simple Binding.......................................................................................................182 Trusted Binding......................................................................................................185 Mapping LDAP Attributes .................................................................................189 NIS ..............................................................................................................................194 Kerberos ...................................................................................................................197 Dual Directory Configuration ..........................................................................198 Setting Up Dual Directory ................................................................................199 Nesting Active Directory Groups in Open Directory .............................211 Distributed File Sharing .....................................................................................214 Connecting to DFS Shares ................................................................................215 Viewing DFS with smbutil.................................................................................216 Third-Party DFS Solutions .................................................................................218 5 Policy Management ......................................................219 5.1 5.1.1 5.1.2 5.1.3 5.1.4 5.1.5 5.1.6 5.1.7 5.1.8 5.1.9 5.1.10 5.1.11 5.1.12 5.1.13 5.1.14 5.1.15 5.1.16 5.1.17 5.1.18 5.1.19 5.1.20 5.2 5.2.1 5.2.2 5.2.3 5.2.4 5.2.5 5.3 5.3.1 5.3.2 5.3.3 5.4 5.4.1 5.4.1.1 Setting Up a Profile Server................................................................................220 Configuring Network Settings ........................................................................221 Configuring Users ................................................................................................223 Adding Users ..........................................................................................................226 Reviewing Certificates ........................................................................................229 Acquiring Apple Push Notification Certificates........................................232 Enabling Profile Manager ..................................................................................235 Automatic Push Versus Manual Download Profiles ...............................239 Editing Management Profiles ..........................................................................240 Creating Device Groups .....................................................................................244 Using Device Placeholders ...............................................................................247 Enrolling Devices Running OS X Lion ..........................................................249 Locking a Device via the User Portal ............................................................251 Wiping a Device via the User Portal .............................................................253 Locking a Device Using Profile Manager ....................................................254 Wiping a Device Using Profile Manager .....................................................256 Removing a Mac from Management via the User Portal.....................258 Removing Management Using Profile Manager .....................................259 Profile System Preferences................................................................................261 Forcing Management Profiles .........................................................................263 The profiles Command .......................................................................................265 Managed Preferences .........................................................................................266 Obtaining Effective Managed Preferences ................................................267 Refreshing Policy Data .......................................................................................269 Graphical User Interface Managed Preferences Reporting .................270 Importing Managed Preferences Manifests ..............................................272 Importing Application Preferences ...............................................................277 Local Policy .............................................................................................................282 Creating a Local Computer Account with dscl.........................................283 Managed Preferences dscl Extensions ........................................................285 Importing and Exporting Managed Preferences Using dscl ..............287 Directory Policy .....................................................................................................288 Open Directory ......................................................................................................289 Managed Preferences Using Workgroup Manager ................................290 iv IT Configuration Guide—For Your Mac Evaluation (Version 4.0) SAMPLE PAGES 5.4.1.2 5.4.2 5.4.2.1 5.4.2.2 5.4.3 5.4.3.1 5.4.3.2 Using Workgroup Manager to Whitelist Windows Servers .................293 Active Directory ....................................................................................................295 Extending the Active Directory Schema on Windows Servers..........296 Managed Preferences Using Dual Directory .............................................308 LDAP ..........................................................................................................................312 Adding Apple Schema to Third-Party OpenLDAP...................................313 Integrating a Third-Party Schema into Open Directory .......................314 6 Security ...........................................................................316 6.1 6.2 6.3 6.3.1 6.3.2 6.4 6.5 6.5.1 6.5.2 6.6 6.6.1 6.6.2 6.7 6.8 6.9 6.9.1 6.9.1.1 6.9.1.2 6.9.2 6.10 6.10.1 6.10.2 6.10.3 6.10.4 6.10.5 6.10.6 6.10.7 6.10.8 6.11 6.12 Security Resources ...............................................................................................316 Application Restrictions .....................................................................................317 Password Policies .................................................................................................320 Auditing Local Password Policies ...................................................................324 Setting Local Password Policies ......................................................................327 Setting an Open Firmware Password ...........................................................328 SSH Access...............................................................................................................329 Key-Based SSH Access ........................................................................................330 SSH Tunnel...............................................................................................................332 FileVault 2 Full Disk Encryption.......................................................................333 Migrating from FileVault to FileVault 2 ........................................................343 FileVault 2 FDE Master Passwords .................................................................345 Third-Party Full Disk Encryption......................................................................347 Host-Based Intrusion Detection System .....................................................348 Network Firewall ...................................................................................................351 Application Layer Firewall .................................................................................352 Configuring the Application Layer Firewall ...............................................353 Managing the Application Layer Firewall from Terminal .....................357 ipfw ............................................................................................................................359 Keychain Usage and Management ...............................................................361 Accessing and Viewing Keychain Contents ...............................................363 Selecting Specific Categories of Keychain Items.....................................365 Enabling MobileMe and Directory Services Searching for Certificates ......................................................................................................................................366 Enabling Certificate Revocation Checking.................................................367 Importing Items into a Keychain via the GUI............................................368 Importing Items into a Keychain from within Keychain Access .......369 Exporting Items from a Keychain...................................................................371 Exporting Items from a Keychain via the GUI...........................................373 Encrypted Time Machine Backups ................................................................374 Third-Party Smart Card Service Options .....................................................379 7 Networking/Wireless ....................................................380 7.1 7.2 7.3 7.4 7.5 7.6 7.7 7.8 IPv4 Networking....................................................................................................381 IPv6 Networking....................................................................................................389 Network Setup Assistant for Wired and Wireless ....................................392 Network Diagnostics for Wired and Wireless ............................................396 VLAN Wired Network Deployment ...............................................................399 Networking Command Line Interface .........................................................403 Virtual Private Network ......................................................................................406 Network Security Overview .............................................................................416 v IT Configuration Guide—For Your Mac Evaluation (Version 4.0) SAMPLE PAGES 7.8.1 7.8.2 7.8.3 7.8.4 7.8.5 7.8.6 7.9 7.10 7.11 7.12 WPA/TKIP—PSK .....................................................................................................417 WPA2/AES—PSK....................................................................................................419 WPA2/AES 802.1X—PEAP/MSCHAPv2 .........................................................421 WPA2/AES 802.1X—EAP/TLS ............................................................................427 WPA2/AES 802.1X—TTLS ...................................................................................434 WPA2/AES 802.1X — EAP/FAST.......................................................................441 Importing and Exporting 802.1X Profiles ...................................................449 Using 802.1X ...........................................................................................................452 Securing a Certificate from a Windows CA ................................................454 Trusting Certificates from the Command Line .........................................457 8 Collaboration .................................................................458 8.1 8.1.1 8.1.2 8.1.3 8.2 Microsoft Exchange Integration .....................................................................459 Using Mail, iChat, and Address Book with Exchange ............................460 Enabling S/MIME in Mail....................................................................................465 Enabling Out-of-Office in Mail ........................................................................466 Connecting to and Troubleshooting Mail, iCal, and Address Book with Microsoft Exchange...................................................................................468 DNS ............................................................................................................................469 Improper Redirects/Certificate Errors ..........................................................470 Limits on Message Size ......................................................................................471 Additional Troubleshooting Resources .......................................................473 Troubleshooting Microsoft Outlook 2011 ...................................................474 Additional Microsoft Outlook 2011 Information.......................................475 Connecting to Microsoft SharePoint ............................................................476 Additional Microsoft SharePoint Information...........................................478 Instant Messaging ................................................................................................479 iChat and FaceTime .............................................................................................480 Microsoft Office Communications Servers ................................................483 AirDrop .....................................................................................................................486 Deactivating AirDrop ..........................................................................................487 Debugging AirDrop ............................................................................................490 Additional AirDrop Information......................................................................491 8.2.1 8.2.2 8.2.3 8.2.4 8.3 8.3.1 8.4 8.4.1 8.5 8.5.1 8.5.2 8.6 8.6.1 8.6.2 8.6.3 © 2011 Apple Inc. All rights reserved. Apple, the Apple logo, AirPort, AirPort Extreme, AppleScript, Bonjour, FileVault, Finder, FireWire, iCal, Mac, MacBook, MacBook Air, Mac OS, QuickTime, Safari, Spotlight, Time Machine, and Xcode are trademarks of Apple Inc., registered in the U.S. and other countries. Apple Remote Desktop is a trademarks of Apple Inc. Mac App Store is a service mark of Apple Inc. Intel is a trademark of Intel Corp. in the U.S. and other countries. Java is a registered trademark of Oracle and/or its affiliates. UNIX is a registered trademark of The Open Group. OS X version 10.7 Lion is an Open Brand UNIX 03 Registered Product. Other product and company names mentioned herein may be trademarks of their respective companies. Product specifications are subject to change without notice. This material is provided for information purposes only; Apple assumes no liability related to its use. vi SAMPLE PAGES Introduction This configuration guide is designed to help IT professionals who are evaluating and deploying OS X Lion on Mac computers in medium to large organizations. Each section contains multiple modules that cover different topics with step-by-step instructions. Using this guide, organizations can accelerate testing and planning to begin a proof of concept, or broader enduser test, of Mac computers. Not all modules within this guide require extensive review for a single Mac deployment plan, as many are mutually exclusive. For example, this guide includes Directory Services modules that cover Open Directory, Active Directory, Lightweight Directory Access Protocol (LDAP),, and other techniques. Most organizations will choose the one that best meets their needs. Before using this guide, consult with your Apple sales representative or Apple Authorized Reseller for assistance in determining the right modules for your environment. This guide covers a wide range of topics critical to successfully deploying Mac computers in large commercial and government organizations including: • • • • • • • • Imaging Deployment Support and Maintenance Directory Services Policy Management Security Networking/Wireless Collaboration For more