Configuring LDAP with TLS and Kerberos for file access
You can configure LDAP with TLS and Kerberos as an authentication method for file access. Using Kerberos and TLS with LDAP provides maximum security for the communication channel between the IBM Storage Scale system and the LDAP server.
Provides an example on how to configure LDAP with TLS and Kerberos as an authentication
method for file access.
- Ensure that the CA certificate for LDAP server is placed under the
/var/mmfs/tmp directory with the ldap_cacert.pem
name. Specifically, on a protocol node where the command is run. Perform validation of CA
cert availability with a desired name at a required location.
# stat /var/mmfs/tmp/ldap_cacert.pem File: /var/mmfs/tmp/ldap_cacert.pem Size: 2130 Blocks: 8 IO Block: 4096 regular file Device: fd00h/64768d Inode: 103169903 Links: 1 Access: (0644/-rw-r--r--) Uid: ( 0/ root) Gid: ( 0/ root) Context: unconfined_u:object_r:user_tmp_t:s0 Access: 2015-01-23 12:37:34.088837381 +0530 Modify: 2015-01-23 12:16:24.438837381 +0530 Change: 2015-01-23 12:16:24.438837381 +0530
- Ensure that the keytab file is placed under /var/mmfs/tmp directory
name as krb5_scale.keytab specifically on the node where the command is run. Perform validation
of keytab file availability with a desired name at a required location:
# stat /var/mmfs/tmp/krb5_scale.keytab File: /var/mmfs/tmp/krb5_scale.keytab Size: 1490 Blocks: 8 IO Block: 4096 regular file Device: fd00h/64768d Inode: 68252098 Links: 1 Access: (0600/-rw-------) Uid: ( 0/ root) Gid: ( 0/ root) Context: unconfined_u:object_r:user_tmp_t:s0 Access: 2021-05-26 06:52:49.511820164 -0400 Modify: 2021-04-28 09:52:07.661820164 -0400 Change: 2021-05-26 05:15:09.837820164 -0400 Birth: -
- Issue the mmuserauth service create command.
A sample output is as follows:# mmuserauth service create --type ldap --data-access-method file --servers myLDAPserver --base-dn dc=example,dc=com --user-name cn=manager,dc=example,dc=com --netbios-name ess --enable-server-tls --enable-kerberos --kerberos-server myKerberosServer --kerberos-realm example.com
File authentication configuration completed successfully.
- To verify the authentication configuration, issue the mmuserauth service
list command.
A sample output is as follows:# mmuserauth service list
FILE access configuration : LDAP PARAMETERS VALUES ------------------------------------------------- ENABLE_SERVER_TLS true ENABLE_KERBEROS true USER_NAME cn=manager,dc=example,dc=com SERVERS myLDAPserver NETBIOS_NAME ess BASE_DN dc=example,dc=com USER_DN none GROUP_DN none NETGROUP_DN none USER_OBJECTCLASS posixAccount GROUP_OBJECTCLASS posixGroup USER_NAME_ATTRIB cn USER_ID_ATTRIB uid KERBEROS_SERVER myKerberosServer KERBEROS_REALM example.com OBJECT access not configured PARAMETERS VALUES -------------------------------------------------
- Verify the user resolution on the system.
# id ldapuser3 uid=1002(ldapuser3) gid=1002(ldapuser3) groups=1002(ldapuser3)