


Directory Service Implementation From Scratch? 149
An anonymous reader writes "I work at a small but growing startup company. Currently, our directory and authentication information is scattered across many systems and wikis, and is becoming increasingly difficult to manage. We are looking at centralizing this information in a directory service to minimize administrative overhead as we continue to grow. The service must support basic directory searches, as well as user authentication for Linux and Windows hosts. Although we are primarily a Linux shop, there are a handful of Windows systems that will be on a Windows Active Directory domain. Most directory servers seem to support integration with other directory servers, however it seems like it may be easiest to just use Active Directory for everything. Are there any pitfalls with this approach? If you had the chance to redesign your enterprise directory service without regard for legacy services, how would you do it?"
Easy (Score:3, Informative)
Use AD.
Even though folks will fuss and whine about AD being not pure LDAP, for all intents and purposes it is, and we've got lots of Linux and other *nix boxes using it for authentication. And remember, you can always extend AD for your custom applications easy enough. It's simple enough that MCSEs can run it.
Re:Easy (Score:4, Informative)
This. AD's management tools are brutally efficient and understandable. The newest versions of Samba+KB5 make it trivial to authenticate *nix systems against it and have fully integrated, cross-platform user & privilege management with consistent uid's/gid's across all hosts. Assuming you throw the right amount of resources at it (at least 2 AD servers per tree in the forest, per site), and take advantage of the DDNS services, you'll have a really scalable, easily managed infrastructure for years to come.
Re:Easy (Score:4, Informative)
It's hard to argue against AD - even in your situation where the Microsoft boxes comprise the minority of systems.
Re: (Score:3, Informative)
While Unix boxes can authenticate to an Active Directory domain through the use of Samba and derivatives, the advantage of these services is that they can extend the LDAP schema with NIS attributes to provide native NIS authentication, and also, extend SMB sharing with NFS support to provide native
Win2k3 R2 (Score:2, Interesting)
Windows 2003 R2 has (virutally) the same IDMU as Win 2008.
I have implemented such a mixed environment, with one problem. As I pointed more and more liunx boxes at the AD running IDMU, the number of internal connections from the AD server to it's own LDAP port increased until they were all tied up. It got so the AD server could not even read its own global policies.
I had to implement a Linux NIS slave and point all of my Linux boxes at it instead of the AD server.
Re: (Score:3, Informative)
I'd just like to point out that while you CAN use NIS with SFU and the like, unless its an old machine without Kerberos support and without NSS support, you really would want to use kerberos and nss_ldap to connect to an AD server with SFU installed. If you have old machines, sure, shoe horn them in with NIS, thats what its there for, but you should avoid it if possible, NIS is horribly insecure. The plus side of using kerberos is that no syncronization is required, AD will sync its kerberos server passwo
Re: (Score:2)
Last time I used SFU was many years ago, but effectively I had some serious trouble installing it on a Windows Server 2003 box that was only setup weeks ago and was for all good and intent vanilla. It culminated in having to do several modifica
Re: (Score:1)
One thing to remember is to use Group Sharing [udel.edu] when setting folder permissions on the *nix box. That was an easy one to overlook until users started asking why they couldn't open each others files!
Re:Easy (Score:5, Insightful)
Use AD.
Even though folks will fuss and whine about AD being not pure LDAP...
You're not a developer, are you? Whether or not AD is a dream to work with depends heavily on what your job description is. If you are simply an administrator plugging random Windows or even Linux and *nix boxes into AD you might find it comparatively easy. If on the other hand you expect to have to develop custom applications of your own on non-Microsoft platforms that authenticate against AD or convert existing ones to use AD then it can be a painful experience to use AD. It's not an unsolvable problem mind you, just a really annoying one.
... It's simple enough that MCSEs can run it.
So is RHDS / Fedora Directory Server. I knew exactly nothing about LDAP or directory servers when I got my first directory server related project years ago. I still I got the thing set up and running inside of a couple of hours. Even an MCSE should be able to manage setting it up, hardening it and administrating it in a very short period of time.
Re: (Score:2)
Re: (Score:3, Funny)
You can LDAP query AD like my moped can race in the Indy 500.
Re:Easy (Score:4, Interesting)
Microsoft Hostility (Score:3, Insightful)
Uh huh. So what's wrong with AD?
