opennebula extend(expending) auth module ldap

LDAP Authentication addon permits users to have the same credentials as in LDAP, so effectively centralizing authentication

let any correctly authenticated LDAP user to use OpenNebula

1,prerequistries

Addon requires the ‘net/ldap‘ ruby library provided by the ‘net-ldap‘ gem

Addon will not install any Ldap server or configure it in any way. It will not create, delete or modify any entry in the Ldap server it connects to. The only requirement is the ability to connect to an already running Ldap server and being able to perform a successful ldapbind operation and have a user able to perform searches of users, therefore no special attributes or values are required in the LDIF entry of the user authenticating.

2,Considerations & Limitations

Transport Layer Security(TLS) as on so做ssl for apache httpd https

LDAP auth driver has a bug that does not let it connect to TLS LDAP instances

3,configuration

Configuration file for auth module is located at /etc/one/auth/ldap_auth.conf. This is the default configuration

:user_field Field in ldap that holds the user name

To enable ldap authentication the described parameters should be configured. OpenNebula must be also configured to enable external authentication. Uncomment these lines in /etc/one/oned.conf and add ldap and default (more on this later) as an enabled authentication method.

AUTH_MAD = [
    executable = "one_auth_mad",
    authn = "ssh,x509,ldap,server_cipher,server_x509"
]

To be able to use this driver for users that are still not in the user database you must set it to the default driver. To do this go to the auth drivers directory and copy the directory ldap to default. In system-wide installations you can do this using this command:

$ cp -R /var/lib/one/remotes/auth/ldap /var/lib/one/remotes/auth/default

User Management

Using LDAP authentication module the administrator doesn‘t need to create users with oneuser command as this will be automatically done. The user should add its credentials to $ONE_AUTH file (usually $HOME/.one/one_auth) in this fashion:

<user_dn>:ldap_password

where

  • <user_dn> the DN of the user in the LDAP service
  • ldap_password is the password of the user in the LDAP service

DN‘s With Special Characters

When the user dn or password contains blank spaces the LDAP driver will escape them so they can be used to create OpenNebula users. Therefore, users needs to set up their $ONE_AUTH file accordingly.

Users can easily create escaped $ONE_AUTH tokens with the command oneuser encode <user> [<password>], as an example:

$ oneuser encode ‘cn=First Name,dc=institution,dc=country‘ ‘pass word‘
cn=First%20Name,dc=institution,dc=country:pass%20word

The output of this command should be put in the $ONE_AUTH file.

Active Directory

LDAP Auth drivers are able to connect to Active Directory. You will need:

  • Active Directory server with support for simple user/password authentication.
  • User with read permissions in the Active Directory user‘s tree.

You will need to change the following values in the configuration file (/etc/one/auth/ldap_auth.conf):

  • :user: the Active Directory user with read permissions in the user‘s tree plus the domain. For example for user Administrator at domain win.opennebula.org you specify it as [email protected]
  • :password: password of this user
  • :host: hostname or IP of the Domain Controller
  • :base: base DN to search for users. You need to decompose the full domain name and use each part as DN component. Example, for win.opennebula.org you will get te base DN: DN=win,DN=opennebula,DN=org
  • :user_field: set it to sAMAccountName

:group parameter is still not supported for Active Directory, leave it commented.

Enabling LDAP auth in Sunstone

Update the /etc/one/sunstone-server.conf :auth parameter to use the opennebula:

    :auth: opennebula

Using this method the credentials provided in the login screen will be sent to the OpenNebula core and the authentication will be delegated to the OpenNebula auth system, using the specified driver for that user. Therefore any OpenNebula auth driver can be used through this method to authenticate the user (i.e: LDAP).

To automatically encode credentials as explained in DN‘s with special characters section also add this parameter to sunstone configuration:

    :encode_user_password: true
时间: 2024-12-15 17:44:16

opennebula extend(expending) auth module ldap的相关文章

opennebula auth module ldap

1,安装net-ldap  addon ruby library for openldap ldap for ruby implements client access LDAP protocol use ldap as openNebula default auth module OpenNebula issues:missing step to use LDAP as default drivercp -r /var/lib/one/remotes/auth/ldap /var/lib/on

net-ldap for ruby openldap ldap

preface:ldap 主要概念及术语 OpenNebula issues:missing step to use LDAP as default driver cp -r /var/lib/one/remotes/auth/ldap /var/lib/one/remotes/auth/default Standalone LDAP Daemon, slapd(standalone lightweight access protocol) Lightweight Directory Acces

OpenNebula openldap集成

Preface: 当前写这篇post的心情可谓是即激动,又操蛋!............................ ruiy还是言归正传,人老了,赖的扯淡了,哥当前一心看向Tech(s),做个顾家 的小技术男(烧锅做饭,拖地,洗衣服,...............)! 开始了(openNebula extend auth module Openldap集成) OpenNebula openldap集成配置 <一,首先咱不谈啥 某某系统与OpenNebula的集成,摆在你面前的是如何正确的配

LDAP Authentication for openNebula3.2

LDAP Authentication 3.2 The LDAP Authentication addon permits users to have the same credentials as in LDAP, so effectively centralizing authentication. Enabling it will let any correctly authenticated LDAP user to use OpenNebula. Prerequisites This

kafka(2.2.1)(kerberos+LDAP+Sentry)访问使用

目录 kafka(2.2.1)(kerberos+LDAP+Sentry)访问使用 一.访问的kafka的一些配置(已集成kerberos ) 二.Shell 命令行使用Kafka(已集成sentry) 三.代码访问(java) kafka(2.2.1)(kerberos+LDAP+Sentry)访问使用 一.访问的kafka的一些配置(已集成kerberos ) 由于kafka集成了kerberos 所以需要通过kerberos的认证 认证方式有两种 1.通过配置文件 2.通过keytab文件

windowns2012安装域控和开源mrbs会议室管理系统ldap

Win2012域控的安装 原理: 用户要登陆mrbs系统,需要输入用户名和密码,mrbs拿到密码和用户到域控服务器验证,验证成功才让用户登录mrbs系统操作: 前期的准备工作 1.       需要配置静态的ip 2.       修改主机名称最好有意义,我忘记修改了无所谓 安装 打开服务器管理点击添加角色和功能 (有的不重要的图我都大Log这样可以节省空间,重要的我就原图发布了,以免小伙伴看不清楚做不出来) 下面是提示需要准备的工作: 选择基于角色的功能安装,因为是本机安装不是远程给其他安装

gerrit + LDAP搭建

gerrit.config文件配置内容: [gerrit] basePath = git canonicalWebUrl = http://127.0.0.1:7081/ [database] type = mysql database = reviewdb hostname = localhost username = root [index] type = LUCENE [auth] type = LDAP [ldap] server = ldap://localhost username

如何搭建基于ldap和mysql的gerrit服务

一.搭建数据库以及配置数据库 1.使用yum install mysql-server安装mysql 2.mysqladmin -u root password archermind(第一次设置密码).设置密码 3.修改 vi /etc/my.cnf 增加[client]项以及修改[mysqld]项.具体如下所示: [client] #password       = your_password port            = 3306 socket          = /var/lib/

javax.security.auth.login.LoginException: Error during resolve 异常

登陆TIM时本地抛此异常,测试环境正常 需要重启测试环境机器以后,本地才可以登陆成功 求大神帮忙解决: INFO: Client code attempting to load security configuration2015-10-30 17:12:46,082 INFO util.tim.TimConnector:177 -> [email protected]2015-10-30 17:12:46,085 INFO util.tim.TimConnector:178 -> 创建Pla