Joining a Linux Machine to Active Directory.

the following guide will your users to simply use the username to login. it will also allow members of network access to have sudo access.

start by installing the following packages.

sudo apt-get install realmd oddjobd sssd-tools sssd adcli -y

then join to the domain

sudo realm join --user=administrator contoso.local

after joining edit the following file

sudo vi /etc/sssd/sssd.conf

the finished file should look like this

[sssd]
domains = contoso.local
config_file_version = 2
services = nss, pam

[domain/contoso.local]
ad_domain = contoso.local
krb5_realm = CONTOSO.LOCAL
realmd_tags = manages-system joined-with-adcli
cache_credentials = True
id_provider = ad
access_provider = simple
krb5_store_password_if_offline = True
default_shell = /bin/bash
ldap_id_mapping = True
use_fully_qualified_names = False
fallback_homedir = /home/%u
simple_allow_groups = Domain Users
ldap_use_tokengroups = false
dyndns_update = true
dyndns_refresh_interval = 43200
dyndns_update_ptr = true
dyndns_ttl = 3600
dyndns_auth = GSS-TSIG

restart the sssd service

sudo /etc/init.d/sssd restart

update the sudoers file to all elevated access. in this case the following is an AD group

visudo
%NetworkAccess   ALL=(ALL:ALL) ALL

References

Red Hat: join a Linux system to an Active Directory domain
Red Hat: Additional Configuration for Identity and Authentication Providers
Debian: Join Debian to AD