Difference between revisions of "LDAP Ramblings"
Line 19: | Line 19: | ||
==Replication== | ==Replication== | ||
*Requires ntp time syncronization between replication servers. | *Requires ntp time syncronization between replication servers. | ||
+ | |||
+ | |||
+ | ==Resources== | ||
+ | ====Books==== | ||
+ | *[http://www.amazon.com/Deploying-OpenLDAP-Tom-Jackiewicz/dp/1590594134/ref=sr_11_1?ie=UTF8&qid=1199748798&sr=11-1 Deploying OpenLDAP] | ||
+ | *[http://www.amazon.com/LDAP-Directories-Explained-Introduction-Independent/dp/020178792X/ref=sr_11_1?ie=UTF8&qid=1199748823&sr=11-1 LDAP Directories Explained] | ||
+ | |||
+ | ====Websites==== | ||
+ | *[http://www.openldap.org/ OpenLDAP] | ||
+ | *[http://www.linuxjournal.com/article/5505 LinuxJournal "Highly Available LDAP"] |
Revision as of 03:07, 8 January 2008
Intro
On the IAC's user accessable Linux servers (Brems, web, Inca) there is a need for centralized user authentication. With the addition of email and all the users entailed by that this need becomes critical. The proposed solution is to use OpenLDAP replicated across the mail servers for redundancy.
Clients
Linux Clients
Administrative users will retain entries in the local /etc/passwd and /etc/shadow files for troubleshooting access. All other users will exist in LDAP and will have individual server permissions.
Email Clients
Ideally email users can be accommodated without having local accounts. If this is not possible, the local shell can be set to disallow logins for security purposes.
Windows Clients
Currently not planned, but possible once the setup has been proven. This would allow users to log into any machine using their username and login. Only a select few machines (data aquisition etc.) would retain generic iacuser access.
LDAP Schema
TODO
Replication
- Requires ntp time syncronization between replication servers.