08.01.2013 Views

AIX and Linux Interoperability - IBM Redbooks

AIX and Linux Interoperability - IBM Redbooks

AIX and Linux Interoperability - IBM Redbooks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

shadowExpire $ shadowFlag $ description ) )<br />

( nisSchema.2.2 NAME 'posixGroup' SUP top STRUCTURAL<br />

DESC 'Abstraction of a group of accounts'<br />

MUST ( cn $ gidNumber )<br />

MAY ( userPassword $ memberUid $ description ) )<br />

Example 2-2 User LDIF entry<br />

dn: uid=joe,ou=People,dc=weeorg,dc=com<br />

uid: joe<br />

cn: Joe R. User<br />

objectClass: posixAccount<br />

objectClass: shadowAccount<br />

objectClass: top<br />

userPassword: {crypt}h/WA58b9dz5nI<br />

loginShell: /bin/ksh<br />

uidNumber: 1000<br />

gidNumber: 100<br />

homeDirectory: /home/users/joe<br />

gecos: Joe R. User<br />

shadowLastChange: 11627<br />

shadowMax: 99999<br />

shadowWarning: 7<br />

2.2 Planning for LDAP authentication<br />

We suppose that everybody is already used to vendors implementing services in<br />

their own way even though the service itself may be described by a st<strong>and</strong>ard<br />

endorsed by everybody in the industry. It is important to check out all the options<br />

available <strong>and</strong> see how they relate to each other. Deploying LDAP is not an<br />

exception. Therefore, we examine many solutions for LDAP authentication on<br />

both <strong>AIX</strong> <strong>and</strong> <strong>Linux</strong>.<br />

We need an LDAP server to offer access to the identification <strong>and</strong> authentication<br />

data <strong>and</strong> to keep it in good shape. We also need an LDAP client that will be<br />

sufficiently integrated into the operating system to be able to take over the<br />

identification <strong>and</strong> authentication tasks. We need a thing or two more, such as<br />

implementing the security policy <strong>and</strong> encrypting the communication (we discuss<br />

these matters later in this chapter).<br />

<strong>AIX</strong> 5L Version 5.2 is delivered with both an LDAP server (<strong>IBM</strong> Directory Server)<br />

<strong>and</strong> an LDAP client. Of course, coming from the same vendor, these two<br />

cooperate nicely. If you are running an <strong>AIX</strong>-only shop <strong>and</strong> you plan to stick to it,<br />

this is probably the optimal solution. With the recently included support for PAM,<br />

Chapter 2. Centralized user management 19

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!