Install LDAP Service

Install OpenLDAP

# Ubuntu
sudo apt -y install slapd ldap-utils perl
sudo dpkg-reconfigure slapd
update-rc.d slapd enable
sudo vi /etc/ldap/ldap.conf
BASE     dc=datalayer,dc=io
URI      ldap://localhost
# Centos
sudo yum -y install openldap openldap-servers openldap-clients perl
sudo chkconfig slapd on
cd /etc/openldap/slapd.d/cn\=config
for i in olcDatabase*; do
  perl -npe 's/dc=my-domain,dc=com/dc=datalayer,dc=io/' -i $i
for i in olcDatabase*bdb.ldif; do
  echo "olcRootPW: $(slappasswd -s secret)" >> $i
sudo service slapd start
sudo systemctl status slapd
# rsyslog
cd /etc/sysconfig
perl -npe 's/#SLAPD_/SLAPD_/' -i ldap
echo "local4.* /var/log/slapd.log" >> /etc/rsyslog.conf
service rsyslog restart
# Review the log file /var/log/slapd.conf to see if there are any errors.
# They usually refer to errors in the configuration files you just changed.
tail -f /var/log/slapd.conf



## Initial Structure with Bash

cat <<EOF >/tmp/initial.ldif
dn: dc=datalayer,dc=io
dc: datalayer
o: datalayer
objectclass: dcObject
objectclass: organization
objectclass: top

dn: ou=Users, dc=datalayer,dc=io
ou: Users
objectclass: organizationalUnit

dn: ou=Groups, dc=datalayer,dc=io
ou: Groupsinit.
objectclass: organizationalUnit

dn: ou=Maps, dc=datalayer,dc=io
ou: Maps
objectclass: organizationalUnit
ldapadd -a -c -f /tmp/initial.ldif -H ldap:/// -D "cn=admin,dc=datalayer,dc=io" -W

The ldapadd command will prompt you for your password - this is the same password you used in configuring the OpenLDAP server earlier. If all goes well, you should see four lines indicating that the server added a new entry. If this is not the case, something has gone wrong. Refer to the error messages and /var/log/slapd.log to retry the command. If you are trying this command for a second time, it is possible that some of the entries succeeded the first time. In this case, the error message will indicate that the entry could not be added because it already exists. You can safely ignore this error message.

ldapsearch -x -H ldap:/// -b dc=datalayer,dc=io

Initial Structure with Python

from ldap3 import Server, Connection, ALL
server = Server('', get_info=ALL)
conn = Connection(server, 'uid=admin,cn=users,cn=accounts,dc=demo1,dc=freeipa,dc=org', 'Secret123', auto_bind=True)
server.schema'dc=demo1,dc=freeipa,dc=org', '(objectclass=person)')
impot ldap3
from ldap3 import Server, Connection, ALL, MODIFY_REPLACE
server = Server('localhost', get_info=ALL)
conn = Connection(server, os.environ['DATALAYER_LDAP_BIND'], os.environ['DATALAYER_LDAP_BIND_PWD'], auto_bind=True)
conn.add('ou=Users,dc=datalayer,dc=io', 'organizationalUnit')
user = 'cn=eric,ou=Users,dc=datalayer,dc=io'
conn.add(user, 'inetOrgPerson', {'givenName': 'Eric', 'sn': 'Charles', 'departmentNumber': 'DLA', 'telephoneNumber': 1111}), 'departmentNumber', 'DLA'), '(objectclass=inetOrgPerson)', attributes=ldap3.ALL_ATTRIBUTES)
from ldap3 import HASHED_SALTED_SHA
from ldap3.utils.hashed import hashed
hashed_password = hashed(HASHED_SALTED_SHA, 'New12345')
conn.modify(user, {'userPassword': [(MODIFY_REPLACE, [hashed_password])]}), 'userPassword', 'New12345'), 'userPassword', hashed_password)
# A new password is set, hashed with sha256 and a random salt.
new_password = conn.extend.standard.modify_password(user, 'old_password', 'new_password', HASHED_SALTED_SHA256)

Automount Base Maps

The final piece of base configuration is to introduce the necessary base maps for the automounter. We will add individual maps for each user later on. As with the prior ldapadd, you will be prompted for the password and then the records will be added.

