Essential Eight on Linux, Part 4 of 8: Restrict Administrative Privileges on Ubuntu 26.04 LTS Source
Markdown source
1---2title: "Essential Eight on Linux, Part 4 of 8: Restrict Administrative Privileges on Ubuntu 26.04 LTS"3date: "2026-04-29"4tags: ["essential-eight", "asd", "ism", "ubuntu", "linux", "teleport", "active-directory", "entra-id", "sudo", "security"]5author: "Gavin Jackson"6excerpt: "Part 4 of an 8-part series on implementing the Essential Eight on Ubuntu 26.04 LTS, covering restricted administrative privileges with sudo, Teleport, and AD or Entra ID integration."7---89# Essential Eight on Linux, Part 4 of 8: Restrict Administrative Privileges on Ubuntu 26.04 LTS1011If I had to pick one Essential Eight mitigation that most clearly benefits from identity-aware tooling on Linux, this would be it.1213Ubuntu gives you the core primitives. **sudo**, **SSH**, **PAM**, **SSSD**, and **polkit** are all there. But if you want something that feels closer to modern privileged identity management rather than old-school shared admin habits, you need to combine the native platform with stronger brokering and approval workflows.1415That is where **Teleport** becomes genuinely useful.1617## What ASD is trying to achieve1819The goal is not just "fewer admins."2021It is:2223- no routine use of privileged accounts24- no standing access where avoidable25- control over who can elevate, to what, and when26- traceability for administrative actions2728On Linux, that means you should be deeply suspicious of:2930- direct root SSH31- shared local admin accounts32- always-on sudo access for broad teams33- unmanaged SSH keys34- local emergency accounts that quietly became permanent3536## Ubuntu 26.04 LTS reference implementation3738### Resolute Raccoon highlights3940Ubuntu 26.04 LTS adds a genuinely useful new option here: **authd** is available from the official Ubuntu repositories and supports **Microsoft Entra ID**, **Google IAM**, and standard **OIDC** providers.4142That does not replace Teleport for just-in-time privileged brokering, approvals, or session recording. What it does do is give Ubuntu a stronger first-party story for cloud-backed identity on both desktops and servers.4344### 1. Separate user identity from administrative identity4546Every administrator should have:4748- a standard user identity for day-to-day work49- a separate privileged path for approved administrative activity5051Even before you add Teleport, that means:5253- disable direct root login over SSH54- require named accounts55- use `sudo` instead of routine root shells56- scope `sudoers` rules to roles and commands where possible5758### 2. Use AD or Entra-backed identity as the source of truth5960For on-premises Active Directory, Ubuntu 26.04 can integrate cleanly with:6162- `realmd`63- `sssd`64- Kerberos65- AD-backed group membership6667If you are deeper in the Microsoft cloud, Entra ID often makes more sense as the administrative identity layer, especially when paired with a zero-trust access broker.6869This is where I think the split becomes useful:7071- **Active Directory** for traditional domain integration and host identity on enterprise internal networks72- **Entra ID** for SSO, MFA, conditional access, and stronger central identity policy7374### 3. Use Teleport for privileged access brokering7576Teleport is not the only option, but it is a strong Linux-native fit for this mitigation because it gives you:7778- short-lived certificates instead of unmanaged long-lived SSH keys79- role-based access control80- access requests and approvals81- session recording82- central audit trails83- SSO integration with Entra ID and other identity providers8485That makes it a very practical way to implement a Linux-flavoured PIM model.8687I would treat Teleport as the privileged front door to high-value Linux resources:8889- bastions90- production servers91- Kubernetes admin paths92- databases93- internal web consoles9495> **A note on Teleport Community Edition vs commercial Teleport**96>97> There is an important nuance here: when people say "Teleport is open source," they are usually talking about the **open source core** and **Community Edition**, not the full commercial feature set.98>99> The Community Edition is useful, especially for labs, small teams, and learning the platform. You still get a lot of the fundamentals:100>101> - certificate-based access102> - RBAC103> - audit logs104> - session recording105> - self-hosted deployment106>107> But some of the things that make Teleport especially attractive as a Linux-flavoured PIM platform are tied to the commercial editions rather than the community binaries. The current Teleport feature matrix shows that advanced identity-governance capabilities such as richer **access reviews**, **automatic approvals**, broader **SSO and directory integrations**, and stronger enterprise governance features sit on the enterprise side of the fence.108>109> That matters because the more this article leans into **Entra ID integration**, **approval workflows**, and a polished **just-in-time privileged access** experience, the more likely you are to end up needing commercial Teleport rather than just Community Edition.110>111> There is also a licensing nuance. Teleport's **Community Edition binaries** now carry commercial-use restrictions for larger companies, while the source code in GitHub remains available under **AGPLv3**. In practice, that means there is a difference between:112>113> - using the officially distributed Community Edition binaries or images114> - compiling Teleport yourself from source under the AGPL terms115>116> For small organisations and home labs, the official community binaries may still be perfectly fine. For larger enterprises, it is worth reading the licensing terms carefully and not assuming that "community edition" means the same thing it used to.117>118> On cost, Teleport's official pricing is now **quote-based and usage-based**, not a simple public per-user price list. That makes it hard to pin to a neat number in an article, but it is fair to say that commercial Teleport can become a **significant investment** once you move beyond hobby or small-team use. The product can absolutely be worth it, but it is not a trivial line item.119120### 4. Build a just-in-time pattern instead of standing sudo121122The