[Date Prev][Date Next]
Re: "Dynamic" authentication passthrough?
- To: Curtiss Howard <firstname.lastname@example.org>, email@example.com
- Subject: Re: "Dynamic" authentication passthrough?
- From: Howard Chu <firstname.lastname@example.org>
- Date: Fri, 31 Mar 2017 17:47:55 +0100
- In-reply-to: <WMemail@example.com>
- References: <CAM6RYrJU+=g=Dw=V7fzODU7YKUSPmrpNzjZwHXVNRozAwa3aAQ@mail.gmail.com> <WMfirstname.lastname@example.org>
- User-agent: Mozilla/5.0 (X11; Linux x86_64; rv:49.0) Gecko/20100101 Firefox/49.0 SeaMonkey/2.46a2
Curtiss Howard wrote:
I've got two Active Directory servers that are being proxied through OpenLDAP
and their respective trees are being merged into one. So far, so good.
Now I want to allow users to bind to the OpenLDAP server and pass the
authentication through to the appropriate AD and let it do the password checking.
I see a lot of documentation on using SASL for passthrough, but where I'm
stuck is that this requires every user to have an account in the OpenLDAP
server in order to see if the userPassword attribute is specially formatted.
In my case, this isn't really a palatable solution because I'm using the
OpenLDAP server with the meta backend and using it as a "live view" into the
data contained in the ADs. Other applications can talk directly to the ADs
and in order to do the SASL approach there'd have to be some syncing from the
ADs to the OpenLDAP server every time a user is created/deleted.
I would think that surely there must be some way to pass through the
authentication in a more obvious manner -- i.e., if the user doesn't exist
locally, try to bind against each proxied server in succession. But I can't
seem to find a way to do this, all references point to the SASL approach.
Is there a way to do this?
Just use slapo-pbind.
-- Howard Chu
CTO, Symas Corp. http://www.symas.com
Director, Highland Sun http://highlandsun.com/hyc/
Chief Architect, OpenLDAP http://www.openldap.org/project/