Hi Simo:

> Normally this is not actually allowed, the reason is that kerberos needs keys 
> generated, 
> and can't work with the userPasswrod hash, so we prevent storing any hash in 
> userPassword 
> and reject any attempt that does not involve a clear text password.

That makes sense. Thank you for clearing that up.

> However if you enable the migration mode we do allow to set the hash, what we 
> expect then 
> is to have either users or some application to authenticate via an ldap bind 
> that sends a 
> clear text password. While in migration mode, a bind will check if the 
> password is valid, 
> and if it is it will generate the kerberos keys out of it.

That also makes sense and it is a great way to transfer users from an existing 
LDAP to FreeIPA.

Unfortunately, the problem I have is that I have the user data and the hashed 
password in a standalone database and I want to move it into FreeIPA without 
requiring the users to re-authenticate. I do not have a plaintext password and 
I do not have an LDAP DB. From what you and Mark have said, I need to find a 
way to emulate migration mode for my setup or, if possible, insert the existing 
hash directly in Kerberos. Does that make sense?

Regards,

Joe

-----Original Message-----
From: Simo Sorce [mailto:s...@redhat.com] 
Sent: Monday, June 25, 2012 4:50 AM
To: Mark Reynolds
Cc: Joe Linoff; freeipa-users@redhat.com
Subject: Re: [Freeipa-users] Transfer user database to FreeIPA LDAP

On Sun, 2012-06-24 at 15:49 -0400, Mark Reynolds wrote:
> Hi Joe,
> 
> I'm not really an IPA guy, but IPA uses 389 directory server as its 
> backend.  You would need to convert the your DB entries to LDAP 
> entries, but 389 supports your password type, so it should not be a 
> problem if you copy & paste the password hashes.  LDAP expects the 
> password to be something like:
> 
> userpassword: {SSHA}cchzM+LrPCvbZdthOC8e62d4h7a4CfoNvl6d/w==
> Mark

Normally this is not actually allowed, the reason is that kerberos needs keys 
generated, and can't work with the userPasswrod hash, so we prevent storing any 
hash in userPassword and reject any attempt that does not involve a clear text 
password.

However if you enable the migration mode we do allow to set the hash, what we 
expect then is to have either users or some application to authenticate via an 
ldap bind that sends a clear text password. While in migration mode, a bind 
will check if the password is valid, and if it is it will generate the kerberos 
keys out of it.

Simo.

--
Simo Sorce * Red Hat, Inc * New York


_______________________________________________
Freeipa-users mailing list
Freeipa-users@redhat.com
https://www.redhat.com/mailman/listinfo/freeipa-users

Reply via email to