information, contact your Apple Authorized Reseller or Apple account team. © 2011 Apple Inc. 1 IT Configuration Guide—For Your Mac Evaluation (Version 4.0) SAMPLE PAGES 4.3 Active Directory Active Directory is Microsoft’s directory services solution. Active Directory provides information on users, groups, and computers (information stored in LDAP), password management and encryption (using Kerberos ), and the ability to find objects on a network. Information in Active Directory is used to manage users, computers, groups, printers, and other resources. Administrators can also assign policies to Windows computers using Group Policy Objects. Active Directory deployments vary from smaller environments with a few hundred objects to larger environments with thousands (or millions) of users and systems distributed across a number of sites. Mac computers can be manually bound to Active Directory through the Active Directory Service plug-in in Directory Utility. From the command line, use dsconfigad to bind and specify Active Directory-specific options. Active Directory provides policies to Windows computers and the schema can be extended to include policies for other operating systems, including OS X Lion. A number of environments cannot extend their AD schemas and so thirdparty vendors can provide policies to Mac computers without extending the schema. In this section, we explore administrative tasks surrounding managing OS X Lion using Active Directory. © 2011 Apple Inc. 145 IT Configuration Guide—For Your Mac Evaluation (Version 4.0) SAMPLE PAGES 4.3.1 Binding to Active Directory OS X Lion can be bound to Active Directory from the Users & Groups pane in System Preferences, through Directory Utility (located in /System/Library/ CoreServices/Directory Utility), or using the command line utility dsconfigad. While dsconfigad does contain some additional options, the majority of functionality is available through Directory Utility. Active Directory Validation Prior to binding, it is important to verify some connectivity with Active Directory. Because Active Directory clients use DNS service records to locate Active Directory service, it is important to verify that DNS is working properly. 1. Open Terminal from /Applications/Utilities. Enter the following command to do a lookup on the service record to locate the global catalog: dig -t SRV _gc._tcp.pretendco.com ; <<>> DiG 9.4.1-P1 <<>> -t SRV _gc._tcp.pretendco.com ;; global options: printcmd ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 34512 ;; flags: qr aa rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1 ;; QUESTION SECTION: ;_gc._tcp.pretendco.com. ;; ANSWER SECTION: _gc._tcp.pretendco.com. dc.pretendco.com. ;; ADDITIONAL SECTION: dc.pretendco.com. 3600 ;; ;; ;; ;; IN SRV 600 IN SRV IN A 192.168.55.47 0 100 3268 Query time: 83 msec SERVER: 192.168.1.6#53(192.168.55.47) WHEN: Thu Jul 31 14:09:32 2008 MSG SIZE rcvd: 92 2. If your response does not include an answer section with the name of a domain controller, check to make sure the OS X Lion network settings are correct and that the DNS specified is one that will return service record information for your Active Directory forest. 3. To bind OS X Lion to Active Directory, you need credentials as a local administrator on the Mac as well as an Active Directory user who has the authority to join computers into the Organizational Unit (OU) that you will be leveraging in Active Directory. Once you have bound the Mac to Active Directory, you can set up the client to allow Active Directory administrators (or any Active Directory user you choose) to be local administrators on the local Mac client. However, during initial setup, you will need the local administrative user name and password for the Mac. This user is the first user set up during Setup Assistant after installation. © 2011 Apple Inc. 146 IT Configuration Guide—For Your Mac Evaluation (Version 4.0) SAMPLE PAGES 4.3.1.1 Binding to Active Directory Using Directory Utility To bind to Active Directory using Directory Utility: 1. Choose System Preferences from the Apple menu. 2. Open the Users & Groups pane. Figure 4.3.1.1_1 3. Click Login Options. Figure 4.3.1.1_2 © 2011 Apple Inc. 147 IT Configuration Guide—For Your Mac Evaluation (Version 4.0) SAMPLE PAGES 4. Click Join to the right of Network Account Server. Figure 4.3.1.1_3 5. Enter the name of the domain in the Server field. The dialog expands for credentials and Computer ID (which is already entered). Figure 4.3.1.1_4 6. Once joined, you can go back and look at the binding information and provide more details, if needed. You can also get to the Active Directory options in Directory Utility to bind if more information is required at the bind screen. To open Directory Utility, click the Edit button in the Users & Groups pane in System Preferences (or if the initial attempt at binding failed, click Join). © 2011 Apple Inc. 148 IT Configuration Guide—For Your Mac Evaluation (Version 4.0) SAMPLE PAGES 7. Click the Open Directory Utility button. Figure 4.3.1.1_5 8. Double-click Active Directory (or click Active Directory and then click the pencil icon). Figure 4.3.1.1_6 9. Enter the Active Directory domain name you wish to join (if you have not yet bound). © 2011 Apple Inc. 149 IT Configuration Guide—For Your Mac Evaluation (Version 4.0) SAMPLE PAGES 10. Change the computer ID if necessary, and click OK. Otherwise, you will see an Unbind button. Figure 4.3.1.1_7 11. If binding, enter the Active Directory user that has the delegated authority to bind a machine to the OU you specify for Computer OU. Enter the Active Directory user’s password, then click OK. 12. In the Users & Groups pane you will now see a green light next to the domain if provided network accounts are accessible. Figure 4.3.1.1_8 © 2011 Apple Inc. 150 IT Configuration Guide—For Your Mac Evaluation (Version 4.0) SAMPLE PAGES 4.3.1.2 Testing and Verifying Active Directory Binding Information Prior to logging out and attempting to log in with an Active Directory user, it is advisable to verify that OS X Lion is getting the requisite information from Active Directory. This section shows how to verify that OS X Lion is able to get information about an Active Directory user, browse information within Active Directory, and authenticate users. To verify that the Mac can get information about an Active Director user: For OS X Lion to work correctly, it needs to be able to look up information such as the user’s numerical ID (UID), primary group ID (GID), and group membership. 1. To test this lookup capability, open Terminal from /Applications/Utilities, and enter the following: id <Active Directory Username> Sample: Client-1:~ admin$ id jfoster uid=818406992(jfoster) gid=1450179434(PRETENDCO\domain users) groups=1450179434(PRETENDCO\domain users) 2. If the id command does not return information about an Active Directory user, open Directory Utility and verify that OS X Lion is bound to Active Directory and that Active Directory is listed under Search Path (the listing is created automatically when the client is bound). Also verify network connectivity between OS X Lion and the domain controller, and check firewall settings on the network. To browse the Active Directory network node: 1. Open Terminal from /Applications/Utilities, and enter the following: Client-1:~ admin$ dscl localhost > 2. You are now in interactive mode and can browse network nodes. Type the following: > ls One of the listed nodes should be Active Directory (if not, Active Directory is not enabled/checked in Directory Utility). Active Directory BSD Local Search Contact © 2011 Apple Inc. 151 IT Configuration Guide—For Your Mac Evaluation (Version 4.0) SAMPLE PAGES 3. Navigate into the Active Directory node by using cd and perform another ls to show the contents of the node. > cd 'Active Directory' /Active Directory > ls All Domains 4. Navigate into the All Domains node by using cd and perform another ls to show the contents of the node. The node should contain the Users node. /Active Directory > cd 'All Domains' /Active Directory/All Domains > ls CertificateAuthorities Computers FileMakerServers Groups Mounts People Printers Users 5. Navigate into the Users node by using cd and performing another ls to show the contents of the node. The node should contain all of the users in the forest. If you have a large number of users, do not enter ls to list the contents of this node, but rather use read to read the attributes of that user: /Active Directory/All Domains > cd Users /Active Directory/All Domains/Users > read jfoster dsAttrTypeNative:accountExpires: 9223372036854775807 dsAttrTypeNative:ADDomain: pretendco.com dsAttrTypeNative:badPasswordTime: 0 dsAttrTypeNative:badPwdCount: 0 dsAttrTypeNative:cn: Tim Lee dsAttrTypeNative:codePage: 0 dsAttrTypeNative:countryCode: 0 dsAttrTypeNative:displayName: Tim Lee dsAttrTypeNative:distinguishedName: CN=Jimmy Foster,CN=Users,DC=pretendco,DC=com more... © 2011 Apple Inc. 152 IT Configuration Guide—For Your Mac Evaluation (Version 4.0) SAMPLE PAGES 6. If you are not able to read the attributes of a user, check access controls in Active Directory and verify that you have bound to the correct OU. 7. You can now exit out of dscl. /Active Directory/All Domains/Users > exit Goodbye To verify the user password: Up to this point, the Mac can get information about users, but you need to verify that users can be authenticated. 1. Open Terminal from /Applications/Utilities and enter the following: >su <ad username> Sample: Client-1:~ Admin$ su jfoster Password: 2. Enter the Active Directory user’s password. If successful, you should now be in a Terminal session as that user. To verify, use the whoami command. >whoami Sample: bash-3.2$ whoami jfoster Note: If warnings appear about not having a home directory, disregard them at this point. The home directory will be created on initial login. If this does not work, verify that there are not multiple users with the same short name in your Active Directory forest. If there are multiple users with the same short name, you must enable namespace support via dsconfigad. For this testing, enter a user name that has a unique short name forestwide. To log in at the login window: You could log out by choosing Log Out [user name] from the Apple menu, but it is more convenient to use Fast User Switching to test the login window. 1. To enable Fast User Switching, choose System Preferences from the Apple menu, and click Users & Groups. 2. In the Users & Groups pane, make sure the lock in the lower-left corner is unlocked. 3. If the pane is locked, click the lock icon and authenticate to unlock. 