I think this is going to be my first post on StackExchange side of the house. However, I know that this has to be able to be configured cause I have seen it implemented previously but I don't actually know how it's implemented.
What I'm looking to do is on RedHat 7/8 or derivative... How can I make it so that a user has to conduct the following privilege escalations:
<user> -> <user>.adm -> root
- Users in IdM in ssh_users group can SSH to the servers from anywhere in the network(s).
- Domain Admins in IdM cannot be used for SSH to servers and are not in the group.
- Users who are Domain Admins must SSH to their standard user then
sudo su - <user>.adm
. They cannot directly get to root. - Users who are Domain Admins who also have root access must first
sudo su - <user>.adm
then they cansudo su - root
- Not all Domain Admins have the permission to gain root escalation.
Ultimately, Domain Admins are the System Administrators with permissions relevant to maintain, troubleshoot and remediate the system. System Engineers have the permission to gain root which give them the full permissions on the system. This also goes into delegation of responsibilities where only auditing accounts <user>.isso
have permissions to delete logs outside of root user. Which is ultimately what is stemming this requirement.
What I'm really looking for is documentation that would (cause I'm drawing blanks) which can point me in the right direction or Ansible roles/playbooks that functionally do this type of least privilege approach. Any help would be greatly appreciated!