LinuxQuestions.org
Visit Jeremy's Blog.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Enterprise Linux Forums > Linux - Enterprise
User Name
Password
Linux - Enterprise This forum is for all items relating to using Linux in the Enterprise.

Notices


Reply
  Search this Thread
Old 10-15-2004, 08:20 AM   #31
Builder
Member
 
Registered: Jun 2004
Location: London
Distribution: Red Hat, SuSE, Gentoo
Posts: 80

Rep: Reputation: 15

Quote:
Originally posted by LanRx
Do you feel that my documents provide this?

I thought that they did. If there is something that would need to be expanded upon, please let me know.

Edited to add:

Also, you can provide Unix Authentication using strictly LDAP, even against W2K3, I'm pretty sure.
I do feel that your documents provide this, yes. However, at last look they were under a restrictive licence for use (you have to register with your site, and you have to agree to provide feedback) meaning that some people may not be able to use them.

The offer that I made to arkus applies to anyone who wants to publish these instructions under a non-restrictive licence, including yourself. If you could expand these to include a straight LDAP authentication solution without the need for Winbind on all servers, I will consider increasing my contribution offer.

I know that the amounts I am talking about seem small, but with the amount of people asking for this information, I'm hoping that other people will be willing to contribute as well to make the effort worth it.

I know what it's like to write documentation and maintain it for free - it's a largely thankless and unglamourous job. Fortunately, the documents that I have done regarding Free software are un-related to my consulting work, and as such I am able to publish with no restrictions from outside parties.
 
Old 10-15-2004, 08:36 AM   #32
LanRx
Member
 
Registered: Jul 2004
Posts: 85

Rep: Reputation: 15
I'm not so concerned about the dollar figure that you are discussing. It would be welcome, obviously, and I would love to work with you and the community to optimize the documents. I know that if I was able to obtain some of this assistance, I would be able to take care of the rest.

My problem is, that I have to be able to provide SOME value back to my organization. As of right now, I receive no monetary benefit (which isn't necessarily a problem), which is why I've been looking to have registration and/or feedback on the documents. This gives me a handle on who is using them. that too, is value to me.
 
Old 11-01-2004, 02:37 PM   #33
halo14
Senior Member
 
Registered: Apr 2004
Location: Surprise, AZ
Distribution: Debian | CentOS | Arch
Posts: 1,103

Rep: Reputation: 45
Hello there... I am in desperae need of a document like this... I have gone to the site and registered, though the document being discussed is not available.. or not found rather... Please point me ina direction by which I could find this...

I am trying to join a Windows 2000 Active Directory structure with RHEL 3 and/or RHEL 4 beta
 
Old 11-01-2004, 03:00 PM   #34
cjcox
Member
 
Registered: Jun 2004
Posts: 307

Rep: Reputation: 42
Some general info...

Most of the AD<->Linux solutions involve the SFU (Services for Unix) from Microsoft. This usually involves applying a schema update from that package to the AD LDAP and often (but not always) running the SFU NIS services.

There is the Samba Winbind route which will become more funtional with the next interim release of Samba (3.2) before 4.0 comes out.... and 4.0 will supposedly work even better.

On the cheap... use Samba and the login script under Windows.

1. When Windows users login, attempt to mount your Unix/Linux home directory.... where that directory is available via Samba.

2. Samba can be configured to kick off a script if the user does not exist when a share is accessed... use that to create the user (it can work off a list of users allowed if you want some security). Use that script to create the user and home dir.

4. Create a putty key on the Windows side and stick the key into the home dir side... which will now exist if you did #2 acceptably.

5. Load the key on the Windows side via the putty agent for Windows allowing the user to bring up windows to any of the Linux/Unix hosts without using a password.

When you are done, you'll be able to log into the domain under a Windows client and log into the Unix/Linux hosts from that client using PuTTY without having to reauthenticate.

Combine this with running winbindd on the Unix/Linux hosts and then you can log in directly (outside of using the Windows client) using your id... which will authenticate with a AD password server.

You may have to have the script in #2 generate a scrap password or some things might fail (some things look for a password being present on the Unix/Linux box even if it's not used for authentication... for account validity).

I know this isn't a detailed cookbook... eventually I may write something up and post it.... and surprise, surprise, I won't charge anything!
 
Old 11-01-2004, 03:12 PM   #35
halo14
Senior Member
 
Registered: Apr 2004
Location: Surprise, AZ
Distribution: Debian | CentOS | Arch
Posts: 1,103

Rep: Reputation: 45
I think your missing the point... we are not trying to login to a linux/unix box under windows... we want to add linux as an AD client... equivalent to what a windows 2000 Pro or XP pro box would be to a W2K Server....

We want authentication on the linux box FROM a Windows 2000/2003 Server Active Directory listing...
 
Old 11-01-2004, 04:48 PM   #36
LanRx
Member
 
Registered: Jul 2004
Posts: 85

Rep: Reputation: 15
Once you have logged into the site, the documents are under LanRx Solutions.
You will have to login with your username and password on the right hand side of the screen.

Then when you go go the LanRx solutions section, you will see the documents there.

Edited to add: And you have not been charged for access to these documents, either!

