Jonathan Schreiter wrote:
I think your best option is to just keep Kerberos for authentication, especially if you are already using it successfully for other apps. What problems did you have with SASL mapping?

Hi Richad,
Thanks for your reply.  I've followed the documentation on the FDS website, 
basically to keep it as compatible as possible, I've added (under confg - sasl 
- mapping):

objectclass: top
objectclass: nsSaslMapping
cn: mapname
nsSaslMapRegexString: .*
nsSaslMapBaseDNTemplate: ou=People,dc=example,dc=com
nsSaslMapFilterTemplate: (cn=&)
Hmm - this doesn't seem quite right. For one (cn=&) is not the correct syntax. What does & mean here? If by & you mean "the entire string matched by nsSaslMapRegexString" then this means you expect a SASL username of something like "John Doe" which is mapped to an entry with cn=John Doe under ou=People. But this still won't work unless you do something like this:

nsSaslMapRegexString: \(.*\)
...
nsSaslMapFilterTemplate: (cn=\1)

You have to use the escaped parentheses in the regexstring to put the match into a 
matching group (referenced by \1).  But I still don't think this will work unless you 
have a very nonstandard Kerberos set up.  The regex string is supposed to match against 
the Kerberos principal, which is usually something like [EMAIL PROTECTED], or the domain 
is omitted and the principal sent to the DS is just "jdoe".  The examples at 
http://directory.fedora.redhat.com/wiki/Howto:Kerberos describe both of these situations.


On the server I've added export KRB5_KTNAME=/etc/ldap.keytab to 
/opt/fedora-ds/start-slapd.  (I've done a ktdump to this file from kadmin).

On the client that previously connected to OpenLDAP, I've changed the 
/etc/ldap.conf (and /etc/openldap/ldap.conf) to:
host: myfds.example.com
base dc=example, dc=com
SASL_MECH GSSAPI
SASL_REALM MYEXAMPLE.COM
use_sasl on
sasl_auth_id nssldap/myclient.myexample.com

When trying to do an ldapwoami I recieve:
ldap_sasl_interactive_bind_s: Invalid credentials (49)
  additional info: SASL(-1): generic failure: GSSAPI Error: Miscellaneus 
failure (Permission Denied).

I have already done a kinit username to my KRB5 REALM and that user exists in 
the base ou=People, dc=example, dc=com on the FDS.

One thing that was not clear to me was if I needed to add a SASL Mapping entry 
under the configuration tab when I already have the added entry above - and if 
so what it should look like).
You're pretty close, just refer to http://directory.fedora.redhat.com/wiki/Howto:Kerberos
Also, I'm not sure if I need all the settings (such as a sasl_auth_id) but they are left over from configuration of openldap.
What settings?
Any help would be appreciated.

Regards,
Jonathan

--
Fedora-directory-users mailing list
[email protected]
https://www.redhat.com/mailman/listinfo/fedora-directory-users

Attachment: smime.p7s
Description: S/MIME Cryptographic Signature

--
Fedora-directory-users mailing list
[email protected]
https://www.redhat.com/mailman/listinfo/fedora-directory-users

Reply via email to