Authentication Options in Perforce



Similar documents
Avatier Identity Management Suite

System Administration and Log Management

Configuring Color Access on the WorkCentre 7120 Using Microsoft Active Directory Customer Tip

Cryoserver Archive Lotus Notes Configuration

MICROSOFT ISA SERVER 2006

Video Administration Backup and Restore Procedures

USER GUIDE. Lightweight Directory Access Protocol (LDAP) Schoolwires Centricity

Using LDAP Authentication in a PowerCenter Domain

Active Directory Self-Service FAQ

Configuring Sponsor Authentication

End User Configuration

Customer Tips. Configuring Color Access on the WorkCentre 7328/7335/7345 using Windows Active Directory. for the user. Overview

Lepide Active Directory Self Service. Configuration Guide. Follow the simple steps given in this document to start working with

Upgrading User-ID. Tech Note PAN-OS , Palo Alto Networks, Inc.

Configuring the Palo Alto Firewall for use with Juniper Steel-Belted RADIUS.

FaxCore Ev5 Database Migration Guide :: Microsoft SQL 2008 Edition

Avatier Identity Management Suite

NetIQ Advanced Authentication Framework - MacOS Client

escan SBS 2008 Installation Guide

Alcatel-Lucent Extended Communication Server Active directory synchronization : installation and administration

Compiled By: Chris Presland v th September. Revision History Phil Underwood v1.1

User Management Guide

Configuring User Identification via Active Directory

FaxCore 2007 Database Migration Guide :: Microsoft SQL 2008 Edition

Use the below instructions to configure your wireless settings to connect to the secure wireless network using Microsoft Windows Vista/7.

Manual Password Depot Server 8

Configuration Guide for Exchange 2003, 2007 and 2010

Quality Center LDAP Guide

In this topic we will cover the security functionality provided with SAP Business One.

ThinManager and Active Directory

Active Directory Integration

Creating Home Directories for Windows and Macintosh Computers

Administering FileVault 2 on OS X Lion with the Casper Suite. Technical Paper July 2012

Quick Start Guide. Hosting Your Domain

Managing User Accounts

How To Create An Easybelle History Database On A Microsoft Powerbook (Windows)

Chapter 7 Managing Users, Authentication, and Certificates

How do I enroll in the password portal?

Step by Step Guide to implement SMS authentication to F5 Big-IP APM (Access Policy Manager)

Pendragon Forms Industrial

Installation Steps for PAN User-ID Agent

Windows 2000 Active Directory Configuration Guide

Configuring Steel-Belted RADIUS Proxy to Send Group Attributes

SAM Server Utility User s Guide

Changing Your Cameleon Server IP

How to... Order or transfer a domain

HOW TO SILENTLY INSTALL CLOUD LINK REMOTELY WITHOUT SUPERVISION

LDAP User Guide PowerSchool Premier 5.1 Student Information System

Configuring Microsoft Active Directory for Integration with NextPage NXT 3 Access Control

Frequently Asked Questions for logging in to Online Banking

Configure ActiveSync with a single Exchange server (Exchange sync for an iphone)

Installing Samsung SDS CellWe EMM cloud connectors and administrator consoles

Delegated Administration Quick Start

HOTPin Integration Guide: DirectAccess

ibaan ERP 5.2a Configuration Guide for ibaan ERP Windows Client

ACTIVE DIRECTORY DEPLOYMENT

Basic Configuration. Key Operator Tools older products. Program/Change LDAP Server (page 3 of keyop tools) Use LDAP Server must be ON to work

Remote Administration

Instructions for Configuring Your Browser Settings and Online Security FAQ s. ios8 Settings for iphone and ipad app

FaxCore 2007 Application-Database Backup & Restore Guide :: Microsoft SQL 2005 Edition

Active Directory Integration

Informatica MRS Backup

Connecting to the University Wireless Network

SchoolBooking LDAP Integration Guide

Security Guidelines for MapInfo Discovery 1.1

IPRO Viewer. Installation

TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link:

Professional Mailbox Software Setup Guide

Integrating LANGuardian with Active Directory

Case Study - Configuration between NXC2500 and LDAP Server

Virto Password Reset Web Part for SharePoint. Release Installation and User Guide

HELP DOCUMENTATION SSRPM WEB INTERFACE GUIDE

PageScope Router. Version 1.5. Configuration Guide

SharePoint AD Information Sync Installation Instruction

SELF SERVICE RESET PASSWORD MANAGEMENT IMPLEMENTATION GUIDE

Undergraduate Academic Affairs \ Student Affairs IT Services. VPN and Remote Desktop Access from a Windows 7 PC

Instructions for Microsoft Outlook 2003

HELP DOCUMENTATION E-SSOM CONFIGURATION GUIDE

IIS, FTP Server and Windows

RSA Authentication Manager 7.1 Basic Exercises

CruzNet Secure Set-Up Instructions for Windows Vista

Tera Term Telnet. Introduction

Exchange 2010 PKI Configuration Guide

Wireless Network Configuration Guide

Table of Contents. Preface. Chapter 1: Getting Started with Endpoint Application Control. Chapter 2: Updating Components

