Re: Configuring RHEL servers to authenticate with Windows Server2008Active Directory

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hi.


It got it working - I can now fetch both users and groups from AD directly,
and can use this information in both PAM and sudo to control access.

Didn't take much tweaking to get it work, as most of the attributes in the
document you linked to were correct. I may have made a couple of changes,
but don't recall exactly which. I'll paste inn the mappings here for others
to use:

-- snip --
nss_base_passwd ou=linux,dc=example,dc=com
nss_base_shadow ou=linux,dc=example,dc=com
nss_base_group ou=linux,dc=example,dc=com
nss_map_objectclass posixAccount user
nss_map_objectclass shadowAccount user
nss_map_objectclass posixGroup group
nss_map_attribute uid sAMAccountName
nss_map_attribute gecos name
nss_map_attribute homeDirectory unixHomeDirectory
nss_map_attribute uniqueMember member
nss_map_attribute cn cn
nss_map_attribute shadowLastChange pwdLastSet
pam_login_attribute sAMAccountName
pam_filter objectclass=User
pam_password ad
pam_member_attribute member
-- snip --

The next issue would be to group computers, so that I can give a groups of
users (collected in a regular AD gruop) access/privileges to a group of
servers. I'm thinking that such groups of computers also should be
maintained in AD. Is this how others are doing it?


- Kenneth




On Thu, Jan 28, 2010 at 2:00 PM, s u p e r n a u t <supernaut@xxxxxxx>wrote:

