Skip to content

Linux Host Data Source

The Linux Host data source collector discovers user accounts, groups, SSH keys, and logon events on Linux systems and servers. This enables organizations to identify all local and service accounts on Linux infrastructure, track SSH key usage, detect unauthorized access patterns, and support privileged access management for Linux servers.

Permissions

In order to collect identity data from Linux Host, a user or service account with sudo access must be created.

NOTE

The account itself must be able to connect over SSH and read contents of /etc/passwd. SSH public keys require that the account is able to login and execute sudo without a password prompt.

Using Shell Wrappers

The following commands must be enabled in sudo for the target user or service account, if the Elevate with Sudo configuration on the data source is not going to be enabled. Shell wrappers reduce the number of commands executed.

Wrap Sudo Command in ShellCommands
True/bin/sh -c *
False/usr/bin/lastlog
/usr/bin/chage *
/usr/bin/getent shadow
/usr/sbin/sshd *
/usr/bin/cat *
/usr/bin/stat *
/usr/bin/ssh-keygen *
/usr/bin/test *
/usr/bin/gzip *
/usr/bin/ls *
/usr/bin/grep *
/usr/bin/find *
/usr/bin/file *

Setting up the Linux Host Data Source

The following guides you through the necessary steps.

  1. Login to your Hydden tenant.

  2. To access the data sources page, navigate to Configuration > Discover and select Data Sources or use the data source URL: https://portal.hydden.com/configuration/datasource.

  3. To add the Linux Host data source, click + Add Data Source.

  4. From the configuration wizard, select the Linux Host logo tile.

  5. For Name enter an easy-to-identify name, especially if several data sources for the same service are to be created.

  6. You may ignore the optional Preset field. When pre-configured data source presets are available for selection from the drop-down, but they can also be added manually via the +. Create a data source preset to bulk import a list of servers.

  7. For Hostname, enter your Linux Host connection URL, for example an IP Address.

  8. If you already created your credential, select that credential from the Credential drop-down. If you have not yet created a credential, click the + to add an Account Credential for your Linux Host instance.

  9. You may ignore the optional Schedule field. To specify a Schedule either select from the list of pre-configured collection schedules or manually enter a new schedule via +.

  10. Under Site, which is an optional field, specify the site that your client is installed, it can also be "default" if there is only one client for your organization.

  11. Check the Elevate with Sudo checkbox, to always run the data collection with sudo privileges.

    If not enabled, refer to the Using Shell Wrappers information under Permissions above.

  12. Check the Use Sudo Shell checkbox if your environment requires spawning a sudo shell for privilege elevation commands.

  13. Custom Properties is an optional field, if needed for your organization, enter specific key=value pairs, for example, environment=production.

  14. Click Add to save the data source. You have an option to manually run the data collection via the Run Now button.

NOTE

If custom mapping rules are required, refer to the Advanced Configuration section in the Data Source Overview topic.

At this point, you can run a collection from the Data Sources page and shortly after, you will see your Linux Host users listed on the Identity Posture dashboard, in Global Search and the Search Library.

Privilege Elevation Methods

The Linux Host collector supports multiple privilege elevation methods to accommodate different enterprise Linux configurations and security policies.

Standard Sudo

The most common method for privilege elevation. The collector executes commands prefixed with sudo to gain necessary permissions.

Configuration:

  • Enable the Elevate with Sudo checkbox in the data source configuration
  • Ensure the service account has passwordless sudo access
  • Configure sudoers file with required commands (see Using Shell Wrappers)

Example sudoers entry:

hydden_collector ALL=(ALL) NOPASSWD: /bin/sh -c *

dzdo (Centrify/Delinea)

For environments using Centrify DirectControl or Delinea Server Suite, the collector supports dzdo as an alternative to standard sudo.

What is dzdo?

dzdo is Centrify's implementation of privilege elevation that integrates with Active Directory for centralized access control and auditing. It provides the same functionality as sudo but with enterprise-level audit logging and policy management.

Configuration:

The collector automatically detects and uses dzdo when:

  • The dzdo command is available on the target system
  • The service account has dzdo privileges configured in Centrify/Delinea policies
  • Standard sudo is not available or not configured

No manual configuration required — the collector will attempt dzdo if sudo elevation fails.

TIP

To verify dzdo is working, check the collection logs for "Using dzdo for privilege elevation" messages.

Sudo Shell Mode

Some Linux environments require commands to run within a sudo-spawned shell rather than as individual sudo command invocations.

When to use Sudo Shell:

  • PAM configurations that enforce session requirements
  • Systems with complex sudoers rules that don't work with command-line sudo
  • Environments where audit logging requires persistent sudo sessions

Configuration:

  1. Enable Elevate with Sudo checkbox
  2. Enable Use Sudo Shell checkbox
  3. Ensure the service account can execute: sudo /bin/sh

How it works:

Instead of running sudo command for each operation, the collector:

  1. Spawns a sudo shell: sudo /bin/sh
  2. Executes all commands within that shell session
  3. Closes the shell when collection completes

NOTE

Sudo Shell mode may be required on hardened Linux systems or when using complex PAM module configurations.

Privilege Elevation Troubleshooting

IssueCauseSolution
"sudo: no tty present" errorSudo requires interactive terminalAdd Defaults:hydden_collector !requiretty to sudoers
"dzdo: command not found"Centrify not installedUse standard sudo or install Centrify DirectControl
Commands fail with permission deniedInsufficient sudo privilegesCheck sudoers configuration includes required commands
Sudo prompts for passwordPasswordless sudo not configuredAdd NOPASSWD to sudoers entry
Collection hangs during privilege elevationSudo waiting for passwordEnable NOPASSWD or check for TTY requirement

Hydden Documentation and Training Hub