13.07.2015 Views

Naming and Directory Services (DNS, NIS, and LDAP)

Naming and Directory Services (DNS, NIS, and LDAP)

Naming and Directory Services (DNS, NIS, and LDAP)

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

For information about how to set up replica servers, refer to the Administration Guidefor the version of Sun Java System <strong>Directory</strong> Server that you are using.Planning the <strong>LDAP</strong> Security ModelTo plan for the security model, you should first consider what identity the <strong>LDAP</strong>client should be using to talk to the <strong>LDAP</strong> server. For example, you must decide if youwant strong authentication to protect the user password flow across the wire, <strong>and</strong>/orif it is needed to encrypt the session between the <strong>LDAP</strong> client <strong>and</strong> the <strong>LDAP</strong> server toprotect the <strong>LDAP</strong> data transmitted.The credentialLevel <strong>and</strong> authenticationMethod attributes in the profile areused for this. There are three possible credential levels for credentialLevel:anonymous, proxy, <strong>and</strong> proxy anonymous. See “<strong>LDAP</strong> <strong>Naming</strong> <strong>Services</strong> SecurityModel” on page 141 for a detailed discussion of <strong>LDAP</strong> naming service securityconcepts.Note – If you enable pam_ldap account management, all users must provide apassword any time they log in to the system. A login password is required forauthentication. Therefore, nonpassword-based logins using tools such as rsh,rlogin, orssh will fail if used with pam_ldap.The main decisions you need to make when planning your security model are thefollowing.■■■■■What credential level <strong>and</strong> authentication methods will <strong>LDAP</strong> clients use?Will you use TLS?Do you need to be backward compatible with <strong>NIS</strong> or <strong>NIS</strong>+? In other words, willclients use pam_unix or pam_ldap?What will the servers’ passwordStorageScheme attribute settings be?How will you set up the Access Control Information?For more information about ACIs, consult the Administration Guide for the versionof Sun Java System <strong>Directory</strong> Server that you are using.Chapter 10 • Planning Requirements for <strong>LDAP</strong> <strong>Naming</strong> <strong>Services</strong> (Tasks) 157

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!