Essential Eight on Linux, Part 4 of 8: Restrict Administrative Privileges on Ubuntu 26.04 LTS Source

1---
2title: "Essential Eight on Linux, Part 4 of 8: Restrict Administrative Privileges on Ubuntu 26.04 LTS"
3date: "2026-04-29"
4tags: ["essential-eight", "asd", "ism", "ubuntu", "linux", "teleport", "active-directory", "entra-id", "sudo", "security"]
5author: "Gavin Jackson"
6excerpt: "Part 4 of an 8-part series on implementing the Essential Eight on Ubuntu 26.04 LTS, covering restricted administrative privileges with sudo, Teleport, and AD or Entra ID integration."
7---
8
9# Essential Eight on Linux, Part 4 of 8: Restrict Administrative Privileges on Ubuntu 26.04 LTS
10
11If I had to pick one Essential Eight mitigation that most clearly benefits from identity-aware tooling on Linux, this would be it.
12
13Ubuntu gives you the core primitives. **sudo**, **SSH**, **PAM**, **SSSD**, and **polkit** are all there. But if you want something that feels closer to modern privileged identity management rather than old-school shared admin habits, you need to combine the native platform with stronger brokering and approval workflows.
14
15That is where **Teleport** becomes genuinely useful.
16
17## What ASD is trying to achieve
18
19The goal is not just "fewer admins."
20
21It is:
22
23- no routine use of privileged accounts
24- no standing access where avoidable
25- control over who can elevate, to what, and when
26- traceability for administrative actions
27
28On Linux, that means you should be deeply suspicious of:
29
30- direct root SSH
31- shared local admin accounts
32- always-on sudo access for broad teams
33- unmanaged SSH keys
34- local emergency accounts that quietly became permanent
35
36## Ubuntu 26.04 LTS reference implementation
37
38### Resolute Raccoon highlights
39
40Ubuntu 26.04 LTS adds a genuinely useful new option here: **authd** is available from the official Ubuntu repositories and supports **Microsoft Entra ID**, **Google IAM**, and standard **OIDC** providers.
41
42That does not replace Teleport for just-in-time privileged brokering, approvals, or session recording. What it does do is give Ubuntu a stronger first-party story for cloud-backed identity on both desktops and servers.
43
44### 1. Separate user identity from administrative identity
45
46Every administrator should have:
47
48- a standard user identity for day-to-day work
49- a separate privileged path for approved administrative activity
50
51Even before you add Teleport, that means:
52
53- disable direct root login over SSH
54- require named accounts
55- use `sudo` instead of routine root shells
56- scope `sudoers` rules to roles and commands where possible
57
58### 2. Use AD or Entra-backed identity as the source of truth
59
60For on-premises Active Directory, Ubuntu 26.04 can integrate cleanly with:
61
62- `realmd`
63- `sssd`
64- Kerberos
65- AD-backed group membership
66
67If you are deeper in the Microsoft cloud, Entra ID often makes more sense as the administrative identity layer, especially when paired with a zero-trust access broker.
68
69This is where I think the split becomes useful:
70
71- **Active Directory** for traditional domain integration and host identity on enterprise internal networks
72- **Entra ID** for SSO, MFA, conditional access, and stronger central identity policy
73
74### 3. Use Teleport for privileged access brokering
75
76Teleport is not the only option, but it is a strong Linux-native fit for this mitigation because it gives you:
77
78- short-lived certificates instead of unmanaged long-lived SSH keys
79- role-based access control
80- access requests and approvals
81- session recording
82- central audit trails
83- SSO integration with Entra ID and other identity providers
84
85That makes it a very practical way to implement a Linux-flavoured PIM model.
86
87I would treat Teleport as the privileged front door to high-value Linux resources:
88
89- bastions
90- production servers
91- Kubernetes admin paths
92- databases
93- internal web consoles
94
95> **A note on Teleport Community Edition vs commercial Teleport**
96>
97> There is an important nuance here: when people say "Teleport is open source," they are usually talking about the **open source core** and **Community Edition**, not the full commercial feature set.
