Access control using LDAP


 
Thread Tools Search this Thread
Operating Systems AIX Access control using LDAP
# 1  
Old 03-18-2010
Access control using LDAP

Hello,

I've configurated a LDAP user authentication on AIX V6 against Active Directory (Windows Server 2008).

The Tree is built as follows:

test (DC)
|--- testgroup (group with members: user1, user2)
|
|--- sys1 (OU)
| |--- sys1group (group with member: user1)
|
|--- sys2 (OU)
| |--- sys2group (group with member: user2)

How is the LDAP Client to configurate that only members of sys1group have access to the AIX system?

I do NOT want to: - change the /etc/security/user file
- move user1 to OU sys1


I have set the groubasedn to dc=test in the ldap.cfg (not to cn=sys1group,ou=sys1,dc=test) because the testgroup should be also detected.

Is there the posibility to set a path to a group which is only used while authentication to grant access to the members?
There are also the parameters hostbasedn and authbasedn in the ldap.cfg but I don't know how to use them.

Has anyone an idea?

Thank you in advance.
Login or Register to Ask a Question

Previous Thread | Next Thread

10 More Discussions You Might Find Interesting

1. Proxy Server

How to use Squid on Linux to control certain IP to access Web Server and certain IP cannot access?

Dear all experts here, :) I would like to install a proxy server on Linux server to perform solely to control the access of Web server. In this case, some of my vendor asked me to try Squid and I have installed it onto my Linux server. I would like know how can I set the configuration to... (1 Reply)
Discussion started by: kwliew999
1 Replies

2. Red Hat

Authentication for USB Access from ldap server as centralised

HI All, Kindly help me to configure the ldap server which is used to authenticate my all cleints from usd access..I need to block all the usb access to the clients... RHEL5.4 (1 Reply)
Discussion started by: selvaforum
1 Replies

3. UNIX and Linux Applications

User Based LDAP Client Access

Hi everyone, I am not that familiar with LDAP advanced contents. But since it is a popular secure tool for authentication, I preferred to user RedHat LDAP. The organization has 5 organizational units. There are 3 client servers and I want to limit each client to access different users. So, I... (3 Replies)
Discussion started by: royalliege
3 Replies

4. UNIX for Dummies Questions & Answers

eTrust Access Control

Hi, I am using eTrust Access Control at work. I have got no output after type checklogin. I wonder what is the reason. Does anyone know? Thanks eTrustAC selang v8.00a-1555.13 - eTrustAC command line interpreter Copyright (c) 2006 CA. All rights reserved. eTrustAC> checklogin user1... (0 Replies)
Discussion started by: uuontario
0 Replies

5. UNIX for Dummies Questions & Answers

Internet Access Control

I need to control intenet access @ work. xample. I need PC 1 to only be able to access these five sites and add to the list as needed. Can anyone pint me a direction. (1 Reply)
Discussion started by: fruiz
1 Replies

6. UNIX for Dummies Questions & Answers

Does U*X have Access Control Lists?

In OS like windows, I can define an Access Control List (ACL) and specify which accounts and groups have what access to a specific file. I assume U*X, Linux and cygwin on windows have this ACL feature too. I'm using cygwin on windows. What do I type at a bash prompt to allow a specific user... (1 Reply)
Discussion started by: siegfried
1 Replies

7. Shell Programming and Scripting

Access Control List

Hey all, I have a directory (own by user: b; group: grpB) which I want a user (user: a; group: grpA) to be able to read and execute from, I wonder if I should add user a to this particular directory's ACL or that I would add group grpB to user a's subgroup? I would like to know the difference... (3 Replies)
Discussion started by: mpang_
3 Replies

8. UNIX for Advanced & Expert Users

LDAP Authentication for access to a folder

I am struggling with finding a way of securing a unix folder by controlling access to it by a LDAP Group. In simpler terms,I am looking forward to see a username password prompt,when a specific unix folder is accessed. That UserID and password ,should be authenticated by a secure directory (via... (1 Reply)
Discussion started by: sunmatts
1 Replies

9. UNIX for Dummies Questions & Answers

Access control Lists

Hi, I was wondering if someone could help me with ACL's. I have a file, say output, created by the root user, member of group other. Its permissions are rwxr--r--. I want only people in group other to have rwx access, but I also want one other user, stephen, member of some_other_group to have rwx... (1 Reply)
Discussion started by: sroberts82
1 Replies

10. Filesystems, Disks and Memory

Access Control

In Windows XP, there are 3 default access control groups namely: Administrators, Users and Power Users. Is there default access control groups in Unix system? If there is, what are they? newbie. (1 Reply)
Discussion started by: zertoir
1 Replies
Login or Register to Ask a Question
UD(1)							      General Commands Manual							     UD(1)

NAME
ud - interactive LDAP Directory Server query program SYNOPSIS
ud [-Dv] [-s server] [-d debug-mask] [-l ldap-debug-mask] [-f file] DESCRIPTION
ud is used to interogate a directory server via the Lightweight Directory Access Protocol (LDAP). OPTIONS
-s server Used to specify the name of an LDAP server to which ud should connect. If this flag is omitted, the value specified in the ud configuration file is used. If no value is specified in the configuration file, or the configuration file does not exist, the name ldap is used. Of course, it is up to the system administrator to make sure that the name ldap can be resolved (presumably through the use of a CNAME or A record in the DNS and the appropriate search path specified in the resolver config file). -d debug-mask Sets the ud debug mask to the value specified. Values for the mask can be dumped by using the -D flag. -f file Sets the configuration file to the name specified. -l ldap-debug-mask Sets the LDAP debug mask to the value specified. -v Turns on verbose output. Also toggable via the ud verbose command. -D Prints out a list of valid ud debug masks. FILES
/etc/openldap/ud.conf The ud configuration file. SEE ALSO
ud.conf(5), ldap.conf(5), ldap(3) DIAGNOSTICS
ud will try to be nice about error conditions, and in most cases prints a warm and fuzzy error message when it encounters a problem. Some- times the error will be unexpected, and in these cases, ud uses the ldap_perror() routine to print an informative diagnostic. BUGS
Too numerous to mention. AUTHOR
Bryan Beecher, University of Michigan ACKNOWLEDGEMENTS
OpenLDAP is developed and maintained by The OpenLDAP Project (http://www.openldap.org/). OpenLDAP is derived from University of Michigan LDAP 3.3 Release. 4.3 Berkeley Distribution 20 August 2000 UD(1)