Microsoft seems to design their protocols to be as hostile as possible to 'other' OSs (without being openly anti-competitive). This is good for their business plan but bad for users. A side effect of this is (like another comment in this thread noted), that it's really difficult to expand the system beyond what Microsoft wants you to be able to do.
Given that you're using mostly 'other' operating systems, I think it would be a big mistake to make the bulk of your systems beholden to a hostile mistress.
Re: (Score:2)
You're not a developer, are you? Whether or not AD is a dream to work with depends heavily on what your job description is. If you are simply an administrator plugging random Windows or even Linux and *nix boxes into AD you might find it comparatively easy. If on the other hand you expect to have to develop custom applications of your own on non-Microsoft platforms that authenticate against AD or convert existing ones to use AD then it can be a painful experience to use AD. It's not an unsolvable problem mi
Re: (Score:2, Insightful)
Authenticating against AD is hard? I didn't realize that, I mean, I've been writing apps that authenticate against kerberos since before AD existed, and since those same apps authenticate against ActiveDirectory the exact same way, I must have missed the hard part.
Hard to authenticate against AD, WTF are you talking about? Do you know how it even works? If you're using some retarded fucking bind against ldap for verifying authentication to your apps? If you use the bind to allow the user to authenticate
Re: (Score:3, Interesting)
Re: (Score:1, Interesting)
The problem with AD is lock-in. Once you deploy AD, you will never be able to switch to another directory product, as Microsoft software dependency creep will ensure that no other product can operate as a drop-in replacement.
If you only have a few Windows machines, use a standardized solution and live with loss of MS-specific functionality. If you deploy AD, you'll soon find yourself locked in, and the investment in MS-only technology will only keep growing.
Re:Easy (Score:4, Insightful)
To someone equally fluent in both OS and MS systems, sure, an open source solution is fine, probably even superior. But the business case for using MS software is undeniable.
Re: (Score:3, Interesting)
The other thing you can consider is whether to split the directory services and the authentication.
At my last job we did the following:
- Use Windows AD for all windows machines
- Use NIS for passwd, group, automounter maps... everything but authentication.
- And then key the Linux machines to use Kerberos off the Active Directory
Now if I was doing it again, I'd do the following:
- Use Windows AD for all windows machines
- Setup up a UNIX/Linux based Kerberos domain that "trusted" by the AD Kerberos
- Use NIS, NI
NOT AD because of hidden complexity. (Score:2)
Just go with AD (Score:4, Informative)
I really hate to say it, but I think Active Directory is most definitely the way to go. No other directory systems allows for as simple administration of a large number of windows computers, your windows clients will "Just Work" with it, and it isn't difficult to make windows boxes, wikis, etc authenticate against it (I've had to do this many times...).
Active directory lets you access it via LDAP which a lot of software packages understand (a note here, structure the LDAP binds such that the username is in the form of SAMACCOUNTNAME@WINDOWSDOMAINFQDN, this has worked almost every time for me).
The free version of Likewise Open will make it very easy for the linux boxes themselves to authenticate against AD without having to mess with any pam conf yourself, and if you pay them money you can even deploy GP's to linux boxes (disclaimer, I've never tried this part).
In sum, while I hate to say it, you can make almost any client solution work with AD either directly or via LDAP or Kerberos, and it's the best possible solution for windows client management, so I'd go with that.
Just my .02
Re: (Score:1)
Twilight Zone? (Score:5, Funny)
Wow.. did I wake up in another dimension? Are slashdotters actually recommending MS products today??
Re: (Score:3, Interesting)
AD and OpenLDAP are like first cousins.
big difference is Open LDAP you have to create your schema. with AD Microsoft did the work for you and upgrading is easy. if you first deployed AD with Windows 2000, upgrading to later versions of windows and AD apps is easy. MS ships ldif files with any of their apps that extend AD with new classes and objects that do this automatically. saves you a lot of time.
Re: (Score:3, Informative)
Re:Twilight Zone? (Score:4, Insightful)
Wow.. did I wake up in another dimension? Are slashdotters actually recommending MS products today??
But of course - did you not realize that the majority of slashdot readers are microsoft windows users?
Re: (Score:1)
but what about the majority of slashdot _writers_?
Re: (Score:2)
but what about the majority of slashdot _writers_?
They don't use Microsoft or Linux. The monkeys all have Remington typewriters, and we feed them bananas, Jolt cola, and yesterday's pizza.