Last edited by LanRx; 11-01-2004 at 04:49 PM.
 
Old 11-02-2004, 10:30 AM   #37
cjcox
Member
 
Registered: Jun 2004
Posts: 307

Rep: Reputation: 42
Quote:
Originally posted by halo14
I think your missing the point... we are not trying to login to a linux/unix box under windows... we want to add linux as an AD client... equivalent to what a windows 2000 Pro or XP pro box would be to a W2K Server....

We want authentication on the linux box FROM a Windows 2000/2003 Server Active Directory listing...
I don't think I'm missing the point. My solution gives you complete secure, single sign-on from a AD DOMAIN (I suggest you re-read my post). It does it simply without having to rely so heavily on Microsoft's ever changing rpc's.

With the solution I have outline you can access any Unix/Linux host without reauthenticating from your Windows client AND (if you had read the whole thing) you can log in directly from the Unix/Linux console head if you have windbind configured.

I have already implemented this solution at a large manufacturing company. Since the majority of the users have Windows desktops, they simply PuTTY into the Linux hosts WITHOUT having to type in a password every time. I (and a few others not authenticating via a Windows client) can login directly into the Linux hosts by typing our AD password (once logged into a host, we can use the same SSH key technique as used by the Windows hosts to avoid having to authenticate to hosts we reach from our non-Windows client).
 
Old 11-02-2004, 10:36 AM   #38
LanRx
Member
 
Registered: Jul 2004
Posts: 85

Rep: Reputation: 15
Which is fine, as long as you're not running samba services on the device as well. Because if you are, then your UID/GID can be different if coming in from a prompt or over a CIFS share.
 
Old 11-09-2004, 03:30 PM   #39
cjcox
Member
 
Registered: Jun 2004
Posts: 307

Rep: Reputation: 42
Sigh... you can map ids to local ids if they match via winbindd. So not a problem.
 
Old 11-09-2004, 07:43 PM   #40
LanRx
Member
 
Registered: Jul 2004
Posts: 85

Rep: Reputation: 15
It would just seem to me, that you would want your administration to be as centralized as possible. And if you're having to map things locally, then that kind of defeats the purpose.
 
Old 11-09-2004, 10:50 PM   #41
laksi
LQ Newbie
 
Registered: Aug 2004
Posts: 8

Rep: Reputation: 0
good infos u guys, i will make a research about these;
 
Old 11-10-2004, 09:49 AM   #42
cjcox
Member
 
Registered: Jun 2004
Posts: 307

Rep: Reputation: 42
Quote:
Originally posted by LanRx
It would just seem to me, that you would want your administration to be as centralized as possible. And if you're having to map things locally, then that kind of defeats the purpose.
Administration is COMPLETELY localized. Create the user on the AD machine and single sign on everywhere.
 
Old 11-10-2004, 12:58 PM   #43
halo14
Senior Member
 
Registered: Apr 2004
Location: Surprise, AZ
Distribution: Debian | CentOS | Arch
Posts: 1,103

Rep: Reputation: 45
umm.. cjcox...

If your creating the user on the AD server.. and they sign on everywhere else.. than that is centralized.. not localized...

And the point is to try and get linux to recognize and authenticate via Active Directory... so if you have to create the name in AD and then create the local machine account.. it defeats the purpose.. that's what we are saying..
 
Old 11-10-2004, 03:01 PM   #44
cjcox
Member
 
Registered: Jun 2004
Posts: 307

Rep: Reputation: 42
The system AUTOMATICALLY creates the accounts for the *ix boxes. Password authentication is via the Windows password server.

You DON'T create anything BUT the Windows account. Then you can log in from ANYWHERE (from the console, from a client, whatever) into the *ix hosts. As long as you are authenticated to a trusted client (Windows or *ix), you can pull up a shell onto any *ix host without using a password. A trusted client in *ix is simply one where your ssh keys are have been authorized for use. You can always login directly into the *ix hosts supplying your AD password if you are coming in from a client where your keys are not enabled.

Remember, this isn't theory here... this is in production today.

Now there is a replication of account data, AD and *ix (LDAP or NIS). But the passwords are always authentiated via AD, so if the account is disabled or removed in Windows, you won't easily get into the *ix areas as that user (you'd
need root or a back door or some other non-password/key auth path).

It's not perfect... we don't allow password changes from the *ix side, you have to change your passwords from a Windows authenticated client, but those things can be added, arguably with less than valuable benefit for the work involved.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
Samba 3/Windows 2000 Integration markham82 Linux - Networking 1 11-19-2004 11:10 AM
Linux to be authenticated from Win 2000? sikandar Linux - Enterprise 7 09-27-2004 11:24 AM
connectivity of Linux 7.3 and Win-2000 tjpatelus Linux - Networking 3 09-19-2003 08:58 PM
Wanted to start with Linux for Win 2000 corbitale2 Linux - Newbie 4 01-21-2003 09:10 PM
Integrating Linux on Win 2000 Network michaelegan Linux - Networking 2 07-04-2002 05:58 AM

LinuxQuestions.org > Forums > Enterprise Linux Forums > Linux - Enterprise

All times are GMT -5. The time now is 10:11 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration