在supportedSASLMechanisms中将GSSAPI添加到OpenLdap

前端之家收集整理的这篇文章主要介绍了在supportedSASLMechanisms中将GSSAPI添加到OpenLdap前端之家小编觉得挺不错的,现在分享给大家,也给大家做个参考。
我正在寻找如何将GSSAPI支持添加到我的OpenLDAP中?

当前设置

  1. MIT Kerberos V + OpenLDAP
  2. Kerberos bind to openldap
  3. Able to issue kerberos tickets to my users (with kinit exampluser)
  4. Able to ldapsearch -x uid=exampluser

Openldap方面

  1. server% ldapsearch -x -H ldapi:/// -b "" -LLL -s base -Z supportedSASLMechanisms
  2.  
  3. ldap_start_tls: Protocol error (2)
  4. additional info: unsupported extended operation
  5. dn:
  6. supportedSASLMechanisms: DIGEST-MD5
  7. supportedSASLMechanisms: EXTERNAL
  8. supportedSASLMechanisms: CRAM-MD5
  9. supportedSASLMechanisms: NTLM
  10. supportedSASLMechanisms: LOGIN
  11. supportedSASLMechanisms: PLAIN

客户端

  1. client% ldapsearch uid=exampleuser
  2.  
  3. SASL/GSSAPI authentication started
  4. ldap_sasl_interactive_bind_s: Authentication method not supported (7)
  5. additional info: SASL(-4): no mechanism available: Couldn't find mech GSSAPI

客户端ldap.conf

  1. #
  2. # LDAP Defaults
  3. #
  4.  
  5. # See ldap.conf(5) for details
  6. # This file should be world readable but not world writable.
  7.  
  8. BASE dc=example,dc=com
  9. URI ldap://ldap.example.com
  10. SASL_MECH GSSAPI

显然,错误很明显足以解释我的ldap请求没有找到auth的机制.

我已经通过了许多教程,解释,但仍然无法找到任何地方如何“添加”该机制.

感谢What is SASL/GSSAPI?所有令人敬畏的解释.

已更新为用户473183469

我已经为ldap生成了一个keytab,我已经在/etc/ldap/ldap.keytab中复制了,并根据https://help.ubuntu.com/community/SingleSignOn编辑了/ etc / default / slapd,要求取消注释并给出导出KRB5_KTNAME的路径= /等/ LDAP / ldap.keytab

那个ldap keytab是这样生成

  1. kadmin: addprinc -randkey ldap/ldap.example.com@EXAMPLE.COM
  2. kadmin: ktadd -k ~/ldap.keytab ldap/ldap.example.com@EXAMPLE.COM

我还有一个在安装开始时创建的/etc/krb5.keytab

  1. kadmin.local: listprincs
  2. admin@EXAMPLE.COM
  3. K/M@EXAMPLE.COM
  4. krbtgt/EXAMPLE.COM@EXAMPLE.COM
  5. kadmin/admin@EXAMPLE.COM
  6. kadmin/changepw@EXAMPLE.COM
  7. kadmin/history@EXAMPLE.COM
  8. kadmin/kdc.example.com@EXAMPLE.COM
  9. user1@example.com (also in the ldap,can issue a ticket and everything)
  10. user2@example.com (same for him)
  11. ldap/ldap.example.com@EXAMPLE.COM

ktutil结果

  1. # ktutil
  2. ktutil: read_kt /etc/ldap.keytab
  3. ktutil: list
  4. slot KVNO Principal
  5. ---- ---- ---------------------------------------------------------------------
  6. 1 2 ldap/ldap.example.com@EXAMPLE.COM
  7. 2 2 ldap/ldap.example.com@EXAMPLE.COM
  8. 3 2 ldap/ldap.example.com@EXAMPLE.COM
  9. 4 2 ldap/ldap.example.com@EXAMPLE.COM
  10. ktutil: read_kt /etc/krb5.keytab
  11. ktutil: list
  12. slot KVNO Principal
  13. ---- ---- ---------------------------------------------------------------------
  14. 1 2 ldap/ldap.example.com@EXAMPLE.COM
  15. 2 2 ldap/ldap.example.com@EXAMPLE.COM
  16. 3 2 ldap/ldap.example.com@EXAMPLE.COM
  17. 4 2 ldap/ldap.example.com@EXAMPLE.COM
  18. 5 2 kadmin/kdc.example.com@EXAMPLE.COM
  19. 6 2 kadmin/kdc.example.com@EXAMPLE.COM
  20. 7 2 kadmin/kdc.example.com@EXAMPLE.COM
  21. 8 2 kadmin/kdc.example.com@EXAMPLE.COM
您需要更改slapd的sasl配置,通常是/etc/sasl2/slapd.conf,以包含gssapi.

例如:

  1. mech_list: external gssapi plain
  2. pwcheck_method: saslauthd

之后你需要重启slapd.

猜你在找的Bash相关文章