Difference between revisions of "TSLAuth"
Line 36: | Line 36: | ||
ldap_auth_method: bind | ldap_auth_method: bind | ||
ldap_filter: (uid=%u) | ldap_filter: (uid=%u) | ||
+ | |||
+ | == Testing == | ||
+ | |||
+ | |||
+ | |||
+ | === saslauthd === | ||
+ | testsaslauthd -u 01247611 -p xxx | ||
+ | |||
+ | === slapd pass-through authentication == | ||
+ | ldapsearch -x -h saco1.cs.uct.ac.za -b "ou=people,dc=nodomain" -D "cn=Craig Balfour,ou=people,dc=nodomain" -w xxx |
Revision as of 15:31, 22 December 2009
This document is based on information at http://www.openldap.org/doc/admin24/security.html#Pass-Through%20authentication
On saco1:
Install slapd, sasl2-bin (for saslauthd)
Contents
Slapd Configuration
/etc/ldap/slapd.conf (slapd configuration file): Nothing special required.
To run the maximum debugging:
slapd -g openldap -u openldap -f /etc/ldap/slapd.conf -d 65535
Create a user object and set the userPassword attribute to {SASL}username where username is the username on the remote LDAP system.
SASL2 and Saslauthd Configuration
/usr/lib/sasl2/slapd.conf (libsasl2 configuration file):
mech_list: plain pwcheck_method: saslauthd saslauthd_path: /var/run/saslauthd/mux
Notes: - When userPassword attribute begins with {SASL} slapd passes authentication over the the libsasl2 libraries. - chmod a+rx /var/run/saslauthd and /etc/init.d/apparmor stop so that slapd can read the saslauthd socket - Before starting saslauthd export LDAPTLS_REQCERT=allow (needs to be added to /etc/init.d/saslauthd)
- Note
/etc/saslauthd.conf:
ldap_servers: ldap://callisto.cs.uct.ac.za/ ldap_version: 3 ldap_search_base: ou=people,dc=cs,dc=uct,dc=ac,dc=za ldap_scope: sub ldap_auth_method: bind ldap_filter: (uid=%u)
Testing
saslauthd
testsaslauthd -u 01247611 -p xxx
= slapd pass-through authentication
ldapsearch -x -h saco1.cs.uct.ac.za -b "ou=people,dc=nodomain" -D "cn=Craig Balfour,ou=people,dc=nodomain" -w xxx