Re: FDS / PAM Integration Questions

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Jonathan Schreiter wrote:
I think your best option is to just keep Kerberos for authentication, especially if you are already using it successfully for other apps. What problems did you have with SASL mapping?

Hi Richad,
Thanks for your reply.  I've followed the documentation on the FDS website, basically to keep it as compatible as possible, I've added (under confg - sasl - mapping):

objectclass: top
objectclass: nsSaslMapping
cn: mapname
nsSaslMapRegexString: .*
nsSaslMapBaseDNTemplate: ou=People,dc=example,dc=com
nsSaslMapFilterTemplate: (cn=&)
Hmm - this doesn't seem quite right. For one (cn=&) is not the correct syntax. What does & mean here? If by & you mean "the entire string matched by nsSaslMapRegexString" then this means you expect a SASL username of something like "John Doe" which is mapped to an entry with cn=John Doe under ou=People. But this still won't work unless you do something like this:

nsSaslMapRegexString: \(.*\)
...
nsSaslMapFilterTemplate: (cn=\1)

You have to use the escaped parentheses in the regexstring to put the match into a matching group (referenced by \1).  But I still don't think this will work unless you have a very nonstandard Kerberos set up.  The regex string is supposed to match against the Kerberos principal, which is usually something like jdoe@xxxxxxxxxx, or the domain is omitted and the principal sent to the DS is just "jdoe".  The examples at http://directory.fedora.redhat.com/wiki/Howto:Kerberos describe both of these situations.


On the server I've added export KRB5_KTNAME=/etc/ldap.keytab to /opt/fedora-ds/start-slapd.  (I've done a ktdump to this file from kadmin).

On the client that previously connected to OpenLDAP, I've changed the /etc/ldap.conf (and /etc/openldap/ldap.conf) to:
host: myfds.example.com
base dc=example, dc=com
SASL_MECH GSSAPI
SASL_REALM MYEXAMPLE.COM
use_sasl on
sasl_auth_id nssldap/myclient.myexample.com

When trying to do an ldapwoami I recieve:
ldap_sasl_interactive_bind_s: Invalid credentials (49)
  additional info: SASL(-1): generic failure: GSSAPI Error: Miscellaneus failure (Permission Denied).

I have already done a kinit username to my KRB5 REALM and that user exists in the base ou=People, dc=example, dc=com on the FDS.

One thing that was not clear to me was if I needed to add a SASL Mapping entry under the configuration tab when I already have the added entry above - and if so what it should look like).
You're pretty close, just refer to http://directory.fedora.redhat.com/wiki/Howto:Kerberos
Also, I'm not sure if I need all the settings (such as a sasl_auth_id) but they are left over from configuration of openldap.
What settings?
Any help would be appreciated.

Regards,
Jonathan

--
Fedora-directory-users mailing list
Fedora-directory-users@xxxxxxxxxx
https://www.redhat.com/mailman/listinfo/fedora-directory-users

Attachment: smime.p7s
Description: S/MIME Cryptographic Signature

--
Fedora-directory-users mailing list
Fedora-directory-users@xxxxxxxxxx
https://www.redhat.com/mailman/listinfo/fedora-directory-users

[Index of Archives]     [Fedora Directory Users]     [Fedora Directory Devel]     [Fedora Announce]     [Fedora Legacy Announce]     [Kernel]     [Fedora Legacy]     [Share Photos]     [Fedora Desktop]     [PAM]     [Red Hat Watch]     [Red Hat Development]     [Big List of Linux Books]     [Gimp]     [Yosemite News]

  Powered by Linux