On Jan 14, 2006, at 4:41 PM, Allan Spagnol Comar wrote:

thak you all. now I really understand what about PAM and LDAP.


The upshot of all this is.....if you have more than 5 computers that you want to all have the same usernames and passwords, ldap and nis, etc might be more than you need. rsyncing /etc/passwd and /etc/ shadow is probably going to be sufficient for a very small network. beyond 5 or so computers, the other methods start to earn their way. no matter what, though, pam stays in the soluution stack.


On 1/13/06, John Jolet <[EMAIL PROTECTED]> wrote:


On Jan 13, 2006, at 2:37 PM, Jose Gonzalez Gomez wrote:
2006/1/13, John Jolet <[EMAIL PROTECTED]>:

On Jan 13, 2006, at 11:45 AM, Allan Spagnol Comar wrote:

thanks. I believe I am starting to understand this.

I was seeing that ldap can authenticate in a lot of types, like ,
databases, files, and PAM do some things like that too.... or am I
wrong ?

as far as I know you are wrong.  ldap is an authentication
mechanism.  it stores usernames, passwords, and much more.


LDAP is *not* an authentication mechanism. LDAP stands for Lightweight Directory Access Protocol, so LDAP is a protocol you use to access data
stored in a structured way, called directory. An LDAP directory is a
directory that may be accessed using LDAP. An LDAP server is a server that serves its data using LDAP. LDAP servers are used for a lot of things, and two of them may be single sign on or centralized authentication (they are
different although related things).
You are correct...I was attempting to highlight the distinction between a
security storage mechanism (which is what I should have said) and a
mechanism that does the actual authentication.

To access data in a directory you may have to authenticate to access the data. This authentication can be done in several ways, and one of them is called simple bind: in this case you provide a path to locate an object in the directory and a password and the server "compares" the password provided with the password stored in the specified object. IIRC the PAM- LDAP module
uses simple bind to authenticate an user trying to gain access to the
system. This is, the PAM module takes the provided user and password and tries to authenticate itself against the LDAP server using the simple bind
mechanism, translating the user into a path to locate the object
representing that user in the directory.

 BIG WARNING: Don't do this unless you're using simple bind over SSL
protected connections unless you want your passwords to travel (almost?) as
clear text through the network.

This MIGHT also not be a security risk if the ldap server and the service attempting to authenticate are on the same server. I usually did simple bind on the ldap server itself, and tls/ssl from all the other servers.
 HTH
 Jose




--
An application asked:
"Requeires Windows 9x, NT4 or better",
so I´ve installed Linux

--
gentoo-user@gentoo.org mailing list



--
gentoo-user@gentoo.org mailing list

Reply via email to