Re: [Freeipa-users] solved: here are some additional passsync notes

2012-12-29 Thread Nate Marks
Thanks for the feedback! ldp.exe does support ssl.   The comment about 636
being the non-ssl port  was cruft from a previous version where I was
trying to keep things simple.

On Fri, Dec 28, 2012 at 3:40 PM, Rich Megginson  wrote:

>  On 12/24/2012 09:13 AM, Nate Marks wrote:
>
> I'd love some feedback on these. They seemed to work for me.Thanks!
>
>
> Introduction
> This guide starts at the point where your freeipa server is correctly
> replicating accounts from a windows active directory server.  The following
> steps are intended to help you roll out the passync software to all of your
> domain controllers.  Detailed descriptions of how the software works are
> available from people far more competent than myself.  I’m just covering
> some installation tips.  One thing that really screwed me up is that there
> are great passsync docs for 389 directory server and great passsync docs
> for freeipa server.  They are similar.  They are NOT interchangeable.  When
> using freeipa server stick with freeipa docs .  I know this seems obvious,
> but when passsync doesn’t work the first time, my instinct is to cast about
> on google for things that seem to be related.  When you find the 389 server
> docs under those circumstances and try to apply them  to freeipa, you find
> a rathole.
>
>
> Fixed - see below.
>
>
>
> Getting started:
>
> It’s theoretically possible to get the passsync to work on the first
> attempt.  I’ve just never  done it.  In order for that to work, you have to
> have exactly the right values  ready  to go when you run the passsync
> installer. The installer has input fields for the following items:
>
> verifying the hostname, username password and search base values
> hostname: 
> port: 636
> username: uid=passsync,cn=sysaccounts,cn=etc,dc=,dc=
> password: 
> cert token :  tried it with and without the
> /etc/dirsrv/slapd-instance/pwdfile.txt contents
>
>
> Right - not needed
>
>
>  serach base=cn=users,cn=accounts,dc=inframax,dc=ncare
>
> The best tool I found in windows for checking the passsync installation
> settings is ldp.
> First I’ll talk about verifying the easy stuff (hostname, username,
> password, search base).  run notepad on the windows server and put in the
> values you’re going to use before running the passsync installer.  Then run
> ldp.exe and use the values from notepad  and the steps below to verify the
> hostname, username, password and search base.
>
> ldp.exe
> connection > connect
> enter the freeipa server hostname in the server field
> enter port 636 (non-ssl port) in the port field
>
>
> 636 is the SSL port
> Does ldp have an option for StartTLS?
>
>
>  check the SSL box
> click OK
>
>
> connection > bind
> select the 'simple bind' radio button
> enter the DN for the passsync account on the freeipa server in the
> userfield.  this is
> "uid=passsync,cn=sysaccounts,cn=etc,dc=,dc="  by default
> enter the password for the passsync account in the password field
> click ok
>
> select view > tree and make sure you can browse the tree  in the ipa
> server. browse to the subtree that you're going to use for search base and
> make sure you
>  see your replicated accounts in that container.
> if you can, then the values  you used for the hostname, username, password
> and search base are all correct.  It also means that the ca.crt file you
> imported for ldap account syunchronization is working correctly.
>
> NOTE:  I left cert token empty.  it seems to be used for encrypting the
> certificate db in c:\program files\389 directory password synchronization.
>  That can be done after you get password synchronization working.
>
> Right - it is not needed
>
>
> Installing Passsync:
> Now we’ve done a bunch of work to  check our values, but we haven’t
> accomplished anything.  So go ahead and run the passsync msi installer and
> enter  your values into the appropriate fields.
>
> The installer will create files, directories and registry stuff, but we’re
> not  nearly done.
>
> Step 5 in the link below seems to have the correct steps.   Be sure to
> import the same certificate that you imported in the account
> synchronization process.  I got mine  with wget 
> http:///ipa/config/ca.crt.
>
>
>
> https://docs.fedoraproject.org/en-US/Fedora/17/html/FreeIPA_Guide/pass-sync.html
>
>
>
> One mroe thing before rebooting, use regedit to change the value of
> HKLM->Software->PasswordSync  “Log Level” from 0 to 1. If everything works
> and you don’t need it, great!
>
> If the stars line up, you’ve put good values into the passsync installer,
> imported the freeipa servers certificate into the cert DB that passsync
> uses and the installer registered a new  dll to capture password change
> events.  You need to reboot the server to get the dll registration to take
> effect.
> After it restarts,  change the password on an account that’s being
> replicated to free ipa.  use notepad to open the file c:\program files\389
> directory password synchronization\ passsync.txt
> if the passhook.dll 

Re: [Freeipa-users] solved: here are some additional passsync notes

2012-12-28 Thread Rich Megginson

On 12/24/2012 09:13 AM, Nate Marks wrote:

I'd love some feedback on these. They seemed to work for me.Thanks!


