LDAP Authentication for openNebula3.2

LDAP Authentication 3.2

The LDAP Authentication addon permits users to have the same credentials as in LDAP, so effectively centralizing authentication. Enabling it will let any correctly authenticated LDAP user to use OpenNebula.

Prerequisites

This Addon uses the ‘net/ldap‘ ruby library provided by the ‘net-ldap‘ gem.

This Addon will not install any Ldap server or configure it in any way. It will not create, delete or modify any entry in the Ldap server it connects to. The only requirement is the ability to connect to an already running Ldap server and being able to perform a successful ldapbind operation and have a user able to perform searches of users, therefore no special attributes or values are required in the LDIF entry of the user authenticating.

Configuration

Configuration file for auth module is located at $ONE_LOCATION/etc/auth/ldap_auth.conf. This is the default configuration:

# Ldap user able to query, if not set connects as anonymous
#:user: ‘admin‘
#:password: ‘password‘
 
# Ldap authentication method
:auth_method: :simple
 
# Ldap server
:host: localhost
:port: 389
 
# base hierarchy where to search for users and groups
:base: ‘dc=domain‘
 
# group the users need to belong to. If not set any user will do
:group: ‘cn=cloud,ou=groups,dc=domain‘
 
# field that holds the user name, if not set ‘cn‘ will be used
:user_field: ‘cn‘
VARIABLE DESCRIPTION
:user Name of the user that can query ldap. Do not set it if you can perform queries anonymously
:password Password for the user defined in :user. Do not set if anonymous access is enabled
:auth_method Can be set to :simple_tls if ssl connection is needed
:host Host name of the ldap server
:port Port of the ldap server
:base Base leaf where to perform user searches
:group If set the users need to belong to this group
:user_field Field in ldap that holds the user name

To enable ldap authentication the described parameters should be configured. OpenNebula must be also configured to enable external authentication. Uncomment these lines in $ONE_LOCATION/etc/oned.conf and add ldap and default (more on this later) as an enabled authentication method.

AUTH_MAD = [
    executable = "one_auth_mad",
    arguments = "--authz quota --authn server_cipher,ldap,default"
]

To be able to use this driver for users that are still not in the user database you must set it to the default driver. To do this go to the auth drivers directory and symlink the directory ldap to default. In system-wide installation you can do this using this command:

$ ln -s /var/lib/one/remotes/auth/ldap /var/lib/one/remotes/auth/default

User Management

Using LDAP authentication module the administrator doesn‘t need to create users with oneuser command as this will be automatically done. The user should add its credentials to $ONE_AUTH file (usually $HOME/.one/one_auth) in this fashion:

user_dn_or_username:user_password
时间: 2024-12-15 17:44:21

LDAP Authentication for openNebula3.2的相关文章

西部开源学习笔记BOOK2《ldap网络帐号》

############################## ##### unit8.ldap网络帐号 ###### ############################## ####1.ldap是什么#### ldap目录服务认证,和windows活动目录类似,就是记录数据的一种方式 ####2.ldap客户端所需软件#### [[email protected] ~]# yum install sssd krb5-workstation -y ####3.如何开启ldap用户认证####

net-ldap for ruby openldap ldap

preface:ldap 主要概念及术语 OpenNebula issues:missing step to use LDAP as default driver cp -r /var/lib/one/remotes/auth/ldap /var/lib/one/remotes/auth/default Standalone LDAP Daemon, slapd(standalone lightweight access protocol) Lightweight Directory Acces

opennebula extend(expending) auth module ldap

LDAP Authentication addon permits users to have the same credentials as in LDAP, so effectively centralizing authentication let any correctly authenticated LDAP user to use OpenNebula 1,prerequistries Addon requires the 'net/ldap' ruby library provid

Review board整合ldap

Review board整合ldap Review board本身已经支持ldap登录,我们需要做的就是一些安装.配置工作.首先review board需要python-ldap,如果没有安装,我们在打开ldap配置页面,就会提醒LDAP authentication requires the python-ldap library, which is not installed.. python-ldap下载地址https://pypi.python.org/pypi/python-ldap/

ldap网络账号

######ldap网络帐号#####1.什么是ldap?ldap目录服务认证,和windows活动目录类似,就是记录数据的一种方式 2.ldap客户端所须软件yum sssd krb5-workstation -y 3.如何开启ldap用户认证authconfig-tui ┌────────────────┤ Authentication Configuration ├─────────────────┐                       │                     

二.第八单元 ldap网络用户

#### 第八单元. ldap网络用户账户 ####1.LDAP网络用户ldap目录服务认证,和windows活动目录类似,就是记录数据的一种方式 2.ldap客户端所须软件yum sssd krb5-wordstation -y 3.如何开启ldap用户认证authconfig-tui┌────────────────┤ Authentication Configuration ├─────────────────┐│                                      

【unit 8 】ldap

*************************** ***********ldap************ *************************** 1.ldap是什么 ldap目录服务认证,和windows活动目录类似,就是记录数据的一种方式 2.ldap客户端所需软件 yum install sssd krb5-workstation -y 3.如何开启ldap用户认证 authconfig-tui ┌────────────────┤ Authentication Con

LDAP认证客户端、自动挂载用户家目录shell脚本配置

这个是LDAP认证客户端与自动挂载家目录shell脚本配置,使用"authconfig-tui"图形化配置简单,但是后面需要手动操作,自动写入配置文件还没有研究透彻.以后完善 #!/bin/bash yum install -y nss-pam-ldapd nfs-utils nfs autofs pam_ldap openldap openldap-clients #showmount -e 172.16.16.22 automaster="/etc/auto.master

Spring security 集成ldap服务,实现统一验证

<span style="font-size:18px;">先说一下Spring security 是基于spring的一个强大的安全验证模块,它提供了一组可以在Spring应用上下文中配置的Bean,充分利用了Spring IoC,DI(控制反转Inversion of Control ,DI:Dependency Injection 依赖注入)和AOP(面向切面编程)功能,为应用系统提供声明式的安全访问控制功能.</span> LDAP是轻量目录访问协议,基