Difference between revisions of "OpenLDAP"
Jump to navigation
Jump to search
↑ https://www.lisenet.com/2016/openldap-with-ssl-and-nfs-for-user-home-directories-on-centos-7/
↑ https://www.youtube.com/watch?v=bp8ffdY7Mu4
↑ https://wiki.samba.org/index.php/OpenLDAP_as_proxy_to_AD
↑ https://doc.owncloud.org/server/10.0/admin_manual/configuration/ldap/ldap_proxy_cache_server_setup.html
↑ https://www.itzgeek.com/how-tos/linux/centos-how-tos/step-step-openldap-server-configuration-centos-7-rhel-7.html
↑ https://howdoilinux.com/2015/05/openldap-to-active-directory-proxy-configuration/
Michael.mast (talk | contribs) |
Michael.mast (talk | contribs) (→LDAPS) |
||
| (4 intermediate revisions by the same user not shown) | |||
| Line 8: | Line 8: | ||
yum -y install openldap openldap-servers | yum -y install openldap openldap-servers | ||
| + | cat <<EOF >>/etc/openldap/slapd.conf | ||
| + | moduleload back_ldap | ||
| + | |||
| + | include /etc/openldap/schema/core.schema | ||
| + | include /etc/openldap/schema/cosine.schema | ||
| + | include /etc/openldap/schema/nis.schema | ||
| + | include /etc/openldap/schema/inetorgperson.schema | ||
| + | |||
| + | |||
| + | pidfile /var/run/openldap/slapd.pid | ||
| + | argsfile /var/run/openldap/slapd.args | ||
| + | |||
| + | sizelimit unlimited | ||
| + | |||
| + | idletimeout 3600 | ||
| + | writetimeout 600 | ||
| + | |||
| + | database ldap | ||
| + | suffix "dc=your,dc=tld" | ||
| + | uri "ldap://domaincontroller" | ||
| + | chase-referrals no | ||
| + | idassert-bind bindmethod=simple | ||
| + | mode=self | ||
| + | binddn="cn=binduser,ou=Users,DC=your,DC=tld" | ||
| + | credentials="password" | ||
| + | |||
| + | logfile /var/log/slapd.log | ||
| + | loglevel 1 | ||
| + | EOF | ||
| + | |||
| + | slaptest -f /etc/openldap/slapd.conf -F /etc/openldap/slapd.d/ | ||
| + | systemctl enable slapd | ||
| + | systemctl start slapd | ||
| + | firewall-cmd --permanent --add-service=ldap | ||
| + | firewall-cmd --reload | ||
| + | </pre> | ||
| + | When finished, you can query the OpenLDAP but must authenticate in the process. In this configuration it does not allow for anonymous binds, which is a good thing. | ||
| + | <pre> | ||
| + | ldapsearch -v -x -h <openldap ip/FQDN> -D "cn=binduser,ou=Users,DC=your,DC=tld" -w password -b OU=Users,DC=your,DC=tld | ||
| + | </pre> | ||
| + | ====LDAPS==== | ||
| + | Edit /etc/sysconfig/slapd and update to take secure connections, install certificates, Restart services<ref>https://www.lisenet.com/2016/openldap-with-ssl-and-nfs-for-user-home-directories-on-centos-7/</ref> | ||
| + | <pre> | ||
| + | sed -i 's/SLAPD_URLS=\"ldapi:\/\/\/\ ldap:\/\/\/\"/SLAPD_URLS=\"ldapi:\/\/\/\ ldaps:\/\/\/\"/' /etc/sysconfig/slapd | ||
</pre> | </pre> | ||
| Line 16: | Line 60: | ||
*A guide by owncloud.org<ref>https://doc.owncloud.org/server/10.0/admin_manual/configuration/ldap/ldap_proxy_cache_server_setup.html</ref> | *A guide by owncloud.org<ref>https://doc.owncloud.org/server/10.0/admin_manual/configuration/ldap/ldap_proxy_cache_server_setup.html</ref> | ||
*Possible howto on enabling TLS<ref>https://www.itzgeek.com/how-tos/linux/centos-how-tos/step-step-openldap-server-configuration-centos-7-rhel-7.html</ref> | *Possible howto on enabling TLS<ref>https://www.itzgeek.com/how-tos/linux/centos-how-tos/step-step-openldap-server-configuration-centos-7-rhel-7.html</ref> | ||
| + | *Here is someone that has already gone through the work for me. Will be working off of this how-to.<ref>https://howdoilinux.com/2015/05/openldap-to-active-directory-proxy-configuration/</ref> | ||
Latest revision as of 10:56, 19 March 2018
Contents
Active Directory LDAP Proxy
Purpose
To proxy secure LDAP requests from the internet to MS AD.
Commands
CentOS 7
On a clean install with epel-release installed (not needed, but it is part of my initial setup script)
yum -y install openldap openldap-servers
cat <<EOF >>/etc/openldap/slapd.conf
moduleload back_ldap
include /etc/openldap/schema/core.schema
include /etc/openldap/schema/cosine.schema
include /etc/openldap/schema/nis.schema
include /etc/openldap/schema/inetorgperson.schema
pidfile /var/run/openldap/slapd.pid
argsfile /var/run/openldap/slapd.args
sizelimit unlimited
idletimeout 3600
writetimeout 600
database ldap
suffix "dc=your,dc=tld"
uri "ldap://domaincontroller"
chase-referrals no
idassert-bind bindmethod=simple
mode=self
binddn="cn=binduser,ou=Users,DC=your,DC=tld"
credentials="password"
logfile /var/log/slapd.log
loglevel 1
EOF
slaptest -f /etc/openldap/slapd.conf -F /etc/openldap/slapd.d/
systemctl enable slapd
systemctl start slapd
firewall-cmd --permanent --add-service=ldap
firewall-cmd --reload
When finished, you can query the OpenLDAP but must authenticate in the process. In this configuration it does not allow for anonymous binds, which is a good thing.
ldapsearch -v -x -h <openldap ip/FQDN> -D "cn=binduser,ou=Users,DC=your,DC=tld" -w password -b OU=Users,DC=your,DC=tld
LDAPS
Edit /etc/sysconfig/slapd and update to take secure connections, install certificates, Restart services[1]
sed -i 's/SLAPD_URLS=\"ldapi:\/\/\/\ ldap:\/\/\/\"/SLAPD_URLS=\"ldapi:\/\/\/\ ldaps:\/\/\/\"/' /etc/sysconfig/slapd
Notes
- Interesting YouTube Video that covers everything except enabling TLS[2]
- openLDAP as proxy to Active Directory as stated by SAMBA[3]
- A guide by owncloud.org[4]
- Possible howto on enabling TLS[5]
- Here is someone that has already gone through the work for me. Will be working off of this how-to.[6]