On Thu, 8 Nov 2018 11:12:16 -0800
Rick Moen <r...@linuxmafia.com> wrote:

> Redirecting back on-list.
> 
> Quoting wirelessd...@gmail.com (wirelessd...@gmail.com):
> 
> > On Mon, 3 Sep 2018 at 13:47, Rick Moen <r...@linuxmafia.com> wrote:
> > >
> > > Anyway, it's been a _long_ time since I dealt with all of that
> > > badness, so I'm probably forgetting a lot.  This looks like a
> > > decent starting point:  https://wiki.debian.org/LDAP/Kerberos
> > > (except it has little to say about AD integration).
> > 
> > Thanks,
> 
> Yr. welcome, Tom.
> 
> > As there will be no Windows machines on this network, I don't have
> > any requirement for AD integration.  I probably should have
> > clarified that further in the original email.
> 
> Ah, that does indeed simplify things.
> 
> > After a couple of months of head-banging and much googling of
> > various docs, blogs, etc., I think I've finally managed to setup two
> > replicating OpenLDAP servers talking to each other over TLS. :D
> > LDIF is much less confusing now than it originally appeared to be,
> > thanks to the excellent reference at http://zytrax.com/books/ldap/.
> > The ldapscripts package is also working nicely in a simple way to
> > add users and groups, although I'm not entirely sure why I would add
> > machines to LDAP, unless I use those accounts for binding services?
> 
> Offhand, I don't think that'd be useful, no.
> 
> As I see it, part of what's both really useful and really annoying
> about LDAP is that it was designed as an _extremely general_
> implementation of the X.500 directory management standard.  So, it'll
> happily inhale the kitchen sink of all possible information about
> everything in the enterprise.  Therefore, you often find yourself
> saying 'Yes, I could do _this_ thing with it, too, but what would be
> the point?  I have no use-case for doing that.'  The trick is to
> realise that the 'But _why_?' reaction is normal and doesn't
> necessarily mean you missed something significant.
> 
> > So my next question is, whats the recommended package to
> > authenticate with LDAP and allow users to login to a desktop via
> > their LDAP account?  I've seen various options for PAM and NSS, but
> > do I need to configure both or just one?
> 
> Tom, ten years ago and two major employers ago, I would have been glad
> to send you example configurations from what I and the other senior SA
> at $FIRM somewhat painfully figured out at that time.  I'm really
> sorry, but I just no longer have that anywhere.
> 
> I remember that you very much needed a PAM hook, because you're
> introducing a new and preferred authentication method for shell login.
> Offhand, I can't remember exactly _how_ NSS is part of this picture 
> (being about name services, e.g., names of hosts), but NSS and PAM
> are pretty intertwined.
> 
> I remember that each machine needed a rather painfully worked out
> ldap.conf file.  I vaguely recall the need to have a self-signed X.509
> certificate.  Each machine needed to run the nscd and nslcd daemons:
> The latter was a new, surprising requirement introduced as of CentOS 
> 6.x (which was then new) -- though there is also an alternative
> called sssd:
> https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-c02791157
> 
> And there, I'm afraid, we've now exhausted what I can easily remember
> after so many years of not needing to know it.  I hope that helps.
> 
> > Should I be diving into the world of Kerberos and attempting to
> > integrate that with my OpenLDAP servers, or is it fine to just
> > authenticate via LDAP?
> 
> IIRC, $FIRM didn't end up having to develop Kerberos infrastructure
> just to deploy user authentication against LDAP directory services
> back-ended in OpenLDAP.  It sufficed for our needs to rely on X.509
> SSL certs as a 'shared secret'.  However, you decide what the local
> degree of paranoia requires.
> 
> Beyond user shell authentication against LDAP, one can also tweak
> other applications where user authentication is relevant to do so as
> well, e.g., Web-based services backed by Apache HTTPd (and thus
> entailing plumbing added to the Apache conffiles).  Bear that in mind
> if relevant to your use-case.
> 

I will say it again (and yes, I might be biased here) A samba AD DC
will do all of the above without all of the complexity of setting up
LDAP and then extending it to just install users and groups.

Rowland
_______________________________________________
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng

Reply via email to