> Kenneth,
>
> I'd be interested to know if this worked for you.  Did you have to do
> anything specific that's different to that guide to make it work with W2K8?
>
> Thanks.
>
> ----- Original Message ----- From: "s u p e r n a u t" <supernaut@xxxxxxx>
>
> To: "General Red Hat Linux discussion list" <redhat-list@xxxxxxxxxx>
> Sent: Wednesday, January 27, 2010 3:17 PM
>
> Subject: Re: Configuring RHEL servers to authenticate with Windows
> Server2008Active Directory
>
>
>  I'm not sure I understand why you'd want to do that.  After you've
>> installed AD Services Identity Management for UNIX, you can specify a user's
>> primary (AD) group under his AD properties under the UNIX Attributes tab.
>>
>> Then you basically assign/change permissions on the Linux system as
>> username:ad_group_name.
>>
>> I think the idea is that you'd use AD groups for file/folder access and
>> not the Linux groups anymore, although the Linux groups could still be used
>> if you wanted to.
>>
>> I'm a bit rusty on this but I believe that's what I wanted to achieve,
>> anyway.
>>
>> ----- Original Message ----- From: "Kenneth Holter" <
>> kenneho.ndu@xxxxxxxxx>
>> To: "General Red Hat Linux discussion list" <redhat-list@xxxxxxxxxx>
>> Sent: Wednesday, January 27, 2010 2:35 PM
>> Subject: Re: Configuring RHEL servers to authenticate with Windows Server
>> 2008Active Directory
>>
>>
>>  Great, thanks, I got it working.
>>>
>>> Currently, our linux users all are member of a posix group of the same
>>> name
>>> (i.e user "kenneth" is member of its own group "kenneth", which is the
>>> default in linux as far as I know). Do you know how I can create such
>>> groups
>>> on AD, instead of adding users to shared groups such as "unixusers"?
>>>
>>> On Wed, Jan 27, 2010 at 1:39 PM, s u p e r n a u t <supernaut@xxxxxxx
>>> >wrote:
>>>
>>>  I've used this in the past to good effect with RHEL5.3 and W2K3.  I'm
>>>> sure
>>>> you'll have to make adjustments with W2K8, but it may be a good starting
>>>> point.
>>>>
>>>>
>>>>
>>>> http://www.interopsystems.com/downloads/Native_LDAP_native_Kerberos_and_AD_services.pdf
>>>>
>>>>
>>>>
>>>> ----- Original Message ----- From: "Kenneth Holter" <
>>>> kenneho.ndu@xxxxxxxxx
>>>> >
>>>> To: "General Red Hat Linux discussion list" <redhat-list@xxxxxxxxxx>
>>>> Sent: Wednesday, January 27, 2010 7:58 AM
>>>> Subject: Re: Configuring RHEL servers to authenticate with Windows
>>>> Server
>>>> 2008Active Directory
>>>>
>>>>
>>>>  Thanks for your reply.
>>>>
>>>>>
>>>>> I would like the account and group information to be maintained in AD.
>>>>> Possibly later on we'll implement kerberos too.
>>>>>
>>>>>
>>>>> - Kenneth
>>>>>
>>>>> On Tue, Jan 26, 2010 at 5:32 PM, Marti, Robert <RJM002@xxxxxxxx>
>>>>> wrote:
>>>>>
>>>>>  If you just care about authentication and not accounts, I'd set up
>>>>>
>>>>>> kerberos
>>>>>> auth - much easier.  I have no experience setting up LDAP auth, sorry.
>>>>>>
>>>>>> Rob Marti
>>>>>> ________________________________________
>>>>>> From: redhat-list-bounces@xxxxxxxxxx [redhat-list-bounces@xxxxxxxxxx]
>>>>>> On
>>>>>> Behalf Of Kenneth Holter [kenneho.ndu@xxxxxxxxx]
>>>>>> Sent: Tuesday, January 26, 2010 10:17
>>>>>> To: redhat-list@xxxxxxxxxx
>>>>>> Subject: Configuring RHEL servers to authenticate with Windows Server
>>>>>> 2008
>>>>>>    Active Directory
>>>>>>
>>>>>> Hello all.
>>>>>>
>>>>>>
>>>>>> I'd like to set my RHEL 4 and 5 servers up to authenticate with our
>>>>>> Windows
>>>>>> server 2008 Active Directory. Using "authconfig --update --enableldap
>>>>>> --enableldapauth
>>>>>> --ldapserver=ldap.example.com--ldapbasedn=dn=example,dn=com"
>>>>>> and adding "binddn" and "bindpw" to the /etc/ldap.conf file, it looks
>>>>>> like
>>>>>> the linux box is connecting correctly to the AD server. But running
>>>>>> "getent
>>>>>> passwd <some-linux-user-defined-on-AD>" doesn't return any result.
>>>>>>
>>>>>> I'm suspecting that maybe it's my nss_ldap attribute mappings that are
>>>>>> not
>>>>>> correct. I have no attribute mapping defined, since I would think that
>>>>>> there
>>>>>> would be some default mappings that would work. Are there any default
>>>>>> mapping, and in case what are they? Or maybe "authconfig" set up these
>>>>>> mappings automatically? Any advice is appreciated.
>>>>>>
>>>>>> Best regards,
>>>>>> Kenneth Holter
>>>>>> --
>>>>>> redhat-list mailing list
>>>>>> unsubscribe mailto:redhat-list-request@xxxxxxxxxx?subject=unsubscribe
>>>>>> https://www.redhat.com/mailman/listinfo/redhat-list
>>>>>>
>>>>>> --
>>>>>> redhat-list mailing list
>>>>>> unsubscribe mailto:redhat-list-request@xxxxxxxxxx?subject=unsubscribe
>>>>>> https://www.redhat.com/mailman/listinfo/redhat-list
>>>>>>
>>>>>>  --
>>>>>>
>>>>> redhat-list mailing list
>>>>> unsubscribe mailto:redhat-list-request@xxxxxxxxxx?subject=unsubscribe
>>>>> https://www.redhat.com/mailman/listinfo/redhat-list
>>>>>
>>>>>
>>>>>
>>>> --
>>>> redhat-list mailing list
>>>> unsubscribe mailto:redhat-list-request@xxxxxxxxxx?subject=unsubscribe
>>>> https://www.redhat.com/mailman/listinfo/redhat-list
>>>>
>>>>  --
>>> redhat-list mailing list
>>> unsubscribe mailto:redhat-list-request@xxxxxxxxxx?subject=unsubscribe
>>> https://www.redhat.com/mailman/listinfo/redhat-list
>>>
>>>
>>
>> --
>> redhat-list mailing list
>> unsubscribe mailto:redhat-list-request@xxxxxxxxxx?subject=unsubscribe
>> https://www.redhat.com/mailman/listinfo/redhat-list
>>
>>
>
> --
> redhat-list mailing list
> unsubscribe mailto:redhat-list-request@xxxxxxxxxx?subject=unsubscribe
> https://www.redhat.com/mailman/listinfo/redhat-list
>
-- 
redhat-list mailing list
unsubscribe mailto:redhat-list-request@xxxxxxxxxx?subject=unsubscribe
https://www.redhat.com/mailman/listinfo/redhat-list

[Index of Archives]     [CentOS]     [Kernel Development]     [PAM]     [Fedora Users]     [Red Hat Development]     [Big List of Linux Books]     [Linux Admin]     [Gimp]     [Asterisk PBX]     [Yosemite News]     [Red Hat Crash Utility]


  Powered by Linux