Re: Server-Side ACLs for pam_ldap logins.

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 




As an alternative, I've used the ldap/netgroup integration for many years and it seems the cleanest way of doing it when used in conjunction with pam's access.conf. It allows me to push the same /etc/passwd and /etc/security/access.conf to all machines on the network via something like CFEngine.

The access.conf consists of something like (allow all QA users access to QA systems):
+ : @QA@@QAServers : ALL

Then I just add or remove the user or machine in the ldap netgroup entry. The real power with using ldap based netgroups is when you realize all of the services that can consume netgroup information, unlike the simple user based host attribute. For example, you can push a global /etc/sudoers and specify certain groups of users can run certain commands on particular groups of machines all on one line. CFEngine itself can query netgroups to know what config files to push, tools like dsh (distributed ssh) can use netgroups as machine targets for commands, etc. I've administered some very large networks of machines with these tools and it makes it very easy to control.

Dan-

Jason Hane wrote:

I had a similar question a few weeks ago.  I wanted to be able to assign
a list of users access to only a specific number of computers.  This is
the response I got from Gary Tay:

FDS is very similar to SUN ONE DS5.2, I think netgroup (+@netgroupXXX in
/etc/passwd and /etc/shadow and "compat" keyword in /etc/nsswitch.conf)
LDAP maps could be setup to achieve what you want, it has been used by
many DS5.2 administrators

See:
http://web.singnet.com.sg/~garyttt/Installing%20and%20configuring%20Open
LDAP%20for%20RedHat%20Enterprise%20Linux3.htm
Step 5Y: Configure "netgroup" to work with RedHat or Solaris Native LDAP
Clients
(i.e. controlling user access to host using netgroup LDAP maps)

Also see:
http://swforum.sun.com/jive/thread.jspa?threadID=52764&messageID=223846#
223846
Configuring LDAP netgroups Gary
-----Original Message-----
From: fedora-directory-users-bounces@xxxxxxxxxx
[mailto:fedora-directory-users-bounces@xxxxxxxxxx] On Behalf Of Michael
Montgomery
Sent: Tuesday, January 03, 2006 1:35 PM
To: General discussion list for the Fedora Directory server project.
Subject: Re:  Server-Side ACLs for pam_ldap
logins.

Thanks for the response.  I'll read up on this, and see if I can get
this working.

On Tue, 2006-01-03 at 11:29 -0700, Richard Megginson wrote:
Michael Montgomery wrote:

I do agree that this is closer to what I'm looking for, but the first

problem I see is that I wanted to allow Groups of people to login to Groups of servers like:

cn=www,ou=Group,dc=example,dc=com  is a group of www servers.
cn=Unix,ou=Group,dc=example,dc=com  is a group of Unix users.

So basically, on the people in the Unix group, can login to the www servers, and so forth.


Right. The host attribute is per user. You could set up a Roles for your users, and use Class of Service to automatically add the host attribute to the role members.


--
Fedora-directory-users mailing list
Fedora-directory-users@xxxxxxxxxx
https://www.redhat.com/mailman/listinfo/fedora-directory-users

--
Fedora-directory-users mailing list
Fedora-directory-users@xxxxxxxxxx
https://www.redhat.com/mailman/listinfo/fedora-directory-users

--
Fedora-directory-users mailing list
Fedora-directory-users@xxxxxxxxxx
https://www.redhat.com/mailman/listinfo/fedora-directory-users

[Index of Archives]     [Fedora Directory Users]     [Fedora Directory Devel]     [Fedora Announce]     [Fedora Legacy Announce]     [Kernel]     [Fedora Legacy]     [Share Photos]     [Fedora Desktop]     [PAM]     [Red Hat Watch]     [Red Hat Development]     [Big List of Linux Books]     [Gimp]     [Yosemite News]

  Powered by Linux