Linux AD Authentication Deployment - Xianming Ding Request
Executive Summary
|
This runbook was validated in the Domus Digitalis home enterprise before CHLA production deployment. Pattern validation reference: ise-linux component, |
Device Information
| Field | Value |
|---|---|
Request ID |
XIANMING-LINUX-2026-02 |
Owner |
Dr. Xianming Ding |
Department |
Research Computing |
Location |
TBD |
MAC Address |
|
Switch |
|
Port |
|
Current Policy |
Research_Onboard (AD SSH blocked) |
Target Policy |
Linux_Research_AD_Auth (hardened) |
Architecture Context
The Problem
The Solution
Required AD Ports
| Port | Protocol | Purpose |
|---|---|---|
53 |
UDP/TCP |
DNS to Domain Controller |
88 |
UDP/TCP |
Kerberos authentication |
389 |
TCP |
LDAP (directory services) |
636 |
TCP |
LDAPS (TLS-encrypted LDAP) |
445 |
TCP |
SMB/CIFS (AD group policy, file shares) |
3268 |
TCP |
Global Catalog |
3269 |
TCP |
Global Catalog (TLS) |
Prerequisites
CHLA Infrastructure Details (FILL BEFORE DEPLOYMENT)
| Component | Value |
|---|---|
Primary DC |
|
Secondary DC |
|
AD Domain |
|
Kerberos Realm |
|
DNS Servers |
|
ISE PSN |
|
Policy Set |
|
Pattern Validation (Home Enterprise)
The following was validated in home enterprise on 2026-02-12:
| Test | Result | Notes |
|---|---|---|
dACL creation via netapi |
PASS |
|
Authorization profile with dACL |
PASS |
VLAN + dACL assignment |
Authorization rule at rank 0 |
PASS |
Most specific rule first |
CoA reauthentication |
PASS |
New dACL applies within 10s |
Kerberos kinit under dACL |
PASS |
Tickets acquired successfully |
SSH with AD credentials |
PASS |
Domain user login works |
Lateral movement blocked |
PASS |
RFC1918 ping fails |