Introduction
This guide starts at the point where your freeipa server is correctly 
replicating accounts from a windows active directory server.  The 
following steps are intended to help you roll out the passync software 
to all of your domain controllers.  Detailed descriptions of how the 
software works are available from people far more competent than 
myself.  I'm just covering some installation tips.  One thing that 
really screwed me up is that there are great passsync docs for 389 
directory server and great passsync docs for freeipa server.  They are 
similar.  They are NOT interchangeable.  When using freeipa server 
stick with freeipa docs .  I know this seems obvious, but when 
passsync doesn't work the first time, my instinct is to cast about on 
google for things that seem to be related.  When you find the 389 
server docs under those circumstances and try to apply them  to 
freeipa, you find a rathole.


Fixed - see below.



Getting started:

It's theoretically possible to get the passsync to work on the first 
attempt.  I've just never  done it.  In order for that to work, you 
have to have exactly the right values  ready  to go when you run the 
passsync installer. The installer has input fields for the following 
items:


verifying the hostname, username password and search base values
hostname: 
port: 636
username: uid=passsync,cn=sysaccounts,cn=etc,dc=,dc=
password: 
cert token :  tried it with and without the 
/etc/dirsrv/slapd-instance/pwdfile.txt contents


Right - not needed


serach base=cn=users,cn=accounts,dc=inframax,dc=ncare

The best tool I found in windows for checking the passsync 
installation settings is ldp.
First I'll talk about verifying the easy stuff (hostname, username, 
password, search base).  run notepad on the windows server and put in 
the values you're going to use before running the passsync installer. 
 Then run ldp.exe and use the values from notepad  and the steps below 
to verify the hostname, username, password and search base.


ldp.exe
connection > connect
enter the freeipa server hostname in the server field
enter port 636 (non-ssl port) in the port field


636 is the SSL port
Does ldp have an option for StartTLS?


check the SSL box
click OK


connection > bind
select the 'simple bind' radio button
enter the DN for the passsync account on the freeipa server in the 
userfield.  this is 
"uid=passsync,cn=sysaccounts,cn=etc,dc=,dc="  by 
default

enter the password for the passsync account in the password field
click ok

select view > tree and make sure you can browse the tree  in the ipa 
server. browse to the subtree that you're going to use for search base 
and make sure you

see your replicated accounts in that container.
if you can, then the values  you used for the hostname, username, 
password and search base are all correct.  It also means that the 
ca.crt file you imported for ldap account syunchronization is working 
correctly.


NOTE:  I left cert token empty.  it seems to be used for encrypting 
the certificate db in c:\program files\389 directory password 
synchronization.  That can be done after you get password 
synchronization working.

Right - it is not needed


Installing Passsync:
Now we've done a bunch of work to  check our values, but we haven't 
accomplished anything.  So go ahead and run the passsync msi installer 
and enter  your values into the appropriate fields.


The installer will create files, directories and registry stuff, but 
we're not  nearly done.


Step 5 in the link below seems to have the correct steps.   Be sure to 
import the same certificate that you imported in the account 
synchronization process.  I got mine  with wget 
http:///ipa/config/ca.crt.


https://docs.fedoraproject.org/en-US/Fedora/17/html/FreeIPA_Guide/pass-sync.html



One mroe thing before rebooting, use regedit to change the value of 
HKLM->Software->PasswordSync  "Log Level" from 0 to 1. If everything 
works and you don't need it, great!


If the stars line up, you've put good values into the passsync 
installer, imported the freeipa servers certificate into the cert DB 
that passsync uses and the installer registered a new  dll to capture 
password change events.  You need to reboot the server to get the dll 
registration to take effect.
After it restarts,  change the password on an account that's being 
replicated to free ipa.  use notepad to open the file c:\program 
files\389 directory password synchronization\ passsync.txt

if the passhook.dll is working correctly, you'll see an entry like:
'1 new entries loaded from data file'


If ssl is working correctly, you'll be able to log into the freeipa 
server with the test account  and newly changed password.


