Re: Configuring RHEL servers to authenticate with Windows Server2008Active Directory

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Thanks for the feedback.

I'd think grouping computers in AD should work the same way. Please let the list know when you get it working.

----- Original Message ----- From: "Kenneth Holter" <kenneho.ndu@xxxxxxxxx>
To: "General Red Hat Linux discussion list" <redhat-list@xxxxxxxxxx>
Sent: Friday, January 29, 2010 1:52 PM
Subject: Re: Configuring RHEL servers to authenticate with Windows Server2008Active Directory


Hi.


It got it working - I can now fetch both users and groups from AD directly,
and can use this information in both PAM and sudo to control access.

Didn't take much tweaking to get it work, as most of the attributes in the
document you linked to were correct. I may have made a couple of changes,
but don't recall exactly which. I'll paste inn the mappings here for others
to use:

-- snip --
nss_base_passwd ou=linux,dc=example,dc=com
nss_base_shadow ou=linux,dc=example,dc=com
nss_base_group ou=linux,dc=example,dc=com
nss_map_objectclass posixAccount user
nss_map_objectclass shadowAccount user
nss_map_objectclass posixGroup group
nss_map_attribute uid sAMAccountName
nss_map_attribute gecos name
nss_map_attribute homeDirectory unixHomeDirectory
nss_map_attribute uniqueMember member
nss_map_attribute cn cn
nss_map_attribute shadowLastChange pwdLastSet
pam_login_attribute sAMAccountName
pam_filter objectclass=User
pam_password ad
pam_member_attribute member
-- snip --

The next issue would be to group computers, so that I can give a groups of
users (collected in a regular AD gruop) access/privileges to a group of
servers. I'm thinking that such groups of computers also should be
maintained in AD. Is this how others are doing it?


- Kenneth




On Thu, Jan 28, 2010 at 2:00 PM, s u p e r n a u t <supernaut@xxxxxxx>wrote:

Kenneth,

I'd be interested to know if this worked for you.  Did you have to do
anything specific that's different to that guide to make it work with W2K8?

Thanks.

----- Original Message ----- From: "s u p e r n a u t" <supernaut@xxxxxxx>

To: "General Red Hat Linux discussion list" <redhat-list@xxxxxxxxxx>
Sent: Wednesday, January 27, 2010 3:17 PM

Subject: Re: Configuring RHEL servers to authenticate with Windows
Server2008Active Directory


 I'm not sure I understand why you'd want to do that.  After you've
installed AD Services Identity Management for UNIX, you can specify a user's primary (AD) group under his AD properties under the UNIX Attributes tab.

Then you basically assign/change permissions on the Linux system as
username:ad_group_name.

I think the idea is that you'd use AD groups for file/folder access and
not the Linux groups anymore, although the Linux groups could still be used
if you wanted to.

I'm a bit rusty on this but I believe that's what I wanted to achieve,
anyway.

----- Original Message ----- From: "Kenneth Holter" <
kenneho.ndu@xxxxxxxxx>
To: "General Red Hat Linux discussion list" <redhat-list@xxxxxxxxxx>
Sent: Wednesday, January 27, 2010 2:35 PM
Subject: Re: Configuring RHEL servers to authenticate with Windows Server
2008Active Directory


 Great, thanks, I got it working.

Currently, our linux users all are member of a posix group of the same
name
(i.e user "kenneth" is member of its own group "kenneth", which is the
default in linux as far as I know). Do you know how I can create such
groups
on AD, instead of adding users to shared groups such as "unixusers"?

On Wed, Jan 27, 2010 at 1:39 PM, s u p e r n a u t <supernaut@xxxxxxx
>wrote:

 I've used this in the past to good effect with RHEL5.3 and W2K3.  I'm
sure
you'll have to make adjustments with W2K8, but it may be a good starting
point.



http://www.interopsystems.com/downloads/Native_LDAP_native_Kerberos_and_AD_services.pdf



----- Original Message ----- From: "Kenneth Holter" <
kenneho.ndu@xxxxxxxxx
>
To: "General Red Hat Linux discussion list" <redhat-list@xxxxxxxxxx>
Sent: Wednesday, January 27, 2010 7:58 AM
Subject: Re: Configuring RHEL servers to authenticate with Windows
Server
2008Active Directory


 Thanks for your reply.


