guides:reference:ldap_setup
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
guides:reference:ldap_setup [2019/12/23 16:14] – ↷ Page moved from maintenance:general:ldap_setup to guides:reference:ldap_setup yspeerte | guides:reference:ldap_setup [2024/07/03 12:31] (current) – external edit 127.0.0.1 | ||
---|---|---|---|
Line 1: | Line 1: | ||
+ | ====== Ldap / AD setup ====== | ||
+ | |||
+ | NetYCE supports user authentication against Ldap and Microsoft Active Directory (AD) servers. The AD support will circumvent the Kerberos protocol and uses Ldap directly. | ||
+ | |||
+ | NetYCE Ldap/AD is supported by delegating the user **authentication** to Ldap/AD completely, but the user **authorization** is controlled by Ldap/AD and managed within NetYCE. Where Ldap/AD is used to select the appropriate | ||
+ | user-group for the user, NetYCE must then configure the group is the appropriate permissions levels and scopes. | ||
+ | |||
+ | The Ldap/AD setup must therefore be able to provide the user's targeted user-group. Then, the name of the Ldap/AD user-group must match the NetYCE user-group. Should the named user-group not exist in NetYCE, a default user-group can be defined, resulting in a default set of authorizations. | ||
+ | |||
+ | NetYCE will not support updating Ldap/AD passwords or support notifications of expired or about-to-expire passwords. | ||
+ | |||
+ | In the case of AD, the setup supports '' | ||
+ | |||
+ | > // | ||
+ | |||
+ | |||
+ | ===== Yce_setup table ===== | ||
+ | |||
+ | The Ldap/AD configuration for NetYCE is defined using the ' | ||
+ | |||
+ | |||
+ | ===== Selecting the profile ===== | ||
+ | |||
+ | Multiple setups can exist in this table and are called ' | ||
+ | |||
+ | The entry '' | ||
+ | |||
+ | ^ Profile | ||
+ | |default |yce_server |profile |netyce.org | |A new NetYCE server will use this profile by default | | ||
+ | |||
+ | After a new server registers itself, the default profile is assigned and can be modified to use a different login profile if desired. | ||
+ | |||
+ | ^ Profile | ||
+ | |yceone |yce_server |profile |netyce.org | |the authentication profile used by this server | | ||
+ | |ycetwo |yce_server |profile |acme.production | |the authentication profile used by this server | | ||
+ | |ycethree |yce_server |profile |acme.test | |the authentication profile used by this server | | ||
+ | |||
+ | ===== Login policy ===== | ||
+ | |||
+ | Each profile consists of four sections. The first section use '' | ||
+ | |||
+ | The login process and the methods used is controlled using these settings. When users are created using the NetYCE GUI, they are considered ' | ||
+ | |||
+ | After Ldap/AD is setup and a user logs in into NetYCE, this user will also be added to the ' | ||
+ | |||
+ | Since there are two types of users and two matching distinct login methods, the corresponding login method will be used. If the '' | ||
+ | |||
+ | If the group-name for a local or ldap user does not exist within NetYCE, the group named in '' | ||
+ | |||
+ | Two additional settings control what happens //after// the initial login method failed: the //other// login method can be attempted when these settings allow that. | ||
+ | |||
+ | When '' | ||
+ | And when '' | ||
+ | |||
+ | Finally '' | ||
+ | |||
+ | |||
+ | ^ Type ^ Parameter | ||
+ | |login_policy |default_group |Default |Local or Ldap users are assigned this NetYCE user-group when the configured or Ldap user-group does not exist in NetYCE | | ||
+ | |login_policy |enable_ldap |yes |Permit logging in using the ldap login method | | ||
+ | |login_policy |local_retry_ldap |no |Permit using the ldap login method for local users that failed their local login attempt | | ||