Ifit doesn't work, verify your cert and your values with ldp.exe.  I 
just don't have anything better that that yet.



This takes me to the point where I'd love more tools t

[Freeipa-users] solved: here are some additional passsync notes

2012-12-24 Thread Nate Marks
I'd love some feedback on these. They seemed to work for me.Thanks!


Introduction
This guide starts at the point where your freeipa server is correctly
replicating accounts from a windows active directory server.  The following
steps are intended to help you roll out the passync software to all of your
domain controllers.  Detailed descriptions of how the software works are
available from people far more competent than myself.  I’m just covering
some installation tips.  One thing that really screwed me up is that there
are great passsync docs for 389 directory server and great passsync docs
for freeipa server.  They are similar.  They are NOT interchangeable.  When
using freeipa server stick with freeipa docs .  I know this seems obvious,
but when passsync doesn’t work the first time, my instinct is to cast about
on google for things that seem to be related.  When you find the 389 server
docs under those circumstances and try to apply them  to freeipa, you find
a rathole.

Getting started:

It’s theoretically possible to get the passsync to work on the first
attempt.  I’ve just never  done it.  In order for that to work, you have to
have exactly the right values  ready  to go when you run the passsync
installer. The installer has input fields for the following items:

verifying the hostname, username password and search base values
hostname: 
port: 636
username: uid=passsync,cn=sysaccounts,cn=etc,dc=,dc=
password: 
cert token :  tried it with and without the
/etc/dirsrv/slapd-instance/pwdfile.txt contents
serach base=cn=users,cn=accounts,dc=inframax,dc=ncare

The best tool I found in windows for checking the passsync installation
settings is ldp.
First I’ll talk about verifying the easy stuff (hostname, username,
password, search base).  run notepad on the windows server and put in the
values you’re going to use before running the passsync installer.  Then run
ldp.exe and use the values from notepad  and the steps below to verify the
hostname, username, password and search base.

ldp.exe
connection > connect
enter the freeipa server hostname in the server field
enter port 636 (non-ssl port) in the port field
check the SSL box
click OK


connection > bind
select the 'simple bind' radio button
enter the DN for the passsync account on the freeipa server in the
userfield.  this is
"uid=passsync,cn=sysaccounts,cn=etc,dc=,dc="  by default
enter the password for the passsync account in the password field
click ok

select view > tree and make sure you can browse the tree  in the ipa
server. browse to the subtree that you're going to use for search base and
make sure you
see your replicated accounts in that container.
if you can, then the values  you used for the hostname, username, password
and search base are all correct.  It also means that the ca.crt file you
imported for ldap account syunchronization is working correctly.

NOTE:  I left cert token empty.  it seems to be used for encrypting the
certificate db in c:\program files\389 directory password synchronization.
 That can be done after you get password synchronization working.

Installing Passsync:
Now we’ve done a bunch of work to  check our values, but we haven’t
accomplished anything.  So go ahead and run the passsync msi installer and
enter  your values into the appropriate fields.

The installer will create files, directories and registry stuff, but we’re
not  nearly done.

Step 5 in the link below seems to have the correct steps.   Be sure to
import the same certificate that you imported in the account
synchronization process.  I got mine  with wget
http:///ipa/config/ca.crt.


https://docs.fedoraproject.org/en-US/Fedora/17/html/FreeIPA_Guide/pass-sync.html



One mroe thing before rebooting, use regedit to change the value of
HKLM->Software->PasswordSync  “Log Level” from 0 to 1. If everything works
and you don’t need it, great!

If the stars line up, you’ve put good values into the passsync installer,
imported the freeipa servers certificate into the cert DB that passsync
uses and the installer registered a new  dll to capture password change
events.  You need to reboot the server to get the dll registration to take
effect.
After it restarts,  change the password on an account that’s being
replicated to free ipa.  use notepad to open the file c:\program files\389
directory password synchronization\ passsync.txt
if the passhook.dll is working correctly, you’ll see an entry like:
‘1 new entries loaded from data file’


If ssl is working correctly, you’ll be able to log into the freeipa server
with the test account  and newly changed password.

Ifit doesn’t work, verify your cert and your values with ldp.exe.  I just
don’t have anything better that that yet.


This takes me to the point where I’d love more tools to troubleshoot the
problem.

Other things I’ve tried:
1) UAC.  I disable it, but I’d love some feedback on whether or not that’s
required on win 2k8R2.
2) some of my DCs have certificate services installed and some don’t.  I
don’t think any