Re: (Score:3, Funny)
Ohhhh Barnacles! It's Backwards Day!
Re: (Score:2)
Re:Twilight Zone? (Score:5, Insightful)
Not really, you can make OpenLDAP have the required schema for windows.
Of course, then you need to add a kerberos server since OpenLDAP doesn't do that.
Then you need to add Samba so you can get the RPC calls that go along with Windows Clients.
Its not that it can't be done, its that its just FAR easier and more reliable to just pay the money for Windows.
Re:Just go with AD (Score:5, Insightful)
I've looked into LDAP/Kerberos authentication for my home LAN several times, and basically given up every time. There appears to be a software mix that will do the job, but each piece needs to be configured *just so* in order to work with all of the others. Furthermore, there appear to be a few people out there who really know their stuff, and to them I'll bet this is all easy.
But it appears that those people all work for companies that sell Directory Server services. They're quite willing to be helpful on specific questions, but the overall integration is still not well documented, from what I can see. As near as I can tell, it's like the Bad Old Unix days, when everyone wanted to be The Solution - for a price. I haven't really looked at the RedHat Directory server or similar products, wishing to use the pieces, and wishing for integration documentation.
Why this on a home LAN? For some odd reason, I've tried to run my LAN on industrial-strength software - BIND, ISC DHCP, etc. I'm used to single-sign-in at work, and would really like it at home, given that $HOME is shared over NFSv4. I also usually am too busy doing other things, which is another reason why there's been no progress in years.
Maybe an integrated OSS Directory Server will make it into my house, but there's no way I'm footing the bill it would take to add AD, here.
Re: (Score:2)
Re: (Score:1)
What linux distro do you use?
Try Likewise Open. I know it works for more, but for ubuntu, it's this easy: https://help.ubuntu.com/8.04/serverguide/C/likewise-open.html [ubuntu.com]
It's seriously 2 commands to join it to a windows domain.
Here's what I'm trying at home this summer (Score:1)
I have felt your pain. I just got my used copy of Distributed Services with OpenAFS: for Enterprise and Education [amazon.com] and it looks pretty awesome so far.
It's a textbook of explanations wrapped around a whole bunch of script(1) captures of them setting up ntp,dns,k5,ldap,openafs,samba, etc on Debian with Windows, Mac, Ubuntu clients. You can find the table of contents and an excerpt at the book's site: http://www.springer.com/computer/programming/book/978-3-540-36633-1 [springer.com]
hth and Good Luck!
adric
Re: (Score:1, Interesting)
The main pitfall is to be careful about the MS licensing rules for AD. You essentially need a CAL for EVERY USER in your directory, or some of the crazy very expensive CALs. This is no big deal if you already have CALs, but it would be insane to use AD for something where the users accessing the server are not employees of your company. The licensing costs would become crazy when compared with something open source.
Re: (Score:2)
Re: (Score:2)
MS is pretty clear, any connection to a Windows server requires a CAL, period.
Re: (Score:2)
Let me restate. Any client that makes a connection to a Windows server requires a CAL to access the server. Its not per connection in most cases (is in some though!), but if you're connecting to a Windows server, you need a CAL to account for it somewhere.
Windows server web edition has some allowances to keep the CAL count lower, but since it doesn't run AD its not part of the discussion here.
Brokenware (Score:2)
It's just another dimension of Microsoft's brokenware mentality. They design a product, then they break it before selling it to you so they can sell you an upgrade to a working version. CALs are the server equivalent to the PC/workstation scenario. They don't provide different versions of Windows with different capabilities. They do provide different versions of windows intentionally broken to different degrees. They're creating an artificial feature set that they can up-sell later.
It's diabolical, rea
Re: (Score:3, Informative)
The licensing for Windows Server doesn't necessarily have anything to do with the size of the directory.
With Server 2008, you have a matrix of options. You can choose whether you want to count licenses by computers or users by the type of CAL you buy (Device or User). Then, you can choose whether you want to license the number of simultaneous connections to a single server (per-server) or by the number of discrete users or devices that have accessed any server (per-user or per-device). Clearly, if you only
Re: (Score:2)
It's been a while since I've looked at Windows licensing, and they do tend to change things from version to version, but I seem to recall that MS offers two client/connection licensing models (which are mixable): per-server or per-client. At the least, Windows Server only tracks licenses by concurrent connections to the server in per-user licensing. They might also offer a per-domain model.
It's all pretty convoluted, I'll give you that.
Novell.......no seriously (Score:4, Insightful)
Re: (Score:3, Informative)
+1 On Novell's IDM, it is *hands downs* the best Directory Services product out there.
Though if you don't want to spend the bucks for it (it's worth it, seriously), I would recommend just using AD.
As others have said, AD just sort of works, and everything can interact with it.
I'd personally recommend it over SAMBA/OpenLDAP, as I've beat my head against the wall one too many times trying to use SAMBA/OpenLDAP as a Windows Domain. It's just not worth the time or frustration.
Re: (Score:3, Interesting)
and +1 for eDir from me as well.
I have a blackbelt in directory management (AD, eDir and OpenLDAP)
eDirectory has a nasty habit of being virtually unkillable and is by far and away the most flexible. With 8.8 you can run multiple trees on a host (in MS speak think of multiple domains on a single DC) No waste of a system to just do DC duties for one bit of your system.
If you want the most powerfull directory option then use eDir as your metadirectory and then use IDM to populate other directories and applic
Re: (Score:2)
Re: (Score:2)
Second!
If you're not going with a F/OSS DS, eDirectory is the product to buy. By itself it's great, with Novell's other tools it's even better. And it supports Windows clients, so no trouble there. If you're thinking "A directory server is a directory server, AD is good enough"--DON'T think this. There is such as thing as better and eDir is it, vs. AD or OLDAP.
My choices (Score:4, Informative)
2.) Active Directory
3.) OpenLDAP
4.) Novell eDirectory (personally my least favorite)
I would probably jump for RHDS first, then AD. The only problem with OpenLDAP might be getting a similar level of support to the first two. Support is exactly why I would never choose eDirectory. I have (personally) had abysmal experiences dealing with Novell. Others may disagree though. And of course there probably are other options.
Re: (Score:3, Insightful)
would it not be possible to configure a single server, that proxies or delegates queries to all the other servers he has set up.
I asked about proxying openLDAP to AD, so I could have users in both, yet query them all just by asking the openLDAP server. If this was possible for multiple delegated servers, then this is the approach I'd take - start with 1+all the old ones, then gradually migrate them into just a few servers.
and yes, I'd probably go for RHDS, Active Directory seems to be one of those products
Re: (Score:2)
would it not be possible to configure a single server, that proxies or delegates queries to all the other servers he has set up.
I asked about proxying openLDAP to AD, so I could have users in both, yet query them all just by asking the openLDAP server. If this was possible for multiple delegated servers, then this is the approach I'd take - start with 1+all the old ones, then gradually migrate them into just a few servers.
and yes, I'd probably go for RHDS, Active Directory seems to be one of those products that starts off with just a windows 2008 server, then requires more CALS, then needs a SQL Server licence, and then really expensive backup software, and then needs all printers to be connected to it, and then needs Sharepoint adding to the mix, and then... you get the idea :)
OpenLDAP has a few backend plugins that let you do crazy stuff like that, more specifically, the LDAP backend lets you run a proxy to AD (or any other directory that can talk LDAP). Set that up, map a few attribs or get the AD schema on OpenLDAP, and you should be good to go. You can also sync to AD, so if your link to it goes away the data is still local. OpenLDAP has come a long long way in replication, and it works quite well now, much better than even just a year ago. Set one server up with your data, t
Re: (Score:2, Informative)
SunDS, FDS and Novell eDirectory are all based on Netscapes DS,
FDS and RHDS are the direct descendants of Netscape DS, which was purchased by AOL and then by Redhat who then Open Sourced it.
Re: (Score:3, Informative)
SunDS, FDS and Novell eDirectory are all based on Netscapes DS,
Uh, eDirectory is the current name for NDS, which came out with Netware 4 in 1993, before Netscape was even a company.
Re: (Score:1)
eDirectory AKA NDS was based on X400 as I recall. I remember using it in 1993, before Netscape was formed - "Netscape stock traded between 1995 and 2003" - Wikipedia
Re: (Score:2)
SunDS, FDS and Novell eDirectory are all based on Netscapes DS
Timeline issues notwithstanding, I think you're confusing Novell Directory Services and Netscape Directory Services. The former came before the latter, although they both have the same acronym.
Re: (Score:1)
Re: (Score:1)
>>4.) Novell eDirectory (personally my least favorite)
Why? Have you actually used it. How does it compare to your other options?