4. Click Login Options from the list on the left. © 2011 Apple Inc. 153 IT Configuration Guide—For Your Mac Evaluation (Version 4.0) SAMPLE PAGES 5. Verify that the “Show fast user switching menu as” checkbox is selected. Figure 4.3.1.2_1 A user name will appear in the menu bar in the upper-right corner of your screen. Figure 4.3.1.2_2 6. Select the user name and choose Login Window. A cube effect appears and the login window appears. The currently logged in user session stays active; to return to it either select the original user in the Fast User Switching menu or at the login window. 7. Click Other, and enter the Active Directory user name and password. Either use the short name or the UPN name (for example, jfoster, PRETENDCO \jfoster, or [email protected]). You should now be logged in as the Active Directory user. 8. If the login window “shakes” when authenticating, confirm that you have gone through the verify setting section above and validate the password. Also, try a different Active Directory user account. 9. If you receive a warning about not finding your home directory, open Directory Utility and look at the settings for your Active Directory configuration. If you have not selected “Force local home directory on startup disk,” there is an issue mounting your network home directory. For this module, make sure the “Force local home directory on startup disk” option is selected. © 2011 Apple Inc. 154 IT Configuration Guide—For Your Mac Evaluation (Version 4.0) SAMPLE PAGES 6 Security 6.1 Security Resources Security Configuration Guides The Apple website offers a section dedicated to the security of Apple products. The Apple Product Security page can be found at http://www.apple.com/ support/security, with a link to the security configuration guides at http://www.apple.com/support/security/guides. Apple has posted the security configuration guides to aid administrators of OS X and OS X Server for v10.3, v10.4, v10.5, and v10.6. Guides include checklists, scripts, and in-depth analysis on the security architecture and components. The security configuration guides provide best practices and are the byproduct of collaborative review and vetting with the National Security Agency. These guides can also be found at: http://www.nsa.gov/ia/guidance/security_configuration_guides/ operating_systems.shtml#AppleMac Security Updates Each Apple security update is posted on the Apple Support website at http://support.apple.com/kb/HT1222. Click the link for each update to view a description and corresponding CVE IDs referencing any vulnerabilities patched with each update. © 2011 Apple Inc. 316 IT Configuration Guide—For Your Mac Evaluation (Version 4.0) SAMPLE PAGES 6.2 Application Restrictions OS X Lion can restrict access to applications using Managed Preferences by whitelisting applications that have been signed or directories that contain applications (or both). In this module, we will do so using the Workgroup Manager, although this can also be achieved with Profile Manager (as outlined in Module 5.4.1.2). For the purposes of this example, we recommend using Workgroup Manager on a client computer that has all of the applications installed that a normal user would have. The restrictions can be configured for a local (non-administrative) account or for an account in a valid Open Directory domain. To use Workgroup Manager to limit users to opening only specifically allowed applications: 1. Open Workgroup Manager from /Applications/Server. 2. Click the test user account. Figure 6.2_1 © 2011 Apple Inc. 317 IT Configuration Guide—For Your Mac Evaluation (Version 4.0) SAMPLE PAGES 3. Click Preferences in the toolbar. Figure 6.2_2 4. Click the icon for Applications in the list of Managed Preferences. 5. Click the Applications button. 6. Change the Manage option to Always. 7. The “Restrict which applications are allowed to launch” checkbox is already selected. Use the Add (+) button to add applications to the list of allowed applications. 8. Add each application that a user should be allowed access to. Note: You can select multiple applications concurrently by holding down the command key when clicking them. In the following example, the user will be logged into a web kiosk workstation and will only be allowed to access the Safari application. Figure 6.2_3 © 2011 Apple Inc. 318 IT Configuration Guide—For Your Mac Evaluation (Version 4.0) SAMPLE PAGES 9. Once Managed Preferences are configured appropriately, click the Apply Now button. 10. Log in as the test user and verify that Managed Preferences are applied correctly. 11. To further restrict applications to specific folders, click the Folders button. 12. Navigate to and select each directory that users should be able to access. 13. Assuming the users are not administrators of the local computers, they will only be able to open applications that are in the directories you have included in the list. Click Apply to commit these changes to the directory service. Note: To restrict access to a specific software title, run Workgroup Manager on a system that has that application installed. Workgroup Manager can be copied to a USB drive and run from the drive to facilitate managing preferences from client systems. © 2011 Apple Inc. 319 IT Configuration Guide—For Your Mac Evaluation (Version 4.0) SAMPLE PAGES 6.3 Password Policies A variety of password policies are available to clients running in an Open Directory environment. These should conform to the requirements set forth by your organization’s security policy. In this example, configure Open Directory password policies globally and then specifically for the user Jimmy Foster. You can use a different account for testing if you choose to do so. To set up Open Directory password policies for a user: 1. Open Server Admin. 