Skip to content
GitLab
Explore
Sign in
Register
Primary navigation
Search or go to…
Project
O
OpenLDAP
Manage
Activity
Members
Labels
Plan
Issues
Issue boards
Milestones
Wiki
Requirements
Code
Merge requests
Repository
Branches
Commits
Tags
Repository graph
Compare revisions
Snippets
Locked files
Build
Pipelines
Jobs
Pipeline schedules
Test cases
Artifacts
Deploy
Releases
Package registry
Container Registry
Model registry
Operate
Environments
Terraform modules
Monitor
Incidents
Service Desk
Analyze
Value stream analytics
Contributor analytics
CI/CD analytics
Repository analytics
Code review analytics
Issue analytics
Insights
Model experiments
Help
Help
Support
GitLab documentation
Compare GitLab plans
Community forum
Contribute to GitLab
Provide feedback
Keyboard shortcuts
?
Snippets
Groups
Projects
Show more breadcrumbs
Lukas However
OpenLDAP
Commits
459849e7
Commit
459849e7
authored
24 years ago
by
Mark Adamson
Browse files
Options
Downloads
Patches
Plain Diff
Change SASL DN's from using cn=authzid to cn=auth
parent
6b4ec381
No related branches found
Branches containing commit
No related tags found
Tags containing commit
No related merge requests found
Changes
1
Hide whitespace changes
Inline
Side-by-side
Showing
1 changed file
doc/guide/admin/sasl.sdf
+13
-13
13 additions, 13 deletions
doc/guide/admin/sasl.sdf
with
13 additions
and
13 deletions
doc/guide/admin/sasl.sdf
+
13
−
13
View file @
459849e7
...
...
@@ -124,19 +124,19 @@ command option.
For the purposes of authentication and authorization, {{slapd}}(8)
associates a non-mapped authentication DN of the form:
> uid=principal,cn=GSSAPI,cn=auth
zid
> uid=principal,cn=GSSAPI,cn=auth
If the user principal is within the same realm, the realm is
trimmed from the principal. Continuting our example, a user
with the Kerberos principal {{EX:kurt@EXAMPLE.COM}} would have
the associated DN:
> uid=kurt,cn=GSSAPI,cn=auth
zid
> uid=kurt,cn=GSSAPI,cn=auth
and the principal {{EX:ursula@@FORIEGN.REALM}} would have the
associated DN:
> uid=ursula@FOREIGN-REALM,cn=GSSAPI,cn=auth
zid
> uid=ursula@FOREIGN-REALM,cn=GSSAPI,cn=auth
H3: KERBEROS_V4
...
...
@@ -181,12 +181,12 @@ the identity and realm out of the service ticket using SASL
library calls, and convert them into an {{authentication request
DN}} of the form
> uid=<username>,cn=<realm>,cn=<mechanism>,cn=auth
zid
> uid=<username>,cn=<realm>,cn=<mechanism>,cn=auth
So in our above example, if the user's name were "adamson", the
authentication request DN would be:
> uid=ADAMSON,cn=EXAMPLE.COM,cn=KERBEROS_V4,cn=AUTH
ZID
> uid=ADAMSON,cn=EXAMPLE.COM,cn=KERBEROS_V4,cn=AUTH
This authentication request DN by itself could be placed into ACL's
and {{EX:groupOfNames}} "member" attributes, since it is of legitimate
...
...
@@ -210,11 +210,11 @@ not in the LDAP namespace. As stated in the section above, that
username is reformatted into an authentication request DN of the
form
> uid=<username>,cn=<realm>,cn=<mechanism>,cn=auth
zid
> uid=<username>,cn=<realm>,cn=<mechanism>,cn=auth
or
> uid=<username>,cn=<mechanism>,cn=auth
zid
> uid=<username>,cn=<mechanism>,cn=auth
depending on whether or not <mechanism> employs the concept of
"realms".
...
...
@@ -222,7 +222,7 @@ depending on whether or not <mechanism> employs the concept of
It is not intended that you should add LDAP entries of the above
form to your LDAP database. Chances are you have an LDAP entry for
each of the people that will be authenticating to LDAP, laid out
in your directory tree, and the tree does not start at cn=auth
zid
.
in your directory tree, and the tree does not start at cn=auth.
But if your site has a clear mapping between the "username" and an
LDAP entry for the person, you will be able to configure your LDAP
server to automatically map a user's authentication username to
...
...
@@ -262,7 +262,7 @@ pattern, the variables $2, $3, etc are used.
For example, suppose the user's authentication identity is written
as the DN string
> uid=ADAMSON,cn=EXAMPLE.COM,cn=KERBEROS_V4,cn=AUTH
ZID
> uid=ADAMSON,cn=EXAMPLE.COM,cn=KERBEROS_V4,cn=AUTH
and the user's actual LDAP entry is
...
...
@@ -272,13 +272,13 @@ The {{EX:saslRegexp}} directive in {{slapd.conf}}(5) could be
written
> saslRegexp
> uid=(.*),cn=example.com,cn=kerberos_v4,cn=auth
zid
> uid=(.*),cn=example.com,cn=kerberos_v4,cn=auth
> uid=$1,ou=person,dc=example,dc=com
An even more lenient rule could be written as
> saslRegexp
> uid=(.*),.*cn=auth
zid
> uid=(.*),.*cn=auth
> uid=$1,ou=person,dc=example,dc=com
Be careful about setting the search pattern too leniently, however,
...
...
@@ -338,7 +338,7 @@ kept in the attribute "uid" in their LDAP entry. The {{EX:saslRegexp}}
directive might be written as
> saslRegexp
> uid=(.*),cn=example.com,cn=kerberos_v4,cn=auth
zid
> uid=(.*),cn=example.com,cn=kerberos_v4,cn=auth
> ldap://localhost/ou=person,dc=example,dc=com??sub?uid=$1
This will initiate an internal search of the LDAP database inside
...
...
@@ -448,7 +448,7 @@ Authorization identities of this form are converted into a DN format
by the same function that the authentication process used, producing
an {{authorization request DN}} of the form
> uid=<username>,cn=<realm>,cn=auth
zid
> uid=<username>,cn=<realm>,cn=auth
That authorization request DN is then run through the same
{{EX:saslRegexp}} process to convert it into a legitimate authorization
...
...
This diff is collapsed.
Click to expand it.
Preview
0%
Loading
Try again
or
attach a new file
.
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Save comment
Cancel
Please
register
or
sign in
to comment