Re: (Score:2)
My experience with Novell have tended to yield the result that their software can and does work, but you can't rely on their phone support for anything. I've actually had them tell me a file on a sles server wasn't part of their distribution, which I countered with a couple rpm commands; to me that's just a sad thing to di
A side benefit of Active Directory: (Score:2, Insightful)
Re: (Score:2)
I'd question the logic in apply fruity open source solutions to a startup. A Microsoft Small Business Server is relatively cheap (£800 for first 5 CALs, then around £60 for additional users) and provides pretty much everything you'd need for e-mail, groupware and server functions. It can be supported by any competent local computer shop.
Open source for a startup or small business pretty much guarantees that you'll need a highly skilled systems administrator from the outset. When y
AD (Score:2, Informative)
Microsoft has really done well with developing AD.
It's just honestly the best product out there currently.
Re: (Score:1, Flamebait)
That sound you just heard were a thousand fanboys lighting their flamethrowers.
Re: (Score:2)
Too bad it's $700 to get started.
Re: (Score:2)
You have got to be kidding.
AD is best only if you mean it's easy for a monkey to do the initial setup. If you want robustness, scalability and maintainability you will find nearly everything else is better.
389-ds (Score:1)
Support (Score:3, Insightful)
You can configure a Samba server against LDAP and have everything authenticate agaist that. Your biggest pitfall is going to be finding support for the configuration. You have to consider "what if the IT Admin get's hit by a bus, who's going to support this configuration". With Active Directory you can flip open a phonebook and find a dozen local places that will support it; that's not the case with the Samba/LDAP configuration.
Re: (Score:2)
No Linux support? What do you live in the middle of the Sudan?
I live in one dinky little town and one phone call I would have a Linux Engineer on site
in under 60 minutes.
Re: (Score:1)
Find someone to come in and tell you,
"Ah, we can fix this. We'll just replace it with an MS AD server. Oh wait, you want to keep this? Why ever for?"
Those are a dime a dozen. Well ok, considerably more than a dime. But they make themselves sound soooo wonderful...
Try FreeIPA (Score:1)
http://www.freeipa.org/
AD is what MS got very very very close to "Right" (Score:2)
Ad is very nice, we use it for Auth in a mixed env as well. I work in QA, the way that I've actually got mine setup is ADS run by Corp, FDS run by QA. FDS has Pass Though Authentication turned on.
You may want to checkout Fedora Directory Server and FreeIPA combo for linux/unix solutions
Start with SQL (Score:3, Interesting)
Yes, SQL. If you keep your raw data in SQL, it is easy to export data to any format you might need now or in the future. LDAP gets you a long way, but you will sooner or later end up with several apps that don't support it. The result is horrible password sync hacks, multiple passwords per user, etc.
The idea is to put raw user info in SQL, including their clear-text password. Of course, lock down that SQL server like you've never locked down anything before! It should have a very limited interface for updating user data. Next, export user data to relevant external databases such as LDAP, NIS, SASL, that obscure sqlite app, Kerberos, DMZ services, etc, and you'll have much less pain keeping everything in sync.
An implementation of this scheme is running on many of the biggest universities in Norway, and is called Cerebrum, http://www.cerebrum.usit.uio.no/english.html [usit.uio.no]. User administration happens through a frontend interface appropriately named BOFH, where users and admins can change data in a secure manner. Users can change certain of their own attributes, while admins have more power. It's worth checking out (although their sf.net wiki seems to be down at the moment, unfortunately).
Re: (Score:2, Interesting)
+1 to this. Extremely flexible.
We do all of this, except for plain text passwords in tables.
We highly recommend encrypting, or completely eliminating, plaintext passwords. Instead, create and store the required hashes (ssha, etc.) for various bits and pieces when you create a user, or the user changes their password.
Who came up with the Cerebrum logo? (Score:2)
Looks like these vagina pictures you find in the gents rooms worldwide.
Yes, I realize it's supposed to be a brain, but just saying, just saying..
Re: (Score:3, Insightful)
Yes, SQL. If you keep your raw data in SQL, it is easy to export data to any format you might need now or in the future.
slapcat > myldaptree.ldiff
Done. You now have an Ldiff file that can be re-imported directly, or parsed quite easily, not sure why Exporting seems difficult?
