Hi,

i think Bryan is right. In the 300 exam must be the 389 Server and or the FreeIPA Part.

After the decision from Red Hat and Suse not to support OpenLDAP in the future it makes sense to enlarge the exam with this two points.

Another Point is 395.3 : Joining Samba to an existing NT4 domain

In my opinion this point can be canceled. In my work i doesn't see any NT4 domain any more.

Perhaps in the world are some NT$ Domains but i think this is a handful of domains. And how big is the chance to met them?

Best regards

Dirk



Am 16.10.2018 um 22:29 schrieb Bryan Smith:
Fabian Thorns <[email protected] <mailto:[email protected]>> wrote:

    I think we will have some fundamental discussions about this exam;
    i.e. regarding the relevance of NT4 domains, of the amount of
    Windows knowledge covered in the exam, about the real relevance of
    FreeIPA


First off:  The "iPlanet lineage" (389) "Real World"

I've been quiet since my initial barking, since LPI ignored the 2005+ open sourced version 8 of iPlanet, aka "389 Server," since inception of the level 3 program, so I don't know where to start.  100% of the Enterprise environments (several dozen) I've worked in (going back to even the very late '90s) have all been iPlanet-based, whether they were all, newer Red Hat Directory Server (RHDS) from the get-go, or they migrated from Sun One or another iPlanet implementation when Oracle shutdown the product line earlier this decade (one was even Netscape from the get-go).

Multi-master replication is pretty important to Enterprises, which is why everyone still runs 389 -- unless they had eDirectory, of course, or just didn't care to centralize IETF/POSIX attributes at all, some don't.  Some even just use NIS on loopback, using a configuration management system to 'push down' the maps to each system. And all of the OpenLDAP Server environments I've worked in have been very small implements.  That said ...


Secondly:  Schema is what is important

I really don't care what people run.  What I care about is schema for centralizing SSH public keys (w/SSSD sss_ssh_authorizedkeys), Sudoers, Automounter maps (especially w/SSSD caching, chucking legacy LDAP integration), SELinux rules (this only applies to SELinux enforcing systems, of course), etc...  I live in a world of SSSD as standard, and I've yet to meet a single Debian or Ubuntu sysadmin that doesn't praise SSSD once they deploy it for the first time, so it's not just us Red Fedoras either.

Because once you have SSSD, you want to take advantage of all of its capabilities that can be stored in the LDAP schema.  E.g., in the last few financial services industry (FSI) enterprises I worked in, centralizing SSH public keys made multi-factor authentication (MFA) painless as the user would get the key challenge, followed by another -- whether password, additional certificate, etc... -- but still only got no more than one prompt (if any in the case of key + certificate).

Hence the second point.  ;)

So, that all said ...


Third:  No more AD-IDMU -- either nothing, proprietary or AD Forest Trusts

Microsoft deprecated ActiveDirectory Identity Management for UNIX (IDMU) in Windows Server 2012R2, and it's utterly removed as of 2016.  IDMU was really basic in the first place, compared to various LDAP schema out there for managing all sorts of things, but it was something.  But now that it's gone, it that means enterprises have two (2) choices for centralizing IETF/POSIX attributes with Windows/ActiveDirectory integration ...

 0)  Nothing - don't centralize, enumerate at the end-system (won't pass an audit)  1)  Proprietary - install a proprietary solution with costly CALs (Canonical punts things here)
 2)  IPA - the AD Forest Trust FTW

I really don't understand how we can cover Samba, but ignore all of the work done between the IPA-SSSD and Samba teams to address all sorts of issues in Samba that IPA already addressed first.  (HINT: virtually all of Red Hat's Samba contributors are on IPA-SSSD, and solved things in the former, then ported over to the latter)  Multi-domain enumeration for starters, which the IPA teams added to SSSD, then worked into Samba.  Especially in a world where almost everything is Kerberosized too ... which IPA brings to-the-table, and not in a way that is only useful for Windows services, like Samba.

So, to recap ... IPA brings all of the benefits of iPlanet legacy over other implementations (#1), with the 'built-in' schema that enterprises want (#2) and then offers MIT Kerberos with MS Kerberos compatibility, offering those nice, External AD Forest Trust options for dealing with the pesky lack of integration now that AD-IDMU is gone.  So IPA Domains can access AD Domain resources (put IPA User Groups in AD Domain Local Groups), and vice-versa, right down to those principals and ID mappings across REALMs (domains).

The entire pipe dream of non-Windows and Windows using the same schema was always just that -- separate AD Forests are required because the schema differs since IETF/POSIX cannot use Windows/NTuser attributes, and vice-versa.  This is just the reality, and why a Samba DC in an AD Domain was never going to be able to address the reality of what end-IETF/POSIX systems.  This tri-fecta also cleans up a lot of hacking, messes and other things when systems are assuming things, instead of actually seeing the full principals across REALMs, along with storing security, etc... -- e.g., I hate hacking up rpc.idmapd (don't get me started).  And then IPA brings a host of other features.

I mentioned MFA before, and IPA also offers TOTP or HOTP and the option for 3rd party integration with FreeRADIUS built-in. And there are yet other features.  So ...

At some point we're really looking at either breaking out all of these features one-by-one ... or just covering IPA.  I'd rather just cover IPA, especially since Red Hat is building everything around it ... along with Ansible Tower for remediation and validation ... and not just for Red Hat products, or even OSes ... but networking equipment too.  I know people look at IPA-SSSD as Red Hat-only, just like they did 389-RHDS before it.

LPI can continue to do that if it wants.  But IPA-SSSD is being adopted in a lot of environments.  One doesn't have to be a LDAP or Kerberos expert anymore in an IPA environment, and has the bonus of addressing inter-operability in _both_ directions with AD, not just one.


--
Bryan J Smith  - http://www.linkedin.com/in/bjsmith
E-mail:  b.j.smith at ieee.org <http://ieee.org>  or  me at bjsmith.me <http://bjsmith.me>


_______________________________________________
lpi-examdev mailing list
[email protected]
http://list.lpi.org/cgi-bin/mailman/listinfo/lpi-examdev

_______________________________________________
lpi-examdev mailing list
[email protected]
http://list.lpi.org/cgi-bin/mailman/listinfo/lpi-examdev

Reply via email to