From: Ivan Shmakov<[email protected]>
Date: Sat, 15 Aug 2009 11:27:34 +0700

Adam Williams<awill...@...>  writes:

  >>  I'm familiar with ldap, but I'm not sure if this would be a question
  >>  for this list, or for an ldap server setup specifically (such as
  >>  openldap's list).

  >>  I'm looking to use LDAP for a project, but need a bit better
  >>  authentication than just authenticating with a DN and a password.  I
  >>  was hoping to use some sort of access list, or something similar.

[...]

  >  you can use the host: field along with nss_ldap and pam to restrict
  >  users to be only able to connect/ssh/etc to specified servers.

Controlling access based on a host attribute in each user's entry is a pretty clumsy method, and quickly becomes unmanageable as the number of users gets large.

In OpenLDAP's nssov you use access controls on the ipHost entries instead, and just by assigning users to groups and granting groups access to the ipHost / authorizedService attribute you can control authorization in a centralized location. It's far more scalable, auditable, and thus more secure.

        If it's a matter of controlling host access, NIS-like netgroups
        (along with pam_access to allow or deny access) could probably
        also be tried.

--
  -- Howard Chu
  CTO, Symas Corp.           http://www.symas.com
  Director, Highland Sun     http://highlandsun.com/hyc/
  Chief Architect, OpenLDAP  http://www.openldap.org/project/

Reply via email to