LDAP gets you a long way, but you will sooner or later end up with several apps that don't support it. The result is horrible password sync hacks, multiple passwords per user, etc.
gssapi/SASL, or if its a horribly broken ap that doesnt do that either, its trivial to write an authorize/authenticate plugin for it, just about everything supports LDAP though, or "AD" which is usually LDAP with the MS schema in mind that can be bent to use a normal LDAP directory instead. Password sync (to get the broken NT4/LANMAN and KRB5 pas
Choose AD (Score:1)
Re: (Score:2, Insightful)
>>All of hte other solutions require massive hand holding
Your experience of these is what exactly?
Personally I'd use eDirectory. I have 15 year experience of eDir, AD and OpenLDAP. My experience of eDir is that it is worth the cash compared to the rest.
emoticons (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Hear me out (Score:5, Informative)
Its going to sound like blasphemy here on slashdot, but I strongly recommend one master ActiveDirectory server with Services for Unix installed. You can manage everything from the nice pretty windows GUI, have perfect windows support and using pam_krb5 and nss_ldap (I use them in FreeBSD, I believe both of which were originally for linux, not sure they would be the best for it) for pulling all your user information from AD. Services for UNIX adds tabs to the important objects in the ActiveDirectory UI to let you edit the unix attributes.
Combine nss_ldap, pam_krb5, sasl with kerberose auth, and samba 3 or newer, the kerberos auth module for Apache and you can have complete and total authentication based on ActiveDirectory with a very nice GUI, and you can still use standard ldap tools to work with the directory if you want. Samba will do kerberos with windows beautifully at this point, just make sure you keep eveything time synced. Even does all the 'single signon' stuff for websites.
You end up using a great authentication mechanism on your unix AND windows hosts (kerberos is king). The only catch that may or may not apply to other OSes, but it definately bit me in FreeBSD 6, FBSD wants to use UDP for all its kerberos communications which is normally fine, but once you get a user with a large collection of kerberos data, in my case, lots of groups either directly or via nesting, then the packets become too large for a single UDP datagram and FBSD is too stupid to switch to TCP on its on. My solution was simply to block all UDP port 88 requests in and out of my FBSD boxes so they immediately fail over to TCP (not, you have to return ICMP errors, not just drop packets or it'll just hang as it doesn't know the packet can't be sent).
Not sure if Linux's kerberos implementation supports forcing TCP in krb5.conf. FreeBSD is SUPPOSED to, but older version certainly don't.
I know that no one likes MS and thinks they are evil, but I've been VERY happy using AD. We have two Win2k3 machines that serves ActiveDirectory, basically a primary and backup domain controller in the old MS NTDOMAIN language. Works awesome. If you throw in the MS certificate server on your AD server, then you also have a nice way to make internal SSL certificates with full revokation support and all that neat stuff so you can make internal certs all day long and the since your Windows machines are part of the ActiveDirectory, it pushes its root cert to all your windows boxes meaning you don't have to do crap to make them fully authenticated certs for your windows machines.
With far less effort than any other directory server you can have full single sign on support, good authentication, and an easy to use interface in which you can delegate control to various folks outside your IT department and let them use the AD manager for windows (on xp or whatever) to manage the department they need to if you want. You can auth pretty much EVERY modern OS this way. Hell if you want to you can run the servers on Unix (OpenLDAP/MIT Kerberos) for backup or for serving client requests and just isolate the windows machine as the master if you want.
Okay, now I sound like a total fanboy, please don't hate, but it really is a good setup. The main reason being, from my point of view, the setup and most importantly, the administration of ActiveDirectory and Services for UNIX are FAR above and beyond anything the F/OSS world offers. Sad, but true. I imagine you could probably get good support from Novell eDirectory as its tools are pretty good when they work, haven't used them since 6.0 when all their Java apps were asstastic, but I was only admining the leaf node of a tree with a few hundred thousand accounts in it (State of Georgia was using eDirectory a few years back, all their employees are in it, may have changed by now), so it may work better in smaller setups. All things considered it didn't do bad there, was just far too slow for editing my own subtree as we had to wait on updates to be pushed back up the tree bef
Re: (Score:2)
FreeIPA, Apple OD, Gosa2, Novell eDirectory, FDS (Score:2, Informative)
I am with this task as well.
Since we need to support Kerberos, I had some difficulties to install OpenLDAP and manage the Kerberos and integrate with Samba and AFP.
Our servers are 80% Linux and 20% Windows,.