I would like the account and group information to be maintained in AD.
Possibly later on we'll implement kerberos too.


- Kenneth

On Tue, Jan 26, 2010 at 5:32 PM, Marti, Robert <RJM002@xxxxxxxx>
wrote:

 If you just care about authentication and not accounts, I'd set up

kerberos
auth - much easier. I have no experience setting up LDAP auth, sorry.

Rob Marti
________________________________________
From: redhat-list-bounces@xxxxxxxxxx [redhat-list-bounces@xxxxxxxxxx]
On
Behalf Of Kenneth Holter [kenneho.ndu@xxxxxxxxx]
Sent: Tuesday, January 26, 2010 10:17
To: redhat-list@xxxxxxxxxx
Subject: Configuring RHEL servers to authenticate with Windows Server
2008
   Active Directory

Hello all.


I'd like to set my RHEL 4 and 5 servers up to authenticate with our
Windows
server 2008 Active Directory. Using "authconfig --update --enableldap
--enableldapauth
--ldapserver=ldap.example.com--ldapbasedn=dn=example,dn=com"
and adding "binddn" and "bindpw" to the /etc/ldap.conf file, it looks
like
the linux box is connecting correctly to the AD server. But running
"getent
passwd <some-linux-user-defined-on-AD>" doesn't return any result.

I'm suspecting that maybe it's my nss_ldap attribute mappings that are
not
correct. I have no attribute mapping defined, since I would think that
there
would be some default mappings that would work. Are there any default mapping, and in case what are they? Or maybe "authconfig" set up these
mappings automatically? Any advice is appreciated.

Best regards,
Kenneth Holter
--
redhat-list mailing list
unsubscribe mailto:redhat-list-request@xxxxxxxxxx?subject=unsubscribe
https://www.redhat.com/mailman/listinfo/redhat-list

--
redhat-list mailing list
unsubscribe mailto:redhat-list-request@xxxxxxxxxx?subject=unsubscribe
https://www.redhat.com/mailman/listinfo/redhat-list

 --

redhat-list mailing list
unsubscribe mailto:redhat-list-request@xxxxxxxxxx?subject=unsubscribe
https://www.redhat.com/mailman/listinfo/redhat-list



--
redhat-list mailing list
unsubscribe mailto:redhat-list-request@xxxxxxxxxx?subject=unsubscribe
https://www.redhat.com/mailman/listinfo/redhat-list

 --
redhat-list mailing list
unsubscribe mailto:redhat-list-request@xxxxxxxxxx?subject=unsubscribe
https://www.redhat.com/mailman/listinfo/redhat-list



--
redhat-list mailing list
unsubscribe mailto:redhat-list-request@xxxxxxxxxx?subject=unsubscribe
https://www.redhat.com/mailman/listinfo/redhat-list



--
redhat-list mailing list
unsubscribe mailto:redhat-list-request@xxxxxxxxxx?subject=unsubscribe
https://www.redhat.com/mailman/listinfo/redhat-list

--
redhat-list mailing list
unsubscribe mailto:redhat-list-request@xxxxxxxxxx?subject=unsubscribe
https://www.redhat.com/mailman/listinfo/redhat-list



--
redhat-list mailing list
unsubscribe mailto:redhat-list-request@xxxxxxxxxx?subject=unsubscribe
https://www.redhat.com/mailman/listinfo/redhat-list

[Index of Archives]     [CentOS]     [Kernel Development]     [PAM]     [Fedora Users]     [Red Hat Development]     [Big List of Linux Books]     [Linux Admin]     [Gimp]     [Asterisk PBX]     [Yosemite News]     [Red Hat Crash Utility]


  Powered by Linux