Jonathan Schreiter wrote:
Hi Richard,
I should have probably provided more detail.  I followed the HOWTO:kerberos and 
entered the config - sasl - mapping as it explained, namely:

dn: cn=mapname,cn=mapping,cn=sasl,cn=config
objectclass: top
objectclass: nsSaslMapping
cn: mapname
nsSaslMapRegexString: \(.*\)@\(.*\)
If you don't need the DOMAIN part, you can omit the second set of parentheses and just have
\(.*\)@.*
nsSaslMapBaseDNTemplate: uid=\1,dc=myexample,dc=com
Do your users have a DN of uid=jdoe,dc=myexample,dc=com or uid=jdoe,ou=People,dc=myexample,dc=com? If the latter, then this won't work. You'll have to use
nsSaslMapBaseDNTemplate: uid=\1,ou=People,dc=myexample,dc=com
This is good if you are sure that all of your users' entries are under ou=People and have a uid that matches the principal name.
nsSaslMapFilterTemplate: (objectclass=inetOrgPerson)
Or, just use
nsSaslMapBaseDNTemplate: ou=People,dc=myexample,dc=com
nsSaslMapFilterTemplate: (uid=\1)



And that poduces the same SASL GSSAPI errors as in the last post.  The link on 
that HOWTO that points to the SASL configurations shows the other configuraton 
paramaters (the ones that I also tried and posted in my last message).  The 
install isa standard [EMAIL PROTECTED] so you're probably correct and I've 
canged that entry to the above settings.

The SASL documenation:
Configuring SASL Identity Mapping from the Console In the Console, open the Directory Server. Open the "Configuration" tab. Select the "SASL Mapping" tab. To add new SASL identities, select the "Add" button, and fill in the required values.
The Kerberos HOWTO doesn't discuss adding any mappings on the console, so it 
wasn't clear if this was required or not.  Can you confirm?
If you've added the above entry using ldapmodify or by editing dse.ldif, then you do not have to add it with the console - although it is a good idea to use the console to add this configuration unless you really know what you're doing, because you'll have to add the cn=mapping entry parent before the cn=mapname child config entry.
If it is required, what would the fields be filled with - do we need to link to 
the dn: cn=mapname,cn=mapping,cn=sasl,cn=config above?
I'm not sure what you mean.
Also, because the service principal that FDS is going to use is 
ldap/fqdnoffds.myexample.com, do I need to add a second dn in order for this to 
work...such as:
No, not unless FDS is going to use it's service principal to do a SASL/GSSAPI BIND to another FDS.
dn: cn=mapname2,cn=mapping,cn=sasl,cn=config
objectclass: top
objectclass: nsSaslMapping
cn: mapname
nsSaslMapRegexString:  [^/]+/\(.+\)
nsSaslMapBaseDNTemplate: uid=\1,ou=hosts,dc=myexample,dc=com
nsSaslMapFilterTemplate: .*


Also, I'm not sure if I need all the settings (such as a sasl_auth_id) but they are left over from configuration of openldap.
What settings?

The SASL settings that openldap used (they aren't mentioned in the howto: 
kerberos or SASL on the FDS sites), but they are:
SASL_MECH GSSAPI
SASL_REALM MYEXAMPLE.COM
use_sasl_on
sasl_auhid nssldap/myclient.myexample.com

I've tried with and without these settings and I still get the the error: 
invalid credentials (49) additional info: SASL(-1): generic failure: GSSAPI 
Error: Miscellaneous failure (Permission denied).  When I set these, I beleve 
it is used for default settings (such as you don't have to type ldapwhoami -Y 
GSSAPI, just ldapwhoami).
Ok.  Those are client side settings that do not affect Fedora DS.
Any thoughts would be appreciated!

Many thanks again,
Jonathan

--
Fedora-directory-users mailing list
[email protected]
https://www.redhat.com/mailman/listinfo/fedora-directory-users

Attachment: smime.p7s
Description: S/MIME Cryptographic Signature

--
Fedora-directory-users mailing list
[email protected]
https://www.redhat.com/mailman/listinfo/fedora-directory-users

Reply via email to