13.07.2015 Views

Linux System Administration Recipes A Problem-Solution Approach

Linux System Administration Recipes A Problem-Solution Approach

Linux System Administration Recipes A Problem-Solution Approach

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

CHAPTER 2 ■ CENTRALIZING YOUR NETWORK: KERBEROS, LDAP, AND NFS# Everyone can read everythingaccess to dn.base="" by * read# The admin dn has full write accessaccess to *by dn="uid=ldapadm,ou=people,dc=example,dc=com" writeby * read# Temporary lines to allow initial setuprootdn "cn=admin,dc=example,dc=com"rootpw secretYou’ll generate the specified ldapadm user in a moment.■ Note You must not have comment lines between the access and by lines in this file! This will prevent it fromworking.With the standard setup as described earlier, the ACLs will apply only to a specific database. Tomake them apply globally (although in this setup you don’t have any other databases!), put them beforethe database back-end definitions.If you’re using a self-signed certificate, put this line in /etc/ldap/ldap.conf:TLS_REQCERTallowThis allows clients to request the TLS server certificate from the server.■ Note If you need it, there is more config information for TLS/SSL in the OpenLDAP FAQ at http://www.openldap.org/faq/data/cache/185.html. There’s also an Administrator’s Guide at http://www.openldap.org/doc/admin24/.To separate the slapd logs from the general systems logging, add this line to /etc/syslog.conf:local4.*/var/log/slapd.log2-4. Finishing the LDAP Setup: Authenticating with KerberosAdd the LDAP admin user and the LDAP server to Kerberos by running kadmin -p krbadm from the LDAPhost and executing these commands:32Download at WoweBook.Com

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!