- Community Home
- >
- Servers and Operating Systems
- >
- Operating Systems
- >
- Operating System - HP-UX
- >
- Re: Help with LDAP & PAM
Categories
Company
Local Language
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Forums
Discussions
Discussions
Discussions
Forums
Discussions
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Community
Resources
Forums
Blogs
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
02-26-2008 05:23 AM
02-26-2008 05:23 AM
Help with LDAP & PAM
I'm about to go completely crazy.
I'm trying to set up an 11.31 host to be an LDAP-client to our RedHat Enterprise Linux server running OpenLDAP.
LDAPUX 'REQUIRES' that the client configuration exists in the servers namespace to set it up even at the most basic level. And the instructions on how to create that configuration is ridiculously complex.
I did find a config that I managed to get to work (after modifying it heavily), but then I'm totally unable to use any schema's that's not standard. We have made a schema for checking whether the user is authorized to log on to a system, but since that's not a standard scheme LDAPUX refuses to deal with it.
I though that I might be able to use OpenLDAP instead of LDAPUX - but boy was I wrong.
It seems totally impossible to get the included pam_ldap to use anything other than LDAPUX, and it seems equally impossible to compile an opensource pam_ldap on HP-UX 11.31.
Is there anyone out there that might be able to help me?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
02-27-2008 01:00 AM
02-27-2008 01:00 AM
Re: Help with LDAP & PAM
do you have the configuration profile created
on the LDAP server? I guess it's important, that the P of ou=Profiles is uppercase.
Example:
dn: cn=profile1,ou=Profiles,o=nis_bonmp
preferredserverlist: 172.25.91.180:389
servicesearchdescriptor: passwd:o=nis_bonmp?sub?(objectclass=posixaccount)
servicesearchdescriptor: shadow:o=nis_bonmp?sub?(objectclass=shadowaccount)
servicesearchdescriptor: group:o=nis_bonmp?sub?(objectclass=posixgroup)
servicesearchdescriptor: pam:o=nis_bonmp?sub?(objectclass=posixaccount)
servicesearchdescriptor: rpc:o=nis_bonmp?sub?(objectclass=oncrpc)
servicesearchdescriptor:
protocols:o=nis_bonmp?sub?(objectclass=ipprotocol)
servicesearchdescriptor: networks:o=nis_bonmp?sub?(objectclass=ipnetwork)
servicesearchdescriptor: hosts:o=nis_bonmp?sub?(objectclass=iphost)
servicesearchdescriptor: services:o=nis_bonmp?sub?(objectclass=ipservice)
servicesearchdescriptor: netgroup:o=nis_bonmp?sub?(objectclass=nisnetgroup)
credentiallevel: proxy
followreferrals: FALSE
authenticationmethod: simple
bindtimelimit: 5
defaultsearchbase: o=nis_bonmp
objectClass: top
objectClass: duaconfigprofile
cn: profile1
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
02-27-2008 01:15 AM
02-27-2008 01:15 AM
Re: Help with LDAP & PAM
But we have created an own schema that I'm unable to find out how I can get LDAPUX to use.
OpenLDAP will use any schema created, as long as its syntax is correct. But I can't get HP-UX to use OpenLDAP as a client.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
02-27-2008 01:59 AM
02-27-2008 01:59 AM
Re: Help with LDAP & PAM
to my knowledge, the HP-UX LDAP Client SW is
limited to the services listed in nsswitch.conf. And it's best to follow the
LDAP RFCs to avoid problems.
Could you post your own shema here?
Do you use the latest LDAP client version?
docs.hp.com/en/J4269-90075/J4269-90075.pdf
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
02-27-2008 02:12 AM
02-27-2008 02:12 AM
Re: Help with LDAP & PAM
I can try and download 4.15 but I seriously doubt that will make any major difference to my problem.
I would like to get OpenLDAP-client to work, but that requires a different pam_ldap. And the opensource pam_ldap that I've found seems to be impossible to compile under HP-UX.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
02-27-2008 02:15 AM
02-27-2008 02:15 AM
Re: Help with LDAP & PAM
attributetype ( 1.3.6.1.4.1.15953.9.1.1
NAME 'sudoUser'
DESC 'User(s) who may run sudo'
EQUALITY caseExactIA5Match
SUBSTR caseExactIA5SubstringsMatch
SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 )
attributetype ( 1.3.6.1.4.1.15953.9.1.2
NAME 'sudoHost'
DESC 'Host(s) who may run sudo'
EQUALITY caseExactIA5Match
SUBSTR caseExactIA5SubstringsMatch
SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 )
attributetype ( 1.3.6.1.4.1.15953.9.1.3
NAME 'sudoCommand'
DESC 'Command(s) to be executed by sudo'
EQUALITY caseExactIA5Match
SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 )
attributetype ( 1.3.6.1.4.1.15953.9.1.4
NAME 'sudoRunAs'
DESC 'User(s) impersonated by sudo'
EQUALITY caseExactIA5Match
SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 )
attributetype ( 1.3.6.1.4.1.15953.9.1.5
NAME 'sudoOption'
DESC 'Options(s) followed by sudo'
EQUALITY caseExactIA5Match
SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 )
objectclass ( 1.3.6.1.4.1.15953.9.2.1 NAME 'sudoRole' SUP top STRUCTURAL
DESC 'Sudoer Entries'
MUST ( cn )
MAY ( sudoUser $ sudoHost $ sudoCommand $ sudoRunAs $ sudoOption $description ) )
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
02-27-2008 03:19 AM
02-27-2008 03:19 AM
Re: Help with LDAP & PAM
as a workaround, I would install a cronjob
which downloads the sudoers file with ldapsearch.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
02-27-2008 03:42 AM
02-27-2008 03:42 AM
Re: Help with LDAP & PAM
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
02-27-2008 08:01 PM
02-27-2008 08:01 PM
Re: Help with LDAP & PAM
Is it just to provide users, groups, authentication against OpenLDAP, or are you trying to include authorization (limit user's ability to log into a particular host), etc?
In my case, I'm going against Windows AD 2k, so there are strange differences since they don't match the RFC2307 POSIX LDAP spec completely, but hey, it's just a guideline right?
If you are looking for authorization, why not use the built-in pam_authz module? There are references for using it around the LDAP-UX docs, but basically, add the pam_authz lines to the /etc/pam.conf, but ONLY in the account section, you aren't proving who they are, only that they are authorized to log in. Example:
# Account management
#
login account required /usr/lib/security/libpam_updbe.1
login account required /usr/lib/security/libpam_authz.1
login account sufficient /usr/lib/security/libpam_krb5.1
login account required /usr/lib/security/libpam_unix.1
You need to repead for su, dtlogin, dtaction , ftp, rcomds and sshd.
updbe is really cool, it enables the pam_user.conf, which lets you disable using particular auth models for particular accounts, such as root, operator, oracle, or other service accounts. KRB is obviously Kerberos, I need it for getting to the AD mostly.
The config of pam_authz is under /etc/opt/ldapux/pam_authz.policy.
It's pretty simple, there is a .template file with examples, but I was never able to get any of the ldap_group or ldap_filters to work, so I just used unix groups. Create group in the directory (hostname_access), give it a GID and some users. If you are in, you log in, if not, too bad.
Example:
allow:unix_group:server2_access,server2_local
server2_local contains root, oracle, operator, etc. sort of accounts that are LOCAL to the host, so this group is in /etc/group.
server2_access is from the directory.
The biggest trouble with LDAP-UX is that you must have the profile schema in your directory, it must be right, and it must point to the right objects to translate. It's also a little finicky about the whole proxy user thing.
If you've got the host under support, give backline a call. It will take about 3 people, but there are some very good people in the team for LDAP-UX. I ended up on the phone with the guy that wrote most of the docs.
Oh, and I know, IT people don't read docs and all that, but in this case, read the docs. They're really good.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
02-28-2008 01:36 AM
02-28-2008 01:36 AM
Re: Help with LDAP & PAM
But LDAP-UX doesn't support any schema that's not standard.
We also use the sudoers to check whether a user is allowed to login to a system. If the user can run sudo on that host then he's allowed to login.
This works great in RHEL, AIX and Solaris - but I'm completely unable to get it to work in HP-UX.
LDAP-UX doesn't want to know about our sudoers-schema, and I'm unable to compile an opensource pam_ldap to be able to use OpenLDAP.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
02-28-2008 05:21 AM
02-28-2008 05:21 AM
Re: Help with LDAP & PAM
Does your sudoers schema build the whole local file, or is it a reference point. Is there a local sudoers file that references groups for particular roles, or are you building the whole thing?
If you are just referencing groups, you should be able to just replace the group member portion of the LDAP-UX schema (in the ldapuxprofile in your directory) with the particular schema identifier.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
02-28-2008 05:28 AM
02-28-2008 05:28 AM
Re: Help with LDAP & PAM
It's pre-compiled for you and in the Internet Express kit for 11iv1 and v2, for v3, I'm not so sure.
Here's the v2 one:
http://h20392.www2.hp.com/portal/swdepot/displayProductInfo.do?productNumber=HPUXIEXP1123
Also, from the Porting & Archiving center, they have a compiled v3 version:
http://hpux.ece.ualberta.ca/hppd/hpux/Networking/Misc/openldap-2.4.7/
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
03-03-2008 03:27 AM
03-03-2008 03:27 AM
Re: Help with LDAP & PAM
But since the included pam_ldap ONLY used LDAPUX, they don't help me that much.
I have downloaded and am trying to compile an opensource pam_ldap that's said to work in HP-UX.
This seems to be impossible to compile under 11.31 though.
*Sigh*
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
03-03-2008 08:12 PM
03-03-2008 08:12 PM
Re: Help with LDAP & PAM
Do you have any specifics?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
03-10-2008 12:44 PM
03-10-2008 12:44 PM
Re: Help with LDAP & PAM
I'm very sorry to see you have been having troubles with LDAP-UX. I understand your concerns about the complexity of setup, which is something we are attempting to address for the future.
I've been reviewing your query and the replies, and it seems to me that no-one has completely understood your requirement. Perhaps I don't either, but I will attempt to summarize what I believe you want to do.
sudo has a database where you keep a security policy. This policy file defines which users can run which tools and which elevated privileges the user should get (run as root for example) when running that application. You'd like to store the information of that data base in an LDAP directory server. Correct?
If so, then I don't think LDAP-UX can address your requirement. But neither can the any PAM library (from open source or from LDAP-UX.) Part of this confusion appears to be related to the difference between authentication and authorization. PAM is primarily and authentication service, not an authorization service. And sudo is primarily an authorization service. The difference between the two is that authentication is used to verify the identity of the user and authorization verifies the right of the user to perform specific actions. There is some gray area here, in that PAM implicitly acts as an authorization service, in that once complete, the user is implicitly granted authorization to access the service using PAM (I.E. such as the implicit right to login to the operating system.) And sudo also acts as an authentication service, in that it can be configured to re-verify the identity of the user performing the sudo command, by calling PAM before determining the user's rights.
To solve this problem, sudo would either have to directly connect to the LDAP server or define interface with the name service subsystem (as Claus indicated). I believe there is some effort in this area, to provide LDAP backend database for sudo. But I am also not fully learned in the sudo community so I donâ t know what is available today. And to my knowledge this effort is not tied directly to any existing OS-enabled LDAP services (like LDAP-UX or the open source versions of pam_ldap or nss_ldap). Part of this disconnect is that UNIX has no standard authorization subsystem, like PAM is for authentication. While sudo is popular, it runs at the user level and is not tied into the OS with a pluggable architecture like PAM.
On HP-UX there is a pluggable authorization subsystem, known as the Access Control Policy Switch. This subsystem is authorizationâ s equivalent to PAM on HP-UX. And it is currently plugged into LDAP, indirectly through the IdMI product. ACPS is part of the RBAC subsystem and supports sudo-like capabilities and more. You can discover more about RBAC and IdMI and how it integrates with LDAP through the following URLs:
http://h20392.www2.hp.com/portal/swdepot/displayProductInfo.do?productNumber=AccessControl
http://h20392.www2.hp.com/portal/swdepot/displayProductInfo.do?productNumber=IdMIntegration
http://h20392.www2.hp.com/portal/swdepot/displayProductInfo.do?productNumber=SelectAccessIdMI
BTW, I would like to clarify some mis-communications that were mentioned in previous replies in this thread. One of them is that OpenLDAP can be used to solve this problem. OpenLDAP is merely a directory server. While OpenLDAP can be used to store the security policy for sudo, thatâ s all it can do. sudo itself must be LDAP-enabled before it can discover that security policy in the directory server. Another concern was that LDAP-UX does not support non-standard schemas. While LDAP-UX is limited to supporting specific OS name services (like passwd, group, hosts, â ¦) and the PAM authentication subsystem, it is not required to us any specific schema to do so. LDAP-UX can use any schema desired, for those particular services. For example, you use an employee number in the employeeId attribute to represent a Unix uid number.
Hope that helps!
Bob