[wellylug] LDAP info

Cliff Pratt enkidu at cliffp.com
Tue Sep 18 20:21:54 NZST 2007


Daniel Pittman wrote:
> Cliff Pratt <enkidu at cliffp.com> writes:
>> 
>>> LDAP is the thing that comes to mind when I think about ways of 
>>> trying to manage this complexity and move towards a single sign
>>> on, (preferably using PKI rater than passwords, but that's
>>> another step).
> 
> The Windows / Active Directory answer to this is "Kerberos", which 
> provides the PKI style authentication using cryptographic tokens.
> 
>>> Trouble is, I don't really even know the questions to ask to get
>>> me on the way, hence the ill-defined nature of the original post.
>>> 
> 
> The right question to ask is "how do I use winbind authentication
> with all these services"  (except for Squid where it is "how do I use
> winbind as an NTLM authentication helper.)
> 
>>> Does LDAP sound like the right type of tool to use in this case?
>>> 
> 
> No, because you want to integrate with Active Directory
> authentication.
> 
Does he yet have AD? From what I read, I'm not sure he has.
> 
> [...]
> 
>> Ah, I wondered if they had all gone racing down the wrong track (at
>>  least partially) when they mentioned Samba.
> 
> Nope, that was absolutely the correct track.
> 
>> Samba is not after all an *authentication* tool,
> 
> Yes, it is.
> 
>> but it does provide some authentication (usually to authenticate 
>> Winders users to Unix resources).
> 
> No, it provides the SMB authentication layer against whatever
> back-end you care to configure.  This can be an internal database
> derived from the Unix account database or whatever part of a real
> Windows domain you care to name.
> 
So, will it (running on A) authenticate a user (X) using a back-end on 
C? And can the credentials that it gathers can be used to allow X to 
access a resource on D?
> 
>> I'd say that unless you have a lot of time, your best approach
>> would be to use PAM to control access to Unix servers LDAP servers
>> and consolidate all Unix authentication on those. Then expand from
>> there.
> 
> You would use the *winbind* system, which includes a PAM module, to 
> support authentication of users against the AD domain in this case.
> 
>> I'm sure you could use Windows AD's LDAP facilities to do this
>> (with the AD acting simply as an LDAP datastore for Unix, but I've
>> never done it so I don't know how hard it would be.
> 
> No.  AD's LDAP is not the correct answer for authentication and you
> will regret going down that path.
> 
> The correct answer is, yes, winbind.  That works with the LDAP,
> Kerberos and SMB domain controller stuff the same way Windows does so
> that this does all "just work."
> 
>> AD + Exchange does give a 'single signon' for mail, shares and so
>> on, but it sounds OTT for your setup which seems from your
>> description to be fairly small.
> 
> So does Linux, Squid, Apache and Samba -- if you use the right tools
> for the job. :)
> 
>> I'd go for controlling and centralising the Unix signons via
>> PAM/LDAP, and then see what you can do to pull the rest in. Your
>> mail clients should be able to use LDAP.
> 
> Now, /that/ part you probably want to wire LDAP up for -- configure a
>  directory query so the MUA can ask AD via LDAP what accounts exist
> in the global address book. :)
> 
>> I'm not sure why you are using signon for squid - any reason for
>> that? Unless you want to control what they do and see on the
>> Internet there's probably no reason for it.
> 
> It also identifies who requested each resource much more clearly than
>  without authentication and allows you to control who has Internet
> access in the office.
> 
> This is a useful or vital feature in many businesses -- especially
> where regulatory requirements make it mandatory.
> 
>> It's probably a dream to have a single signon for *everything*. Not
>>  everything supports LDAP authentication.
> 
> There is more or less nothing that you can't support for SSO with an
> AD domain under Linux using winbind, more or less.
> 

Cheers,

Cliff




More information about the wellylug mailing list