+ | |login_policy |ldap_retry_local |no |Permit using the local login method for ldap users that failed their ldap login attempt | | ||
+ | |login_policy |local_group_override |no |Permit the assignment the local user group of the user when that user authenticated against Ldap. The Ldap group is then ignored. | | ||
+ | |||
+ | ===== Ldap admin ===== | ||
+ | |||
+ | entries with ''< | ||
+ | |||
+ | ^ Type ^ Parameter | ||
+ | |Ldap_admin |use_anonymous |no |Is anonymous admin allowed or does an admin_dn and password apply? Yes or No | | ||
+ | |Ldap_admin |ldap_admin_dn |cn=admin, | ||
+ | |Ldap_admin |ldap_admin_pass |secret |In case not anonymous, enter the password in cleartext | | ||
+ | |||
+ | ===== Ldap servers ===== | ||
+ | |||
+ | Entries with ''< | ||
+ | |||
+ | Two Ldap/AD servers can be configured for redundancy purposes. The server '' | ||
+ | |||
+ | To enable redundancy, set '' | ||
+ | |||
+ | To prevent excessive login times should the primary ldap server become unavailable, | ||
+ | |||
+ | ^ Type ^ Parameter | ||
+ | |Ldap_server |ldap_server_pri |genie.netyce.org |The fqdn or ip of the primary Ldap server | | ||
+ | |Ldap_server |ldap_port_pri |389 |The ip port of the primary Ldap server | | ||
+ | |Ldap_server |ldap_secure_pri |no |To use secure-ldap 'ldap over SSL'. Well-known ports overrule | | ||
+ | |Ldap_server |enable_secondary |yes |Is a fallback Ldap server available? Yes or No | | ||
+ | |Ldap_server |ldap_server_sec |specter.netyce.org |The fqdn or ip of the secondary Ldap server | | ||
+ | |Ldap_server |ldap_port_sec |389 |The ip port of the primary Ldap server | | ||
+ | |Ldap_server |ldap_secure_pri |no |To use secure-ldap 'ldap over SSL'. Well-known ports overrule | | ||
+ | |Ldap_server |failback_time |60 |The time in seconds to retry the primary Ldap once the fallback is active | | ||
+ | |||
+ | ===== Ldap schema ===== | ||
+ | |||
+ | The final part using ''< | ||
+ | |||
+ | The Ldap_schema setup parameters can be used to create several authorization sequences to match the needs of the local Ldap/AD organization. | ||
+ | |||
+ | Four base ldap schemas are supported, each illustrated below. They can serve as a starting point for a required setup. | ||
+ | |||
+ | ==== 1 - Using user-to-group attribute mapping ==== | ||
+ | |||
+ | This method uses the traditional user to group mapping of native Ldap systems. The user is first located in the user ' | ||
+ | |||
+ | To configure it, the '' | ||
+ | |||
+ | From that record the group name is retrieved using '' | ||
+ | |||
+ | Before the group resolving is started, the user authentication takes place. The username and password are used to retrieve the user ' | ||
+ | |||
+ | {{: | ||
+ | |||
+ | ^Ldap_schema parameter^Note^ | ||
+ | |usr_search_base |required | | ||
+ | |usr_uid_attr |required | | ||
+ | || | ||
+ | |usr_map_attr |required | | ||
+ | |usr_list_attr |-empty- | | ||
+ | |usr_list_pattern |-empty- | | ||
+ | || | ||
+ | |grp_search_base |required | | ||
+ | |grp_name_attr |required | | ||
+ | || | ||
+ | |grp_map_attr_|required | | ||
+ | |grp_list_attr |-empty- | | ||
+ | |grp_list_pattern |-empty- | | ||
+ | |||
+ | ==== 2 - Using user-membership list ==== | ||
+ | |||
+ | Instead of creating a mapping to the group table to find the group record, this method uses a list of group memberships directly in the user record. To indicate that a list is retrieved, the '' | ||
+ | |||
+ | This list is supposed to indicate the groups the user is a member of, hence the " | ||
+ | |||
+ | Each DN item in the list is compared against the pattern, and when found matching the corresponding record is retrieved from Ldap. From the record the group name as indicated by '' | ||
+ | |||
+ | Should none of the DN's match or none of the groups exist, then the default group name form '' | ||
+ | |||
+ | {{: | ||
+ | |||
+ | ^Ldap_schema parameter^Note^ | ||
+ | |usr_search_base |required | | ||
+ | |usr_uid_attr |required | | ||
+ | || | ||
+ | |usr_map_attr |-empty- | | ||
+ | |usr_list_attr |required | | ||
+ | |usr_list_pattern |required | | ||
+ | || | ||
+ | |grp_search_base |-empty- | | ||
+ | |grp_name_attr |required | | ||
+ | || | ||
+ | |grp_map_attr_|-empty- | | ||
+ | |grp_list_attr |-empty- | | ||
+ | |grp_list_pattern |-empty- | | ||
+ | |||
+ | |||
+ | ==== 3 - Using user-to-group attribute mapping and group membership list ==== | ||
+ | |||
+ | In this setup the user-to-group mapping is used in combination with a membership list for the group. The setup parameters are used similarly to the methods 1 and 2 above, but note that now the '' | ||
+ | |||
+ | {{: | ||
+ | |||
+ | ^Ldap_schema parameter^Note^ | ||
+ | |usr_search_base |required | | ||
+ | |usr_uid_attr |required | | ||
+ | || | ||
+ | |usr_map_attr |required | | ||
+ | |usr_list_attr |-empty- | | ||
+ | |usr_list_pattern |-empty- | | ||
+ | || | ||
+ | |grp_search_base |required | | ||
+ | |grp_name_attr |required | | ||
+ | || | ||
+ | |grp_map_attr_|required | | ||
+ | |grp_list_attr |required | | ||
+ | |grp_list_pattern |required | | ||
+ | |||
+ | ==== 4 - Using user-membership and group-membership lists ==== | ||
+ | |||
+ | This setup is using nested user- and group-lists. for each DN in the user membershiplist is the group retrieved and all memberships of the group then tested for a supported group name. | ||
+ | |||
+ | {{: | ||
+ | |||
+ | ^Ldap_schema parameter^Note^ | ||
+ | |usr_search_base |required | | ||
+ | |usr_uid_attr |required | | ||
+ | || | ||
+ | |usr_map_attr |-empty- | | ||
+ | |usr_list_attr |required | | ||
+ | |usr_list_pattern |required | | ||
+ | || | ||
+ | |grp_search_base |-empty- | | ||
+ | |grp_name_attr |required | | ||
+ | || | ||
+ | |grp_map_attr_|-empty- | | ||
+ | |grp_list_attr |required | | ||
+ | |grp_list_pattern |required | | ||
+ | |||
+ | |||
+ | ==== 5 - Using user-membership and mapped group ==== | ||
+ | |||
+ | > // | ||
+ | |||
+ | {{: | ||
+ | |||
+ | |||
+ | ==== 6 - Using user-membership and mapped group-membership lists ==== | ||
+ | |||
+ | > // | ||
+ | |||
+ | {{: | ||
+ | |||
+ | |||
+ | ==== User attribute mappings === | ||
+ | |||
+ | NetYCE users using Ldap authentication and authorization have a user-account created for them in the NetYCE administration. As with local users, ldap users have several attributes associated with them. For ldap users these can be retrieved from the Ldap user record when logging in successfully. | ||
+ | |||
+ | The following setup ldap_schema variables can be defined which will be assigned to the NetYCE user account: | ||
+ | |||
+ | ^'' | ||
+ | |'' | ||
+ | |'' | ||
+ | |'' | ||
+ | |'' | ||
+ | |'' | ||
+ | |'' | ||
+ | |'' | ||
+ | |||
+ | In this list the " | ||
+ | |||
+ | ==== List patterns ==== | ||
+ | |||
+ | The '' | ||
+ | |||
+ | < | ||
+ | | ||
+ | | ||
+ | </ | ||
+ | |||
+ | To filter the different elements of these DN we need a comparison function with some advanced features. The pattern to match against the DN's is as with the DN's separated by commas and each element will be compared against its corresponding DN element. Only if all elements of the pattern match all elements of the DN will the comparison result in a match. | ||
+ | |||
+ | The pattern however, needs not to have elements for all elements of the DN. If the pattern runs out of elements the comparison is considered a match. Therefore a pattern with only one element will be tested against the first element of the DN and ignore the remaining elements. | ||
+ | |||
+ | The pattern matching is case in-sensitive and supports the wildcard characters ' | ||
+ | |||