cat <<EOF >/root/initial-autofs.ldif
dn: nisMapName=auto.master,ou=Maps,dc=datalayer,dc=io
nisMapName: auto.master
objectclass: nisMap

dn: cn=/home,nisMapName=auto.master,ou=Maps,dc=datalayer,dc=io
cn: /home
objectClass: nisObject
nisMapName: auto.master
nisMapEntry: auto.home

dn: nisMapName=auto.home,ou=Maps,dc=datalayer,dc=io
nisMapName: auto.home
objectClass: nisMap

dn: cn=/,nisMapName=auto.home,ou=Maps,dc=datalayer,dc=io
cn: /
objectClass: nisObject
nisMapName: auto.home
nisMapEntry: -fstype=nfs,rw,hard,intr
ldapadd -a -f /root/initial-autofs.ldif -H ldap:/// -D "cn=admin,dc=datalayer,dc=io" -W


At this point, pause and test the OpenLDAP server in isolation. You should receive two records from the following command: one for auto.master and one for auto.home.

ldapsearch -x -H ldap:/// -b dc=datalayer,dc=io "(objectclass=nisMap)"

User Records

In order to log in to a client system, you will need a user record. Here is an example for eric.

# -w password
echo "userPassword: $(slappasswd -s TOPSECRET_PWD2)" >> /tmp/eric.ldif
ldapadd -a -H ldap:/// -D "cn=admin,dc=datalayer,dc=io" -W  <<!
dn: uid=eric, ou=Users, dc=datalayer,dc=io
uid: eric
cn: Eric Charles
displayName: Eric Charles
givenName: Eric
sn: Charles
initials: EC
uidNumber: 500
gidNumber: 100
homeDirectory: /home/eric
loginShell: /bin/bash
gecos: Eric Charles,,,,
objectclass: inetOrgPerson
objectclass: posixAccount
objectclass: shadowAccount
userPassword: $(slappasswd -s TOPSECRET_PWD2)
ldapmodify -H ldap:/// -D "cn=admin,dc=datalayer,dc=io" -w adminadmin <<!
dn: uid=eric4, ou=Users, dc=datalayer,dc=io
changetype: modify
replace: userPassword
userPassword: new-password

Or if you use automaount, In order to log in to a client system, you will need a user record with an auto.home record. Here is an example for my user ID "ahall":

cat <<EOF >/root/ahall.ldif
dn: cn=ahall, nisMapName=auto.home, ou=Maps, dc=datalayer,dc=io
cn: ahall
objectclass: nisObject
nisMapName: auto.home
nisMapEntry: -fstype=nfs,rw,hard,intr

dn: uid=ahall, ou=Users, dc=datalayer,dc=io
uid: ahall
displayName: Adrian Hall
cn: Adrian Hall
givenName: Adrian
sn: Hall
initials: AH
uidNumber: 500
gidNumber: 100
homeDirectory: /home/ahall
loginShell: /bin/bash
gecos: Adrian Hall,,,,
objectclass: inetOrgPerson
objectclass: posixAccount
objectclass: shadowAccount
echo "userPassword: $(slappasswd -s TOPSECRET)" >> /root/ahall.ldif
ldapadd -a -f /root/ahall.ldif -H ldap:/// -D "cn=admin,dc=datalayer,dc=io" -W

By now, you should be familiar with the usage of ldapadd.

We introduce two records - one for the user that contains all the information you would normally place in the password file, and another that you would normally place in /etc/auto.home file.

Group Records

Groups can also be stored in LDAP. However, they cannot conflict with system groups already in /etc/groups.

If they do, the system groups will take precedence. Once again, we create an LDIF file and then add it using ldapadd.

cat <<EOF >/root/grp-sysusers.ldif
dn: cn=sysusers, ou=Groups, dc=datalayer,dc=io
cn: sysusers
gidNumber: 500
memberUid: root
memberUid: eric
description: Group can sudo without restriction
objectclass: posixGroup
ldapadd -a -f /root/grp-sysusers.ldif -H ldap:/// -D "cn=admin,dc=datalayer,dc=io" -W

Once the client is installed (which is the next step), you should be able to add the following line to these file.

%sysusers ALL=(ALL) ALL
%users ALL=(ALL) ALL

This will allow root and eric/ahall to use sudo if it is installed.

Configure Client

We have finally got a working OpenLDAP server. We now need to configure the client systems.