Our clients are 90% Mac, 9% Windows and 1% Linuxes
I have messing with the follwoing solutions without much sucesse. They are all good, but they are NOT READY yet. Maybe Novell eDirectory, but I think it is too big and kind of expensive.
I really don't like Microsoft, so we are avoiding AD and avoiding sup
Re: (Score:2)
There is also:
Apache Directory [apache.org]
Sun OpenDS [opends.org]
Re: (Score:2, Interesting)
Yikes, I'm replying to an AC.
Mac OS X and Server are now virtualizable in recent Vmware Fusion and Parallels installs (at least). Although there were technical and legal challenges to parallelizing OS X installs, these have apparently been surmounted.
Now I just need more RAM.
If you want to use kerberos... (Score:1)
If you want to use kerberos you'll need to avoid Active Directory -- it does not play well with others. AD is a decent directory server, but the "kerberos" implementation muxes authorization and authentication and will not work with external kerberos servers at all.
On the other hand, AD does play very well with Windows desktops -- it is the only way to use certain administrative functions in Windows -- and is perfectly suitable for password-based authentication against the directory sever from any platform.
Re: (Score:2)
Nah! (Score:1)
" it seems like it may be easiest to just use Active Directory for everything. Are there any pitfalls with this approach? "
No no no.
Go do samba+ldap and THEN you have BOTH windows and a linux directory. You might hear something about "group policies" and other crap, thats treated in-depth in the samba howto: you CAN deploy policies with a smb pdc to winxp-2k boxes without too much problem (youll need a cheap version of win2k and ads with minal cals to get the admin gui for that, but in no way should you pay
Re: (Score:2)
Don't forget that you'll actually want kerberos for authentication. If you're using ldap for the authentication part, you're doing it wrong, sorry. Obviously there are those situations when the app doesn't support kerberos, but if it does and you're not using kerberos, you're doing it wrong.
No AD for me thanks. (Score:1)
In a high availability situation I would never trust AD to work with my nix machines. All it takes is Microsoft to make one change in the code and an admin to apply a patch to the AD servers and your nix machines can all be sitting their twittling their thumbs. Then you are stuck hoping that Microsoft wants to fix the problem. Mean while management will be sitting their blaming your nix machines and thinking it is better to go all windows. If your shop wants to go all windows do it based on a buisness requ
Re: (Score:2)
Do you have any documented cases of where what you are scared of has actually happened?
The closest I've seen was the battle between Novell and Microsoft back in the mid-1990s. On NT4 workstations, every time a new service pack would come out, the Novell networking client would stop working and you'd have to revert to Microsofts "Client for Netware Networks". After six months or so, Novell coders would catch up, release a new version of the client, and then life would be good again... up until the next ser
MDS - Mandriva Directory Server (Score:2, Informative)
The comments are interesting (Score:2)
I notice that whenever someone recommends sticking with Active Directory, they apologies for recommending it.
It's amusing because they're apologizing for recommending the best solution in this situation, which is EXACTLY what a good commenter should do. They have nothing to apologize for, and so I guess their apologies are more for the fanboys than anyone else who cares about a good result.
Just admit it - OSS doesn't always work, so making a suggestion which involves using Microsoft technologies is nothing
Directory services (Score:2, Interesting)
I have a pretty long history of this, and I have set up a couple of major implementations (1,000,000+ objects) so I'm putting in my 2cents.
I started with Novell's NDS in 1993 (yup, I was a beta tester) and so I am pretty oriented towards that product. Other Directory Service products I have managed include AD and eTrust. I am still most impressed with Novell's product, and for good reasons. AD is really an LDAP interface into a distributed registry. It is not really a full X.500 di
Re:Stick with OpenLDAP ... (Score:4, Insightful)
First off, AD does provide LDAP services, it is ActiveDIRECTORY after all.
Second, every OSS app out there pretty much lets you modify the schema it expects from the server, meaning making it talk to an ActiveDirectory server is just a matter of properly setting up the schema. Hell most apps now days already have an example config for talking to a stock ActiveDirectory, but you're better off with AD + Services for Unix so you get AD and Unix UID/GID administration in one pretty point and clicky interface.
Other than having a more flexible schema, since it doesn't assume you need to talk to windows, its inferior to AD in just about every other way, excluding price, where of course it beats the shit out of AD :)
If your last two startups were made easier by not using AD, you have incompetent admins who don't actually understand ldap or kerberos.
