Server-Side ACLs for pam_ldap logins.

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



I suppose I could put something together.. are you talking about 
something from the ground up like setting up nss_ldap, adding entries 
into LDAP, etc. or assume some of the prerequisites are in place? Also 
I'm assuming some short example usages of the tools I've mentioned?

Dan-

Jason Hane wrote:

>I second that.  Dan if you can provide any resources you used to set up
>your netgroups I would hail at your feet.  I've been playing with
>netgroups unsuccessfully for the past month and a half and haven't been
>able to get it to work.  All my clients are RedHat ES 3&4.
>
>-----Original Message-----
>From: fedora-directory-users-bounces at redhat.com
>[mailto:fedora-directory-users-bounces at redhat.com] On Behalf Of Richard
>Megginson
>Sent: Tuesday, January 03, 2006 4:06 PM
>To: General discussion list for the Fedora Directory server project.
>Subject: Re: Server-Side ACLs for pam_ldap
>logins.
>
>This looks very interesting and useful.  Would you mind writing up
>something I can post on the Fedora DS wiki?  Don't worry about
>formatting, spelling, etc.  I can fix that up.
>
>Dan Cox wrote:
>
>  
>
>>As an alternative, I've used the ldap/netgroup integration for many 
>>years and it seems the cleanest way of doing it when used in 
>>conjunction with pam's access.conf. It allows me to push the same 
>>/etc/passwd and /etc/security/access.conf to all machines on the 
>>network via something like CFEngine.
>>
>>The access.conf consists of something like (allow all QA users access 
>>to QA systems):
>>+ : @QA@@QAServers : ALL
>>
>>Then I just add or remove the user or machine in the ldap netgroup 
>>entry. The real power with using ldap based netgroups is when you 
>>realize all of the services that can consume netgroup information, 
>>unlike the simple user based host attribute. For example, you can push
>>    
>>
>
>  
>
>>a global /etc/sudoers and specify certain groups of users can run 
>>certain commands on particular groups of machines all on one line.
>>CFEngine itself can query netgroups to know what config files to push,
>>    
>>
>
>  
>
>>tools like dsh (distributed ssh) can use netgroups as machine targets 
>>for commands, etc. I've administered some very large networks of 
>>machines with these tools and it makes it very easy to control.
>>
>>Dan-
>>
>>Jason Hane wrote:
>>
>>    
>>
>>>I had a similar question a few weeks ago.  I wanted to be able to 
>>>assign a list of users access to only a specific number of computers.
>>>      
>>>
>
>  
>
>>>This is the response I got from Gary Tay:
>>>
>>>FDS is very similar to SUN ONE DS5.2, I think netgroup (+ at netgroupXXX
>>>      
>>>
>
>  
>
>>>in /etc/passwd and /etc/shadow and "compat" keyword in 
>>>/etc/nsswitch.conf) LDAP maps could be setup to achieve what you 
>>>want, it has been used by many DS5.2 administrators
>>>
>>>See:
>>>http://web.singnet.com.sg/~garyttt/Installing%20and%20configuring%20O
>>>pen LDAP%20for%20RedHat%20Enterprise%20Linux3.htm
>>>Step 5Y: Configure "netgroup" to work with RedHat or Solaris Native 
>>>LDAP Clients (i.e. controlling user access to host using netgroup 
>>>LDAP maps)
>>>
>>>Also see:
>>>http://swforum.sun.com/jive/thread.jspa?threadID=52764&messageID=2238
>>>46#
>>>223846
>>>Configuring LDAP netgroups
>>>Gary
>>>-----Original Message-----
>>>From: fedora-directory-users-bounces at redhat.com
>>>[mailto:fedora-directory-users-bounces at redhat.com] On Behalf Of 
>>>Michael Montgomery
>>>Sent: Tuesday, January 03, 2006 1:35 PM
>>>To: General discussion list for the Fedora Directory server project.
>>>Subject: Re: Server-Side ACLs for pam_ldap 
>>>logins.
>>>
>>>Thanks for the response.  I'll read up on this, and see if I can get 
>>>this working.
>>>
>>>On Tue, 2006-01-03 at 11:29 -0700, Richard Megginson wrote:
>>> 
>>>
>>>      
>>>
>>>>Michael Montgomery wrote:
>>>>
>>>>  
>>>>
>>>>        
>>>>
>>>>>I do agree that this is closer to what I'm looking for, but the 
>>>>>first
>>>>>    
>>>>>          
>>>>>
>>> 
>>>
>>>      
>>>
>>>>>problem I see is that I wanted to allow Groups of people to login 
>>>>>to Groups of servers like:
>>>>>
>>>>>cn=www,ou=Group,dc=example,dc=com  is a group of www servers.
>>>>>cn=Unix,ou=Group,dc=example,dc=com  is a group of Unix users.
>>>>>
>>>>>So basically, on the people in the Unix group, can login to the www
>>>>>          
>>>>>
>
>  
>
>>>>>servers, and so forth.
>>>>>
>>>>>
>>>>>    
>>>>>          
>>>>>
>>>>Right.  The host attribute is per user.  You could set up a Roles 
>>>>for your users, and use Class of Service to automatically add the 
>>>>host attribute to the role members.
>>>>  
>>>>        
>>>>
>>>
>>>--
>>>Fedora-directory-users mailing list
>>>Fedora-directory-users at redhat.com
>>>https://www.redhat.com/mailman/listinfo/fedora-directory-users
>>>
>>>--
>>>Fedora-directory-users mailing list
>>>Fedora-directory-users at redhat.com
>>>https://www.redhat.com/mailman/listinfo/fedora-directory-users
>>> 
>>>
>>>      
>>>
>>--
>>Fedora-directory-users mailing list
>>Fedora-directory-users at redhat.com
>>https://www.redhat.com/mailman/listinfo/fedora-directory-users
>>    
>>
>
>
>--
>Fedora-directory-users mailing list
>Fedora-directory-users at redhat.com
>https://www.redhat.com/mailman/listinfo/fedora-directory-users
>  
>




[Index of Archives]     [Fedora User Discussion]     [Older Fedora Users]     [Fedora Announce]     [Fedora Package Announce]     [EPEL Announce]     [Fedora News]     [Fedora Cloud]     [Fedora Advisory Board]     [Fedora Education]     [Fedora Security]     [Fedora Scitech]     [Fedora Robotics]     [Fedora Maintainers]     [Fedora Infrastructure]     [Fedora Websites]     [Anaconda Devel]     [Fedora Devel Java]     [Fedora Legacy]     [Fedora Desktop]     [Fedora Fonts]     [ATA RAID]     [Fedora Marketing]     [Fedora Management Tools]     [Fedora Mentors]     [Fedora Package Review]     [Fedora R Devel]     [Fedora PHP Devel]     [Kickstart]     [Fedora Music]     [Fedora Packaging]     [Centos]     [Fedora SELinux]     [Fedora Legal]     [Fedora Kernel]     [Fedora QA]     [Fedora Triage]     [Fedora OCaml]     [Coolkey]     [Virtualization Tools]     [ET Management Tools]     [Yum Users]     [Tux]     [Yosemite News]     [Yosemite Photos]     [Linux Apps]     [Maemo Users]     [Gnome Users]     [KDE Users]     [Fedora Tools]     [Fedora Art]     [Fedora Docs]     [Maemo Users]     [Asterisk PBX]     [Fedora Sparc]     [Fedora Universal Network Connector]     [Fedora ARM]

  Powered by Linux