98>
99> The Community Edition is useful, especially for labs, small teams, and learning the platform. You still get a lot of the fundamentals:
100>
101> - certificate-based access
102> - RBAC
103> - audit logs
104> - session recording
105> - self-hosted deployment
106>
107> But some of the things that make Teleport especially attractive as a Linux-flavoured PIM platform are tied to the commercial editions rather than the community binaries. The current Teleport feature matrix shows that advanced identity-governance capabilities such as richer **access reviews**, **automatic approvals**, broader **SSO and directory integrations**, and stronger enterprise governance features sit on the enterprise side of the fence.
108>
109> That matters because the more this article leans into **Entra ID integration**, **approval workflows**, and a polished **just-in-time privileged access** experience, the more likely you are to end up needing commercial Teleport rather than just Community Edition.
110>
111> There is also a licensing nuance. Teleport's **Community Edition binaries** now carry commercial-use restrictions for larger companies, while the source code in GitHub remains available under **AGPLv3**. In practice, that means there is a difference between:
112>
113> - using the officially distributed Community Edition binaries or images
114> - compiling Teleport yourself from source under the AGPL terms
115>
116> For small organisations and home labs, the official community binaries may still be perfectly fine. For larger enterprises, it is worth reading the licensing terms carefully and not assuming that "community edition" means the same thing it used to.
117>
118> On cost, Teleport's official pricing is now **quote-based and usage-based**, not a simple public per-user price list. That makes it hard to pin to a neat number in an article, but it is fair to say that commercial Teleport can become a **significant investment** once you move beyond hobby or small-team use. The product can absolutely be worth it, but it is not a trivial line item.
119
120### 4. Build a just-in-time pattern instead of standing sudo
121
122The strong pattern looks like this:
123
1241. User signs in with SSO and MFA.
1252. User requests elevated access to a Linux role or target set.
1263. Approval is granted for a short window.
1274. Teleport issues short-lived credentials and records the session.
1285. Host-level sudo is available only through the approved role mapping.
129
130That is not identical to Microsoft Entra PIM, but it gets you to a very similar control outcome for Linux resources.
131
132### 5. Map identity groups to narrow Linux roles
133
134Avoid giant "linux-admins" groups with universal reach.
135
136Instead, use environment or function-based roles such as:
137
138- `prod-web-admin`
139- `prod-db-breakglass`
140- `devops-nonprod`
141- `landscape-platform-admin`
142
143On the host side, keep `sudoers` aligned to those roles. On the identity side, map AD or Entra groups into Teleport roles with short expiry and approval requirements.