With openldap you get a directory, which CAN be used to authenticate, but thats not what you should be doing. Kerberos is accepted everywhere as the best authentication system to use in an organization, hands down, Unix OR windows. With AD you get both. Which means instead of using your crappy 'bind to auth' or 'bind as someone then query to auth' and 'hopefully we remembered to use SSL everywhere that needs auth', with AD you get LDAP + kerberos for auth, best of both worlds.
AD allows you to manage users with those same applications, host or web based as it support LDAP perfectly so OpenLDAP doesn't have anything on it there.
Fourth, you can just make samba join your activedirectory server instead of making it pretend to be one and dealing with all the quirks that goes with that if you have anything beyond the most simple of setups.
Want samba to join ads? Install samba 3 or newer, install a time sync utility if you don't already have one, type:
net ads join
Follow prompts, done.
Go the next step and tell samba to generate a keytab for kerberos for you and be happy as now you can start using kerberos for other services rather a cobbled together bunch of hacks to bindauth or queryauth off the ldap server.
Me thinks you don't really have any actual experience with or an idea what AD is. AD is NOT NTDOMAINS, even though an AD server is capable of providing backwards compatibility, it is not required and if you're using not using anything older than XP and unix machines it should be turned off.
OpenLDAP is only a partial replacement for ActiveDirectory, and really is the WRONG way to do authentication. MS didn't invent kerberos, but switching to it was one of those 'Okay, you win, we're on the bandwagon with your protocols' moments that you should actually thank them for and look into. Stop hating and educate yourself.
What OpenLDAP wins at, hands down, is of course, cost. But its really silly to say that its more flexible or more reliable (which, btw availability and uptime mean the same thing here).
Do you want to use a bunch of hacks to make your windows machines authenticate, or would you rather use a system that supports everyone natively and completely, Windows AND Unix (including OSX)? Personally I went with AD so I can just do everything natively, with Services for UNIX the thing will even function as a NIS (maybe NIS+, I don't use that part) server if you've got old boxes that you need to pull into the group.
Re: (Score:2)
tastes like crow!
Seriously though, there are many people that read slashdot that actually have used most if not all of these different Directory solutions. They need to use them because they are professionals that help run companies, Directory Servers, as a class, are the only way to sanely manage anywhere from a couple dozen users and machines to hundreds or thousands of users and machines.
It doesn't matter whether it's OSS vs Closed Source or Microsoft vs Everyone Else, Once you have REAL experience wit
Re: (Score:2)
Bad form I know...
All that being said there are GOOD implementations of AD and there are BAD implementations of AD. LDAP/Directory Servers in general are complicated, it takes quite some time and experience to know how do a Good implementation with one. Same as everything else.
Re: (Score:2)
Why are you stuck with AD? Its not like you can't get an ldif export out of it to import into something else. If that something else only supports ONE set schema than its not different than AD as far as lockin. All the other reasons you are 'locked in' to AD are going to be things like 'well no one else supports that feature' that would be there if you started with AD or not. If willing to can truly afford to give up those features now to avoid MS than theres no reason the same wouldn't hold true later.
Re: (Score:2)
Wrong. OpenLDAP is the number one top performing directory software in the world, and has been since 2003. None of the other directory vendors have been refreshing their technology in recent years, and OpenLDAP is generally 2-3x faster than everyone else. 5x faster than AD typically. If you want performance, eDirectory is pathetic in comparison, and even Novell's engineers have admitted they can't get anywhere close to OpenLDAP's performance.
To the folks saying "ActiveDirectory is best of breed" - yeah righ
Re: (Score:2)
Sorry, the eDirectory info is based on personal communication from a Novell engineer. (But it's worth noting that OpenLDAP's libraries are also better tuned than anyone else's, and Novell now ships OpenLDAP's libraries, as do a number of other vendors.) The OID and SunOne results are from benchmarks performed for a customer's RFP, and unfortunately are confidential. But you can find comparable results here:
http://www.connexitor.com/blog/pivot/entry.php?id=130 [connexitor.com]
The FedoraDS codebase is still much the same as S
Re: (Score:2)
By the way...
http://www.networkcomputing.com/channels/security/showArticle.jhtml?articleID=199901451&pgno=5 [networkcomputing.com]
OpenLDAP is #2 to AD in the Fortune 500, all of the other vendors you mention are down in the noise.