Pascal Levy a écrit :
On Wednesday 08 October 2008 12:54:48 Guillaume Rousse wrote:
I'm back on this old question, because I'm now really working on it.

Andrew Bartlett a écrit :
Second, I was looking at better way to sync users accounts between our
new ldap-backed heimdal kdc and our windows AD. Currently, we have an
automated task synchronising user entries into Windows LDAP from our
Unix LDAP hourly, and a password-management CGI propagating password
changes to both systems (using an ugly VB CGI on windows side to
effectively change the password). I was wondering if the password
handling stuff could be merged with the ldap synchronisation task, now
we store kerberos keys in LDAP.
Windows does not allow the password attributes to be manipulated like
that.  You could potentially read and set passwords with Samba4's
DRSUAPI synchronisation, but you can't do it with just Heimdal or just
LDAP.

I don't know if this could be usefull for you but what we are doing here is to keep real users passwords only in heimdal KDC.

openldap authentication is made by using sasl mechanism with [EMAIL PROTECTED] as userPassword chain AD authentication is made by using a trust relationship with heimdal KDC and a mapping beetwen AD accounts and heimdal KDC principals. ldap/heimdal/AD accounts are keep in sync with a perl script running each 15 min. AD userPassword is a (very) long random chain created by the perl script and set in AD with ldap tools.

users can change there password by using normal windows change password interface. Admins can use heimdal tools to manage passwords directly on the kdc.
That's sound really interesting, but I don't understand some points:

- how do you have AD knows it can get a kerberos ticket from the heimdal KDC ? Did you set the user userPrincipalName attribute to a principal from heimdal managed realm ?

- is the AD userPassword attribute ever used in this case ?

- what's the exact usefulness of having OpenLDAP auth redirected to SASL mechanism ? Just for managing a single password ? We have heimdal using openldap as backend, and use smbkrb5 overlay to keep them synced already, so it may be useless for us.

- how do you prevent ExOP PasswdChange to rewrite userPassword attribute with a normal value, and keep '[EMAIL PROTECTED]' instead ?

- what exact cyphers did you use to ensure compatibility between heimdal and your AD controller ? From Heimdal documentation, we used des3-hmac-sha1 and des-cbc-crc, but it's quite old. From previous Andrew answer, I understand we may use arcfour-hmac-md5 as well now.

Thanks for your input.
--
Guillaume Rousse
Moyens Informatiques - INRIA Futurs
Tel: 01 69 35 69 62
--
To unsubscribe from this list go to the following URL and read the
instructions:  https://lists.samba.org/mailman/listinfo/samba

Reply via email to