10-04-2011
Centralized RBAC using Active Directory or (AD LDS)
Hi everybody,
I am working on the RBAC implementation on AIX 6.1 servers. There are quite a few servers and I would like the RBAC objects to be stored centrally in a LDAP database. It would be easier from the administration point of view. Has anyone ever been able to use Active Directory or Active Directory Lightweight Directory Services for this purpose ? The AIX user accounts are managed using AD and it would be much easier to have the RBAC roles in the same place.
Thank you,
Romi
9 More Discussions You Might Find Interesting
1. Windows & DOS: Issues & Discussions
Hi
Does anybody know the steps and requirements of the installation process of Windows Active Directory using Unix/Linux Bind DNS.
I will appreciate if somebody gives the answer. (1 Reply)
Discussion started by: Darwin Rodrigue
1 Replies
2. UNIX for Dummies Questions & Answers
Hello - I have a very vague question, which will probably result in vague answers because I don't have a lot of detailed information and I don't know a whole lot about active directory.
Our Windows/NT admin has been rolling out Active Directory over the past several weeks and as time goes on,... (1 Reply)
Discussion started by: rm -r *
1 Replies
3. UNIX for Dummies Questions & Answers
i would like to ask about unix with active directory..actually my situation is at ny place there already have dns server in unix based,i want to implement an active directory to the network..from what i read about active directory we have to used bind dns...some say that bind could not handle in... (1 Reply)
Discussion started by: nour
1 Replies
4. HP-UX
Hey,
I've asked questions about this project here before and gotten lots of help so I figured I'd give it another try.
I've recently set up my HP-UX environment to authenticate to a Windows Active Directory server (Windows Server 2003 R2).
I setup an account on Active Directory which works... (2 Replies)
Discussion started by: Rike255
2 Replies
5. IP Networking
Hello,
I am trying to authenticate through PEAP/mschap with freeradius 2.x and Active Directory.
I have followed this guide: Deploying RADIUS: Configuring Authentication with Active Directory
wbinfo works:
# wbinfo -a LOGIN%PASSWORD
plaintext password authentication failed
Could not... (0 Replies)
Discussion started by: sncr24
0 Replies
6. Red Hat
Hi Friends,
I need your help to get some solution of one of my problem.
Ours is a mixed domain. Most of the servers are windows and very little linux servers. We are using the MS AD for authentication. My problem is, I want to authenticate linux servers against AD. I donot want to use any... (1 Reply)
Discussion started by: arumon
1 Replies
7. Solaris
At the moment we are integrating LDAP in our environment.
Compared to Windows this process is much complicated and time consuming.
With Windows you had Active Directory and if you create a new server, you just add it to the domain and your finished.
Yes, I know Unix is not Windows.
Are there... (1 Reply)
Discussion started by: misterx12345
1 Replies
8. UNIX for Advanced & Expert Users
Is there anyone who is utilizing Active Directory (2008R2) for AIX user account management? If yes or if AD is possible with AIX systems, can you please share what to be done to get there?
Please advise. (1 Reply)
Discussion started by: Daniel Gate
1 Replies
9. UNIX for Beginners Questions & Answers
Hi,
How can we check users added through LDAP or AD. Users added through a group of AD or LDAP group. (2 Replies)
Discussion started by: Nishit
2 Replies
LEARN ABOUT HPUX
cmdprivadm
cmdprivadm(1M) cmdprivadm(1M)
NAME
cmdprivadm - noninteractive editing of a command's authorization and privilege information in the privrun database
SYNOPSIS
DESCRIPTION
is a noninteractive command that allows user with appropriate permission to add or delete a command and its privileges in the Role-Base
Access Control (RBAC) database, See privrun(1M) for more details on this file.
When adding a line to the database, sets fields that are not specified a default value. When deleting a line, the lines matching all the
given pairs will be deleted. That is, if all fields specified match, the entry will be deleted.
Appends a line as specified in pairs in the file.
Deletes a line as specified in pairs from file.
HP recommends that only the and commands be used to edit and view the RBAC databases; do not edit the RBAC files directly.
See rbac(5) for information on the RBAC databases.
Options
The following options are valid pairs for
command should include the full path name of the command. There can be one or more arguments following the command.
filename should specify the full path name of a file name.
Specifies the operation.
Specifies the object.
Specifies the real user ID
(ruid).
Specifies the effective user ID
(euid).
Specifies the real group ID
(rgid).
Specifies the effective group ID
(egid).
Specifies the compartment.
Specifies the privileges.
Specifies the PAM service name to reauthenticate under.
See pam.conf(4) for a list of PAM services.
Specifies the flags.
Note: You must enclose values that contain the space character, or any characters that may be interpreted by the shell, with single quotes.
For example, if the has one or more arguments, enclose them with single quotes:
Authorizations:
In order to invoke the user must either be root, (running with effective UID of 0), or have the appropriate authorizations. The following
is a list of the required authorizations for running with particular options:
Allows user to run
with options.
Allows user to run
with options.
EXTERNAL INFLUENCES
Environment Variables
determines the language in which messages are displayed.
International Code Set Support
Single-byte character code set is supported.
RETURN VALUE
Upon completion, returns one of the following values:
Success.
Failure.
An appropriate error message is printed on standard error.
EXAMPLES
The following commands add entries into the file:
The following commands delete entries from the file:
FILES
Database containing valid definitions of all roles.
Database containing definitions of all valid authorizations.
Database specifying the roles allowed for each specified user.
Database defining the authorizations for each specified role.
Database containing the authorization to execute specified commands,
and the privileges to alter UID and GID for command execution.
SEE ALSO
authadm(1M), privrun(1M), rbacdbchk(1M), roleadm(1M), rbac(5).
cmdprivadm(1M)