On Mon, Apr 20, 2020 at 12:17:54PM -0400, Christopher Schultz wrote:
> Hmm. The LDAP stuff I think wasn't me, but I understand it a little
> bit. Brian, is there a standard I can read for this? I'm familiar with
> LDAP servers storing credentials with "{sha}" prefixes but not others.
> Honestly, for an LDAP backend, I'd expect the LDAP server to be
> checking the credentials sent by the client, not to have the client
> fetch the credentials and do its own checking. That's the whole point
> of delegating authentication to the LDAP server.

The point of "client fetches credentials via LDAP to do its own
checking" seems to be *not* to delegate authentication, but to use the
directory as a store of hashed credentials.  The only reason for doing
this that I've been able to come up with is that in this setup there
is no reason why the enterprise user has to be a directory user,
i.e. only a handful of directory administrators and service accounts
can actually authenticate identities *to the directory*, while many
objects have credentials stored in a different attribute that the
directory itself does not use for authentication.  Minimizing access
to a central store of identity and authorization makes sense in some
settings.

I get the feeling that the X.500 designers deliberately left specific
applications (like authenticating identities in other products) as an
exercise for the client designer, so as not to foreclose clever uses
they hadn't thought of.  One result is a rather Wild West approach to
using directory services for authentication.  (I see this also in
services dedicated to authentication:  seemingly no two organizations
use CAS in the same way.)

-- 
Mark H. Wood
Lead Technology Analyst

University Library
Indiana University - Purdue University Indianapolis
755 W. Michigan Street
Indianapolis, IN 46202
317-274-0749
www.ulib.iupui.edu

Attachment: signature.asc
Description: PGP signature

Reply via email to