[wellylug] LDAP info

Daniel Pittman daniel at rimspace.net
Tue Sep 18 18:29:27 NZST 2007


Cliff Pratt <enkidu at cliffp.com> writes:
> nic wrote:
>> Cliff Pratt wrote:
>>> nic wrote:
>>>> Hi people
>>>> 
>>>> What's a good book (or other info) on how to implement LDAP for
>>>> enterprise authentication? I'm particularly interested in how to
>>>>  tie it in with Windows
>>>> 
>>> Windows Active Directory contains an LDAP server. Do you want to use
>>> that for authentication? Or do you want to authenticate Windows
>>> users using LDAP in a workgroup situation?
>>
>> There's a bunch of users with Windows desktops, a Windows 2003
>> server, a Linux box with postfix and squid, people currently have
>> separate passwords for logging on to Windows, in to mail, and on to
>> squid. 

[...]

>> LDAP is the thing that comes to mind when I think about ways of
>> trying to manage this complexity and move towards a single sign on,
>> (preferably using PKI rater than passwords, but that's another step).

The Windows / Active Directory answer to this is "Kerberos", which
provides the PKI style authentication using cryptographic tokens.

>>  Trouble is, I don't really even know the questions to ask to get me
>>  on the way, hence the ill-defined nature of the original post.

The right question to ask is "how do I use winbind authentication with
all these services"  (except for Squid where it is "how do I use winbind
as an NTLM authentication helper.)

>> Does LDAP sound like the right type of tool to use in this case? 

No, because you want to integrate with Active Directory authentication.

[...]

> Ah, I wondered if they had all gone racing down the wrong track (at
> least partially) when they mentioned Samba. 

Nope, that was absolutely the correct track.

> Samba is not after all an *authentication* tool, 

Yes, it is.

> but it does provide some authentication (usually to authenticate
> Winders users to Unix resources).

No, it provides the SMB authentication layer against whatever back-end
you care to configure.  This can be an internal database derived from
the Unix account database or whatever part of a real Windows domain you
care to name.

> I'd say that unless you have a lot of time, your best approach would
> be to use PAM to control access to Unix servers LDAP servers and
> consolidate all Unix authentication on those. Then expand from there.

You would use the *winbind* system, which includes a PAM module, to
support authentication of users against the AD domain in this case.

> I'm sure you could use Windows AD's LDAP facilities to do this (with
> the AD acting simply as an LDAP datastore for Unix, but I've never
> done it so I don't know how hard it would be.

No.  AD's LDAP is not the correct answer for authentication and you will
regret going down that path.

The correct answer is, yes, winbind.  That works with the LDAP, Kerberos
and SMB domain controller stuff the same way Windows does so that this
does all "just work."

> AD + Exchange does give a 'single signon' for mail, shares and so on,
> but it sounds OTT for your setup which seems from your description to
> be fairly small.

So does Linux, Squid, Apache and Samba -- if you use the right tools for
the job. :)

> I'd go for controlling and centralising the Unix signons via PAM/LDAP,
> and then see what you can do to pull the rest in. Your mail clients
> should be able to use LDAP. 

Now, /that/ part you probably want to wire LDAP up for -- configure a
directory query so the MUA can ask AD via LDAP what accounts exist in
the global address book. :)

> I'm not sure why you are using signon for squid - any reason for that?
> Unless you want to control what they do and see on the Internet
> there's probably no reason for it.

It also identifies who requested each resource much more clearly than
without authentication and allows you to control who has Internet access
in the office.

This is a useful or vital feature in many businesses -- especially where
regulatory requirements make it mandatory.

> It's probably a dream to have a single signon for *everything*. Not
> everything supports LDAP authentication.

There is more or less nothing that you can't support for SSO with an AD
domain under Linux using winbind, more or less.  

Regards,
        Daniel
-- 
Daniel Pittman <daniel at cybersource.com.au>           Phone: 03 9621 2377
Level 4, 10 Queen St, Melbourne             Web: http://www.cyber.com.au
Cybersource: Australia's Leading Linux and Open Source Solutions Company




More information about the wellylug mailing list