144
145## ISM control mapping
146
147The October 2024 Essential Eight to ISM mapping links this mitigation to the following controls:
148
149| ISM control | Linux implementation on Ubuntu 26.04 LTS |
150|-------------|-------------------------------------------|
151| `ISM-1507` | Restrict privileged access to systems and applications through named admin paths and role mapping. |
152| `ISM-1647` | Limit administrative privileges to users with an established business need. |
153| `ISM-1648` | Use separate privileged accounts or access paths rather than routine elevation from general-purpose sessions. |
154| `ISM-0445` | Prevent direct or shared privileged account use where accountable named access is possible. |
155| `ISM-1175` | Review privileged access regularly and remove stale entitlements. |
156| `ISM-1883` | Ensure privileged access is tightly controlled for high-value or sensitive systems. |
157| `ISM-1380` | Use approval workflows or additional controls for privileged operations where feasible. |
158| `ISM-1687` | Avoid broad standing administrative privileges across the fleet. |
159| `ISM-1688` | Constrain the scope of privileged access to the minimum systems and functions required. |
160| `ISM-1689` | Review and revalidate privileged assignments on a recurring basis. |
161| `ISM-1387` | Monitor and log privileged activity for accountability and incident response. |
162| `ISM-1685` | Ensure privileged users use dedicated administrative mechanisms rather than unmanaged workarounds. |
163| `ISM-1509` | Protect credentials and authentication material used for privileged access. |
164| `ISM-1650` | Enforce additional controls around privileged access, including stronger authentication and approvals. |
165| `ISM-1815` | Apply stronger controls and governance to privileged access at higher maturity levels. |
166| `ISM-1906` | Align privileged access restrictions with uplift controls across the environment. |
167| `ISM-1228` | Use logging and monitoring to detect privileged misuse or anomalous administrative behaviour. |
168| `ISM-0123` | Protect administrative event logs from tampering. |
169| `ISM-0140` | Retain sufficient records for security monitoring and investigation. |
170| `ISM-1819` | Review and strengthen administrative controls over time rather than treating them as static. |
171
172## Active Directory and Entra ID: where each fits
173
174This is the model I think makes the most sense for many Ubuntu shops:
175
176- use **AD integration on Ubuntu** where you need traditional domain-backed account management and policy
177- use **Entra ID** as the identity provider for SSO and MFA
178- use **Teleport** as the brokering layer for privileged Linux access
179
180That gives you a cleaner answer than trying to force every Linux administrative pattern directly into native Microsoft tooling.
181
182It also keeps the control portable. Teleport can front SSH, Kubernetes, databases, and internal apps using the same approval and audit model.
183
184## Where native Ubuntu falls short
185
186Ubuntu has the local mechanics for privilege separation, but it does not natively provide a first-party PIM workflow with:
187
188- access requests
189- time-bound elevation
190- central approval chains
191- session recording
192
193That is the gap Teleport closes very well.
194
195## Commercial alternatives
196
197Teleport is the first product I would look at for this control in Linux-heavy estates, especially where you want PIM-like behaviour without turning Linux administration into a collection of brittle bastions and static keys.
198
199Other PAM or PIM platforms can also play here, but Teleport has the advantage of fitting the Linux operating model naturally instead of feeling like a Windows control awkwardly pasted onto SSH. I would just go into it with clear eyes about which features live in Community Edition and which ones push you into enterprise licensing.
200
201## The bottom line
202
203Restricting administrative privileges on Ubuntu 26.04 LTS is not mainly a `sudoers` problem. It is an identity, approval, and audit problem.
204
205Use Ubuntu's native privilege controls as the base layer, then add **AD or Entra-backed identity** and **Teleport** for short-lived, approved, and recorded administrative access. Resolute Raccoon's packaged **authd** capability makes Entra and OIDC-backed Linux identity more interesting than it was on Ubuntu 24.04, but Teleport is still the stronger answer for PIM-like control.
206
207## References
208
209- [ASD Essential Eight maturity model and ISM mapping (October 2024)](https://www.cyber.gov.au/business-government/asds-cyber-security-frameworks/essential-eight/essential-eight-maturity-model-and-ism-mapping)
210- [Ubuntu Active Directory integration](https://ubuntu.com/server/docs/service-sssd-ad)
211- [ADSys for Ubuntu and Active Directory](https://documentation.ubuntu.com/adsys/)
212- [Teleport Access Requests](https://goteleport.com/docs/identity-governance/access-requests/)
213- [Teleport Microsoft Entra ID SSO](https://goteleport.com/docs/zero-trust-access/sso/integrate-idp/entra-id/)
214- [authd documentation](https://documentation.ubuntu.com/authd/stable-docs/)
215- [Teleport core concepts and editions](https://goteleport.com/docs/core-concepts/)
216- [Teleport feature matrix](https://goteleport.com/docs/feature-matrix/)
217- [Teleport pricing](https://goteleport.com/pricing/)
218- [Teleport Community Edition licensing change](https://goteleport.com/blog/teleport-community-license/)
219