+ | Some examples of patterns that can be used with these DN examples: | ||
+ | < | ||
+ | sample DN's: | ||
+ | CN=ROLE-NETYCE-E-department1, | ||
+ | CN=ROLE-NETYCE-D-department2, | ||
+ | sample patterns: | ||
+ | CN=ROLE-NETYCE-D-* | ||
+ | CN=ROLE-NETYCE-? | ||
+ | CN=ROLE-NETYCE-*, | ||
+ | CN=ROLE-NETYCE-*, | ||
+ | </ | ||
+ | |||
+ | If there is a need to match against more than one possible value for an element these can be included in the pattern element by separating them with a ' | ||
+ | |||
+ | Please note that the syntax of each element is ''< | ||
+ | |||
+ | < | ||
+ | sample multiple-value patterns: | ||
+ | CN=ROLE-NETYCE-E-*|ROLE-NETYCE-D-* | ||
+ | CN=ROLE-NETYCE-E-*|ROLE-NETYCE-D-*, | ||
+ | *, | ||
+ | wrong are: | ||
+ | CN=ROLE-NETYCE-E-*|CN=ROLE-NETYCE-D-* | ||
+ | C*=ROLE-* | ||
+ | *, | ||
+ | ,DC=org|com | ||
+ | </ | ||
+ | |||
+ | An empty pattern will be equivalent to the ' | ||
+ | < | ||
+ | pass-all pattern: | ||
+ | * | ||
+ | </ | ||
+ | |||
+ | |||
+ | ===== Active Directory support ===== | ||
+ | |||
+ | Microsoft Active Directory (AD) is LDAP based and can be accessed using either Kerberos and Ldap. NetYCE uses Ldap due to its more generic and low-level operation. | ||
+ | |||
+ | ==== multi-Forest deployments ==== | ||
+ | |||
+ | NetYCE support of AD is limited to a single " | ||
+ | |||
+ | In cases where a multi-forest environment is to be supported by NetYCE, a workaround is available in the form of dedicated NetYCE front-end servers. Since the ldap schema is part of a login-profile and profiles are selected on a per server name basis, users belonging to one AD forest can be assigned a dedicated server while users belonging to another AD forest must connect to their corresponding server. | ||
+ | |||
+ | Once logged-in, and the permissions granted, the users will experience the same NetYCE database, networking and jobs environment. | ||
+ | |||
+ | |||
+ | ==== User account control ==== | ||
+ | |||
+ | Users logged-in using ldap will not be able to change their passwords. But they might be denied access to NetYCE using the AD " | ||
+ | |||
+ | This account control is enabled by setting '' | ||
+ | |||
+ | < | ||
+ | | ||
+ | | ||
+ | | ||
+ | | ||
+ | | ||
+ | | ||
+ | | ||
+ | # 0x0200 => " | ||
+ | | ||
+ | | ||
+ | </ | ||
+ | |||
+ | If the user account control is validated true for any of these masks, access will be denied with the indicated reason. Obviously the 0x0200 representing normal access should be skipped. If additional masks are to be implemented, | ||
+ | |||
+ | |||
+ | |||
+ | ==== ldapsearch examples on AD ==== | ||
+ | |||
+ | query user ' | ||
+ | |||
+ | < | ||
+ | ldapsearch -LLL -H ldap:// | ||
+ | </ | ||
+ | |||
+ | query whether user ' | ||
+ | |||
+ | < | ||
+ | ldapsearch -LLL -H ldap:// | ||
+ | </ | ||
+ | |||
+ | query user ' | ||
+ | |||
+ | < | ||
+ | | ||
+ | </ | ||
+ | |||
+ | Query the groups user ' | ||
+ | |||
+ | < | ||
+ | ldapsearch -LLL -H ldaps:// | ||
+ | |||
+ | </ | ||
+ | |||
+ | For this to work add the following to the ldap.conf to disable certificate authentication: | ||
+ | |||
+ | < | ||
+ | HOST 192.168.56.104 | ||
+ | PORT 636 | ||
+ | TLS_REQCERT ALLOW | ||
+ | </ | ||
+ | |||
+ | https:// | ||
+ | |||
+ | |||
+ | Errors and causes: | ||
+ | < | ||
+ | Ldap access error (80090308: LdapErr: DSID-0C0903C5, | ||
+ | </ | ||
+ | Something with the bind is not going right, check configuration regarding ldap server, ldap_admin_dn, | ||
+ | |||
+ | < | ||
+ | Ldap group lookup failed (0000208D: NameErr: DSID-03100213, | ||
+ | </ | ||
+ | this can happen when you have local_group_override set to no and the group variables are not properly set resulting in no groups to be found for the user who did authenticate properly | ||
+ | |||
+ | \\ | ||
+ | |||