Bear in mind that the OpenLDAP authentication server can also be a client of itself. The first step is to install necessary packages:

yum -y install openldap openldap-clients nss-pam-ldapd pam_ldap nscd autofs rpcbind nfs-utils
cat <<EOF >/root/eric.ldif
dn: uid=eric, ou=Users, dc=datalayer,dc=io
uid: eric
displayName: Eric Charles
cn: Eric Charles
givenName: Eric
sn: Charles
initials: EC
uidNumber: 500
gidNumber: 100
homeDirectory: /home/eric
loginShell: /bin/bash
gecos: Eric Charles,,,,
objectclass: inetOrgPerson
objectclass: posixAccount
objectclass: shadowAccount
echo "userPassword: $(slappasswd -s TOPSECRET)" >> /root/eric.ldif
ldapadd -a -f /root/eric.ldif -H ldap:/// -D "cn=admin,dc=datalayer,dc=io" -W

The authentication portion uses authconfig:

authconfig --enableldap --enableldapauth --ldapserver=ldap:// \
  --ldapbasedn="dc=datalayer,dc=io" --enablecache --disablefingerprint --kickstart

The automount part is a little more involved.

perl -npe 's/^automount:.*/automount: ldap/' -i /etc/nsswitch.conf
cat <<EOF >>/etc/sysconfig/autofs
SEARCH_BASE="ou=Maps,dc=datalayer,dc=io"cn=sysusers, ou=Groups, dc=datalayer,dc=io
ENTRY_ATTRIBUTE="cn"## Testing the Environment

service nscd restart
service autofs start
chkconfig autofs on

I have a final additional step just in case DNS goes down - add the authentication server and file server to /etc/hosts.

cat <<EOF >>/etc/hosts ldap files

Adjust for your IP Address allocation.

Test Environment

You should be able to use the getent command at this point to obtain information about your user.

getent passwd eric
eric:*:500:100:Eric Charles,,,,:/home/eric:/bin/bash
getent shadow eric

If this does not work, there is either a problem with your LDAP server or a problem with your authconfig. To determine which, do a ldapsearch for the user in question:

ldapsearch -x -H ldap:// -b dc=datalayer,dc=io "(uid=eric)"

If this command returns results, then your LDAP server is fine - it's your authconfig. If this command does not return results, then the problem is with your OpenLDAP server.

You should also be able to "cd /home/eric" and see the contents of the user directory. If this does not work, check the autofs debug messages in /var/log/messages.

You can also test group support in LDAP:

getent group sysusers sysusers:*:500:root,eric

If you do not see results, then perform an ldap search to see the information, and refer back to either the OpenLDAP server configuration or authconfig.

Home Directory

You will need to create the home directory yourself.

mkdir /home/eric
chown eric:sysusers /home/eric
chmod 0755 /home/eric
sudo -u eric ls -alp /home
su - eric

Or if you use automount.

mount files:/export/home /mnt
cd /mnt
mkdir eric
cp /etc/skel/.[a-z]* eric
chown -R eric.users eric
chmod 0755 ahall


Assuming all is OK (result should be 2), you can open up your server to the rest of your network.

iptables -A INPUT -m state --state new -m tcp -p tcp --dport 389 -j ACCEPT

Delete Entries

ldapdelete -D "cn=admin,dc=datalayer,dc=io" -W -x -H ldap:// "uid=eric, ou=Users, dc=datalayer,dc=io"
ldapdelete -D "cn=admin,dc=datalayer,dc=io" -W -x -H ldap:// "cn=sysusers, ou=Groups, dc=datalayer,dc=io"

Add User to Group

cat <<EOF >/root/eric2.ldif
dn: uid=eric2, ou=Users, dc=datalayer,dc=io
uid: eric2
displayName: Eric2 Charles
cn: Eric2 Charles
givenName: Eric2
sn: Charles
initials: EC2
uidNumber: 501
gidNumber: 100
homeDirectory: /home/eric2
loginShell: /bin/bash
gecos: Eric2 Charles,,,,
objectclass: inetOrgPerson
objectclass: posixAccount
objectclass: shadowAccount
echo "userPassword: $(slappasswd -s TOPSECRET)" >> /root/eric2.ldif
ldapadd -a -f /root/eric2.ldif -D "cn=admin,dc=datalayer,dc=io" -x -H ldap:// -W
cat <<EOF >/root/eric2-to-group.ldif
dn: cn=sysusers, ou=Groups,dc=datalayer,dc=io
changetype: modify
add: memberuid
memberuid: eric2
ldapmodify -a -f /root/eric2-to-group.ldif -D "cn=admin,dc=datalayer,dc=io" -x -H ldap:// -W

results matching ""

    No results matching ""