On Thu, 8 Nov 2018 11:12:16 -0800 Rick Moen <r...@linuxmafia.com> wrote:
> Redirecting back on-list. > > Quoting wirelessd...@gmail.com (wirelessd...@gmail.com): > > > On Mon, 3 Sep 2018 at 13:47, Rick Moen <r...@linuxmafia.com> wrote: > > > > > > Anyway, it's been a _long_ time since I dealt with all of that > > > badness, so I'm probably forgetting a lot. This looks like a > > > decent starting point: https://wiki.debian.org/LDAP/Kerberos > > > (except it has little to say about AD integration). > > > > Thanks, > > Yr. welcome, Tom. > > > As there will be no Windows machines on this network, I don't have > > any requirement for AD integration. I probably should have > > clarified that further in the original email. > > Ah, that does indeed simplify things. > > > After a couple of months of head-banging and much googling of > > various docs, blogs, etc., I think I've finally managed to setup two > > replicating OpenLDAP servers talking to each other over TLS. :D > > LDIF is much less confusing now than it originally appeared to be, > > thanks to the excellent reference at http://zytrax.com/books/ldap/. > > The ldapscripts package is also working nicely in a simple way to > > add users and groups, although I'm not entirely sure why I would add > > machines to LDAP, unless I use those accounts for binding services? > > Offhand, I don't think that'd be useful, no. > > As I see it, part of what's both really useful and really annoying > about LDAP is that it was designed as an _extremely general_ > implementation of the X.500 directory management standard. So, it'll > happily inhale the kitchen sink of all possible information about > everything in the enterprise. Therefore, you often find yourself > saying 'Yes, I could do _this_ thing with it, too, but what would be > the point? I have no use-case for doing that.' The trick is to > realise that the 'But _why_?' reaction is normal and doesn't > necessarily mean you missed something significant. > > > So my next question is, whats the recommended package to > > authenticate with LDAP and allow users to login to a desktop via > > their LDAP account? I've seen various options for PAM and NSS, but > > do I need to configure both or just one? > > Tom, ten years ago and two major employers ago, I would have been glad > to send you example configurations from what I and the other senior SA > at $FIRM somewhat painfully figured out at that time. I'm really > sorry, but I just no longer have that anywhere. > > I remember that you very much needed a PAM hook, because you're > introducing a new and preferred authentication method for shell login. > Offhand, I can't remember exactly _how_ NSS is part of this picture > (being about name services, e.g., names of hosts), but NSS and PAM > are pretty intertwined. > > I remember that each machine needed a rather painfully worked out > ldap.conf file. I vaguely recall the need to have a self-signed X.509 > certificate. Each machine needed to run the nscd and nslcd daemons: > The latter was a new, surprising requirement introduced as of CentOS > 6.x (which was then new) -- though there is also an alternative > called sssd: > https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-c02791157 > > And there, I'm afraid, we've now exhausted what I can easily remember > after so many years of not needing to know it. I hope that helps. > > > Should I be diving into the world of Kerberos and attempting to > > integrate that with my OpenLDAP servers, or is it fine to just > > authenticate via LDAP? > > IIRC, $FIRM didn't end up having to develop Kerberos infrastructure > just to deploy user authentication against LDAP directory services > back-ended in OpenLDAP. It sufficed for our needs to rely on X.509 > SSL certs as a 'shared secret'. However, you decide what the local > degree of paranoia requires. > > Beyond user shell authentication against LDAP, one can also tweak > other applications where user authentication is relevant to do so as > well, e.g., Web-based services backed by Apache HTTPd (and thus > entailing plumbing added to the Apache conffiles). Bear that in mind > if relevant to your use-case. > I will say it again (and yes, I might be biased here) A samba AD DC will do all of the above without all of the complexity of setting up LDAP and then extending it to just install users and groups. Rowland _______________________________________________ Dng mailing list Dng@lists.dyne.org https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng