more ldap text, partly from Tarjei Huse <tarjei@nu.no>

git-svn-id: svn://svn.h5l.se/heimdal/trunk/heimdal@13888 ec53bebd-3082-4978-b11e-865c3cabbd6b
This commit is contained in:
Love Hörnquist Åstrand
2004-05-31 15:49:54 +00:00
parent 3c86d50eec
commit c95ae63697

View File

@@ -717,6 +717,12 @@ A current release of Heimdal, configured with
@code{--with-openldap=/usr/local} (adjust according to where you have @code{--with-openldap=/usr/local} (adjust according to where you have
installed OpenLDAP). installed OpenLDAP).
You can verify that you manage to configure ldap support by running
@file{kdc --builtin-hdb}, ``ldap:'' as one entry in the list.
Its also possible to configure the ldap backend as a shared module,
see option --hdb-openldap-module to configure.
@item @item
OpenLDAP 2.0.x. Configure OpenLDAP with --enable-local to enable the OpenLDAP 2.0.x. Configure OpenLDAP with --enable-local to enable the
local transport. (A patch to support SASL EXTERNAL authentication is local transport. (A patch to support SASL EXTERNAL authentication is
@@ -724,23 +730,43 @@ necessary in order to use OpenLDAP 2.1.x.)
@item @item
The KDC LDAP schema, which is distributed with OpenLDAP The KDC LDAP schema, which is distributed with OpenLDAP
@end itemize
Configure the LDAP server ACLs to accept writes from clients over the Configure the LDAP server ACLs to accept writes from clients over the
local transport. For example: local transport. For example:
@example @example
access to * access to *
by sockurl="^ldapi:///$" write by dn="uid=heimdal,dc=services,dc=padl,dc=com" write
sasl-regexp "uidNumber=0\\\+gidNumber=.*,cn=peercred,cn=external,cn=auth"
"uid=heimdal,dc=services,dc=padl,dc=com"
@end example @end example
The sasl-regexp is for mapping between the SASL/EXTERNAL and a user in
a tree. The user that the key is mapped to should be have a
krb5Principal aux object with krb5PrincipalName set so that the
``creator'' and ``modifier'' gets right in @file{kadmin}.
Another option is to make an admins group and add the dn to that group.
You also needs to make sure its possible for the KDC to connect
without encryption, the connection is already secure, its done over a
local unix socket. Comment out ``sasl-secprops minssf'' in the
configuration file.
@example
#sasl-secprops minssf=128
@end example
@item
Make sure you include the schema: Make sure you include the schema:
@example @example
include /usr/local/etc/openldap/schema/krb5-kdc.schema include /usr/local/etc/openldap/schema/krb5-kdc.schema
@end example @end example
Start the slapd with the local listener (as well as the default TCP/IP Start the slapd with the local listener (as well as the default TCP/IP
listener on port 389) as follows: listener on port 389) as follows:
@@ -759,16 +785,19 @@ principals will be stored in @file{krb5.conf}:
@example @example
[kdc] [kdc]
database = @{ database = @{
dbname = ldap:ou=KerberosPrincpals,dc=padl,dc=com dbname = ldap:ou=KerberosPrincipals,dc=padl,dc=com
mkey_file = /path/to/mkey mkey_file = /path/to/mkey
@} @}
@end example @end example
mkey_file can be excluded if you feel that you trust your ldap
directory to have the raw keys inside it.
@item @item
Once you have built Heimdal and started the LDAP server, run kadmin Once you have built Heimdal and started the LDAP server, run kadmin
(as usual) to initialize the database. Note that the instructions for (as usual) to initialize the database. Note that the instructions for
stashing a master key are as per any Heimdal installation; you are stashing a master key are as per any Heimdal installation.
encouraged to read the Heimdal documentation for further information.
@example @example
kdc# kadmin -l kdc# kadmin -l
@@ -798,6 +827,13 @@ kdc# ldapsearch -L -h localhost -D cn=manager \
@item @item
Now consider adding indexes to the database to speed up the access. Now consider adding indexes to the database to speed up the access.
@end itemize
@subsection Troubleshooting guide
https://sec.miljovern.no/bin/view/Info/TroubleshootingGuide
@node Using Samba LDAP password database, , Using LDAP to store the database, Setting up a realm @node Using Samba LDAP password database, , Using LDAP to store the database, Setting up a realm
@section Using Samba LDAP password database @section Using Samba LDAP password database
@cindex Samba @cindex Samba