strong pattern looks like this:1231241. User signs in with SSO and MFA.1252. User requests elevated access to a Linux role or target set.1263. Approval is granted for a short window.1274. Teleport issues short-lived credentials and records the session.1285. Host-level sudo is available only through the approved role mapping.129130That is not identical to Microsoft Entra PIM, but it gets you to a very similar control outcome for Linux resources.131132### 5. Map identity groups to narrow Linux roles133134Avoid giant "linux-admins" groups with universal reach.135136Instead, use environment or function-based roles such as:137138- `prod-web-admin`139- `prod-db-breakglass`140- `devops-nonprod`141- `landscape-platform-admin`142143On the host side, keep `sudoers` aligned to those roles. On the identity side, map AD or Entra groups into Teleport roles with short expiry and approval requirements.144145## ISM control mapping146147The October 2024 Essential Eight to ISM mapping links this mitigation to the following controls:148149| ISM control | Linux implementation on Ubuntu 26.04 LTS |150|-------------|-------------------------------------------|151| `ISM-1507` | Restrict privileged access to systems and applications through named admin paths and role mapping. |152| `ISM-1647` | Limit administrative privileges to users with an established business need. |153| `ISM-1648` | Use separate privileged accounts or access paths rather than routine elevation from general-purpose sessions. |154| `ISM-0445` | Prevent direct or shared privileged account use where accountable named access is possible. |155| `ISM-1175` | Review privileged access regularly and remove stale entitlements. |156| `ISM-1883` | Ensure privileged access is tightly controlled for high-value or sensitive systems. |157| `ISM-1380` | Use approval workflows or additional controls for privileged operations where feasible. |158| `ISM-1687` | Avoid broad standing administrative privileges across the fleet. |159| `ISM-1688` | Constrain the scope of privileged access to the minimum systems and functions required. |160| `ISM-1689` | Review and revalidate privileged assignments on a recurring basis. |161| `ISM-1387` | Monitor and log privileged activity for accountability and incident response. |162| `ISM-1685` | Ensure privileged users use dedicated administrative mechanisms rather than unmanaged workarounds. |163| `ISM-1509` | Protect credentials and authentication material used for privileged access. |164| `ISM-1650` | Enforce additional controls around privileged access, including stronger authentication and approvals. |165| `ISM-1815` | Apply stronger controls and governance to privileged access at higher maturity levels. |166| `ISM-1906` | Align privileged access restrictions with uplift controls across the environment. |167| `ISM-1228` | Use logging and monitoring to detect privileged misuse or anomalous administrative behaviour. |168| `ISM-0123` | Protect administrative event logs from tampering. |169| `ISM-0140` | Retain sufficient records for security monitoring and investigation. |170| `ISM-1819` | Review and strengthen administrative controls over time rather than treating them as static. |171172## Active Directory and Entra ID: where each fits173174This is the model I think makes the most sense for many Ubuntu shops:175176- use **AD integration on Ubuntu** where you need traditional domain-backed account management and policy177- use **Entra ID** as the identity provider for SSO and MFA178- use **Teleport** as the brokering layer for privileged Linux access179180That gives you a cleaner answer than trying to force every Linux administrative pattern directly into native Microsoft tooling.181182It also keeps the control portable. Teleport can front SSH, Kubernetes, databases, and internal apps using the same approval and audit model.183184## Where native Ubuntu falls short185186Ubuntu has the local mechanics for privilege separation, but it does not natively provide a first-party PIM workflow with:187188- access requests189- time-bound elevation190- central approval chains191- session recording192193That is the gap Teleport closes very well.194195## Commercial alternatives196197Teleport is the first product I would look at for this control in Linux-heavy estates, especially where you want PIM-like behaviour without turning Linux administration into a collection of brittle bastions and static keys.198199Other PAM or PIM platforms can also play here, but Teleport has the advantage of fitting the Linux operating model naturally instead of feeling like a Windows control awkwardly pasted onto SSH. I would just go into it with clear eyes about which features live in Community Edition and which ones push you into enterprise licensing.200201## The bottom line202203Restricting administrative privileges on Ubuntu 26.04 LTS is not mainly a `sudoers` problem. It is an identity, approval, and audit problem.204205Use Ubuntu's native privilege controls as the base layer, then add **AD or Entra-backed identity** and **Teleport** for short-lived, approved, and recorded administrative access. Resolute Raccoon's packaged **authd** capability makes Entra and OIDC-backed Linux identity more interesting than it was on Ubuntu 24.04, but Teleport is still the stronger answer for PIM-like control.206207## References208209- [ASD Essential Eight maturity model and ISM mapping (October 2024)](https://www.cyber.gov.au/business-government/asds-cyber-security-frameworks/essential-eight/essential-eight-maturity-model-and-ism-mapping)210- [Ubuntu Active Directory integration](https://ubuntu.com/server/docs/service-sssd-ad)211- [ADSys for Ubuntu and Active Directory](https://documentation.ubuntu.com/adsys/)212- [Teleport Access Requests](https://goteleport.com/docs/identity-governance/access-requests/)213- [Teleport Microsoft Entra ID SSO](https://goteleport.com/docs/zero-trust-access/sso/integrate-idp/entra-id/)214- [authd documentation](https://documentation.ubuntu.com/authd/stable-docs/)215- [Teleport core concepts and editions](https://goteleport.com/docs/core-concepts/)216- [Teleport feature matrix](https://goteleport.com/docs/feature-matrix/)217- [Teleport pricing](https://goteleport.com/pricing/)218- [Teleport Community Edition licensing change](https://goteleport.com/blog/teleport-community-license/)219