Re: openldap and FDS

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Sat, 2007-03-10 at 12:51 -0600, Les Mikesell wrote:
> Craig White wrote:
> > ----
> > FDS isn't installed by default because there is simply no justification
> > for doing so. All of the applications/daemons that have ldap client
> > libraries compiled in as options 
> 
> Are you saying these don't follow standards and thus interoperate correctly?
----
of course not - both FDS and OpenLDAP incorporate a substantial portion
of LDAPv3 standards.
----
> 
> > So instead of installing OpenLDAP-Server you can install FDS and the
> > choice is really up to the system administrator but neither is suitable
> > as a default install.
> 
> I agree that they aren't suitable, but don't understand why this wasn't 
> fixed years ago.  How is someone with a few machines supposed to make 
> their accounts work everywhere?
----
the OpenLDAP client software is included and compiled into virtually all
potential client applications on Fedora & RHEL that I have run into
which on my FC-5 desktop here includes:
autofs, cyrus-sasl, ruby-ldap, evolution-data-server, samba, httpd,
subversion, apr-util, opal, python-ldap, php-ldap, sendmail, mod_perl,
nss_ldap, wine-ldap, squid, kdebase, nfs-utils-lib, libuser, GConf2,
postfix.

So in answer to the second question...the implementation of account
management via LDAP is left to the administrator as opposed to the
predetermined methodology incorporated into Windows Active Directory.
----
> 
> > The point I was trying to make about needing to be versant with command
> > line functionality of LDAP was this...if you can't query/maintain LDAP
> > from the command line, you are never going to be able to debug/analyze
> > how other applications interact with your LDAP server since LDAP doesn't
> > operate in a vacuum.
> 
> Why is this any more true for LDAP than any other protocol?   Do you 
> need to understand imap command line tools and protocol analyzers to use 
> email?
----
I'm not certain that this is more true for LDAP than any other protocol.
What I know is that LDAP directory design has no prescribed correct way
for setup except for Windows Active Directory. FDS has a prescribed
notion on initial setup but it is easily modified which is what I
suspect that most people actually do.

I suspect that samba will actually drive some standardization because
samba is designed specifically for interchangeability with Windows
systems and Samba 4 is trying to become interchangeable with Windows
Active Directory and if you want to track the DSA design they are
recommending...

http://wiki.samba.org/index.php/3.0:_Initialization_LDAP_Database

I'm not sure that it serves the open source community to have Microsoft
dictating LDAP design though.

But in answer to your second question, if you run an IMAP server, you
definitely need to know imap command line functions at some point to
debug...

# telnet srv1 143
Trying 192.168.2.1...
Connected to srv1.azapple.com (192.168.2.1).
Escape character is '^]'.
* OK srv1.azapple.com Cyrus IMAP4 v2.2.12-Invoca-RPM-2.2.12-9 server
ready
. login craig XXXXXXXXXXXX
. OK User logged in
. LIST INBOX *
* LIST (\HasChildren) "." "INBOX"
* LIST (\HasNoChildren) "." "INBOX.App-Server"
* LIST (\HasNoChildren) "." "INBOX.Catchall"
<snip>
. logout
----
> 
> > LDAP is only useful when you link in other
> > applications and if you don't understand how they do that, you are going
> > to get nowhere.
> 
> Again, why is LDAP any different in this respect that the other methods 
> doing the same jobs now - that most people use without understanding? 
> PAM should be covering up most of it anyway.
----
I presume when you mention PAM, you are specifically referring to LDAP
as an account authentication system.

With respect to this functionality, there are a number of steps that are
necessary in order to accomplish this...
configure /etc/nsswitch.conf # somewhat accomplished by authconfig tool
configure /etc/ldap.conf     # somewhat accomplished by authconfig tool
configure /etc/pam.d/system-auth # accomplished by authconfig tool
generate server & client certificates for TLS/SSL and put into place

I am presently accomplishing this through fedora kickstart installs and
on first boot, anyone permitted can login and it's not very difficult at
all.

The issue of practicality cannot be ignored though. If you want to set
up and test, you really need a fast method and that is the command line.
More to the point, once you can do command line client tools that
openldap-clients package provides, your understanding grows and all
things become understood. The GUI tools simply do not fill the gap of
knowledge but they can provide easy access to data maintenance.

Craig


[Index of Archives]     [Current Fedora Users]     [Fedora Desktop]     [Fedora SELinux]     [Yosemite News]     [Yosemite Photos]     [KDE Users]     [Fedora Tools]     [Fedora Docs]

  Powered by Linux