2. Click Open Directory in the Servers list. Figure 6.3_1 3. Click Settings for the Open Directory service in the Server Admin toolbar. Figure 6.3_2 © 2011 Apple Inc. 320 IT Configuration Guide—For Your Mac Evaluation (Version 4.0) SAMPLE PAGES 4. Click the Policies button. Configure the global password policies for the Open Directory Service. These policies are used to control login for accounts and set controls on passwords for all users in the directory service. Figure 6.3_3 5. Once satisfied with the password policies, click Binding. These options only apply to Mac computers using Open Directory, such as clients in a dual directory scenario. Figure 6.3_4 6. Once satisfied with the password policies, click the Authentication button. © 2011 Apple Inc. 321 IT Configuration Guide—For Your Mac Evaluation (Version 4.0) SAMPLE PAGES 7. Choose the hash method(s) to store passwords on the OS X Lion Server that hosts the Open Directory environment. Figure 6.3_5 8. To add other settings for specific users, open Workgroup Manager and authenticate to Open Directory. 9. Click the user in question (or select multiple users). 10. Click the Advanced button. 11. Click the Options button in the password section (located below the User Password Type menu). Figure 6.3_6 © 2011 Apple Inc. 322 IT Configuration Guide—For Your Mac Evaluation (Version 4.0) SAMPLE PAGES 12. Configure more granular settings for each user (or users). This includes controlling when to disable accounts and when to require users to change passwords. Figure 6.3_7 13. Once finished managing these settings, click OK. Note: When using Active Directory, the AD password policies are respected by OS X Lion. Clients are notified of expiring passwords and users can change their passwords in OS X Lion. © 2011 Apple Inc. 323 IT Configuration Guide—For Your Mac Evaluation (Version 4.0) SAMPLE PAGES 8.6 AirDrop AirDrop is the Apple implementation of the Wi-Fi Direct protocol. AirDrop enables users to find other nearby users (via Bonjour, Apple’s multicast DNS implementation) and transfer files directly to other client computers. To activate AirDrop on a supported Mac: 1. Click the AirDrop icon in the Finder sidebar. 2. If a nearby colleague wishes to exchange files, they click the AirDrop icon in their Finder sidebar. You will now see one another’s machines listed in the AirDrop window. 3. To transfer a file, drag and drop the file on the other person’s AirDrop icon. They will be prompted to accept the file. Transfer progress is indicated by the colored circle in their icon. 4. To deactivate AirDrop, simply close that Finder window, or click on another sidebar item. The intentional nature of activating AirDrop, coupled with the “accept” dialog, provides a strong measure of security and prevention from hijacking. Additional deliberate steps are required to accept transfers. © 2011 Apple Inc. 486 IT Configuration Guide—For Your Mac Evaluation (Version 4.0) SAMPLE PAGES 8.6.1 Deactivating AirDrop While AirDrop is a great feature for many environments, some organizations may wish to deactivate the AirDrop feature in OS X Lion to meet their information assurance guidelines. To deactivate AirDrop, enter the following command in Terminal. sudo defaults write /Library/Preferences/ com.apple.NetworkBrowser DisableAirDrop -bool YES To reenable AirDrop, simply send the same command with a boolean payload of NO: sudo defaults write /Library/Preferences/ com.apple.NetworkBrowser DisableAirDrop -bool NO To see AirDrop disappear, either restart the system or restart the Finder by running the following command. sudo killall Finder Default domains can be changed using Mobile Configuration (.mobileconfig) files. Environments running OS X Lion Server or a third-party Mobile Device Management (MDM) solution can use the Custom Settings feature to assign a value to the com.apple.NetworkBrowser defaults domain. To use the Custom Setting feature, follow these steps: 1. Open the Server application from an OS X Lion Server. 2. Click the Profile Manager service. 3. Click Open Profile Manager. 4. Authenticate when prompted. Figure 8.6.1_1 © 2011 Apple Inc. 487 IT Configuration Guide—For Your Mac Evaluation (Version 4.0) SAMPLE PAGES 5. To assign custom settings, click the relevant Device or Device Group. Figure 8.6.1_2 6. Click Edit. Figure 8.6.1_3 7. Click Custom Settings. 8. Enter com.apple.NetworkBrowser into the Preference Domain field. 9. Rename the initial key DisableAirDrop. 10. Choose Boolean from the Type menu. © 2011 Apple Inc. 488 IT Configuration Guide—For Your Mac Evaluation (Version 4.0) SAMPLE PAGES 11. Click the Value checkbox. Figure 8.6.1_4 12. Click OK. 13. Send the profile to the Mac running OS X Lion. Restart the Mac, and verify that the key is enforced. © 2011 Apple Inc. 489