VPN Overview. The path for wireless VPN users

SET UP AND OPERATION GUIDE

SCOPTEL WITH ACTIVE DIRECTORY USER DOCUMENTATION

WS_FTP Server. User Guide

SQL Server Setup for Assistant/Pro applications Compliance Information Systems

Management Utilities Configuration for UAC Environments

Managing User Accounts

AVG 9.0 Internet Security Business Edition

Kaseya 2. Quick Start Guide. for Network Monitor 4.1

Kaseya 2. Quick Start Guide. for Network Monitor 4.1

SELF SERVICE RESET PASSWORD MANAGEMENT DATABASE REPLICATION GUIDE

CONNECT-TO-CHOP USER GUIDE

External Authentication with Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy

Transcription:

Authentication Options in Perforce Perforce authentication mechanisms unlocked Presentation for the 2007 Perforce User Conference By Dan Steele

Choices Internal Perforce Authentication Supports varying levels of password authentication and tickets. P4Auth Allow multiple edge servers to authenticate off a central server. Authentication Triggers Allows Perforce to authenticate users via a third party authorization server.

Notes.. A server can have only one security model Passwords passed from the client to server during a login event are always encrypted Password length is currently limited to 15 characters regardless of what authentication mechanism you are using.

Notes cont.. All authentication in Perforce is centred around two commands. Login: Is used to authenticate to a server. Successful authentication generates a ticket. Passwd: This command is used to change your password.

Tickets Introduced in 2004.2 Set expiry through group 'Timeout' option. Tickets can be used anywhere a password was before. Tickets can be locked to an IP or created globally.

Internal P4 Authentication Security level is defined by the security counter (# (set with p4 counter -f security Can enforce strong passwords Can force the usage of tickets only Counter level 0 No enforcement 1 Strong passwords enforced on client versions 2003.2 and later 2 Strong passwords enforced 3 Ticket based authentication enforced. Password based authentication disabled

P4Auth Introduced in 2002.2 Undocumented and officially unsupported. See 'p4 help undoc' for documentation. Shares protections, groups, users, and passwords with the central server. Servers need constant access to the central server. If the network connection is down no commands can be authenticated.

P4Auth implementation Pass -a to p4d at startup point to the central server or set P4AUTH=<ip:port> and restart the server. Protections table entries that use IPs need to be Prefixed with proxy- for clients connecting through edge servers. The user 'remote' account needs to be configured on the central auth servers.

Authentication triggers Introduced in 2004.2 The first time authentication triggers are added to the triggers table the server must be restarted to enable them. Enforces security=3 behavior automatically. Allows authentication against third party servers such as LDAP and Active Directory. Triggers are not interpreted by a shell: 'echo access denied;exit 1' and the like will not work. See Technical note 74 for more details.

Authentication trigger implementation Entries for auth-check or auth-set are added to the triggers table via the 'p4 triggers' command. The triggers are passed the password via standard in and can be passed arguments such as %user%.

A simple trigger example test auth-check auth "/script/checkpass" #!/usr/bin/perl ## ## Perforce requires messages on stdout ## open(stderr, ">&STDOUT") or die "Can't dup stdout"; ## ## read the password from <stdin< and truncate the newline ## chomp (my $password = <STDIN>); $password =~ s/\r$//; ## ## success ## if($password eq "secret"){ exit 0; } ## ## failure ## die "You got the password wrong!\n"; Here's an extremely simple trigger example Note that the password is read from <stdin> Note also in this case the user name is not passed.

About LDAP & AD Users are authenticated with a combination of password and DN. The DN contains domain and user information. To Authenticate against the server the entire DN string must be correct.

Authentication AD servers. Triggers available in the public depot and linked from Technical note 74. The Microsoft AdsVw.exe is a great tool for working out issues with the users CN. You can find AdsVw in the ADSI development kit from Microsoft. New script attempts authentication against samaccount name.

How to use AdsVw Start AdsVw.exe and: Select ObjectViewer and click on the OK button. Make sure the "Use OpenObject" checkbox is unchecked. Type LDAP: in the "Enter ADs path:" edit box and then click the OK button. You should now be able to browse your Ads tree to your users. This will give you the full Adspath (DN).

Help I've locked myself out! If you are using internal authentication and you've locked yourself out you'll need to delete db.protect. This will reset all your protections. If you are using authentication triggers you have two options. Move the db.triggers file, restart the server, and then move it back. This will preserve your triggers but start the server without authentication triggers enabled. Run 'p4d -xf 18362 echo' on your server. This will reset your trigger to always allow access. You do not need to restart your server.

Tips on protections The protections table is read from the bottom up. To prevent yourself from being accidentally locked out by an errant exclusionary mapping always put your super lines at the very bottom of the table. Protections: write user dan * //depot/test/... write user fred * //... admin user P4DTI * //... write group dev * //depot/dev/... write user * * -//depot/projects/... super user dan * //... super user trigger * //...

Basic tips Tickets can be used anywhere that a password could. For instance 'p4 -P <ticket>...'. 'p4 login' will display your ticket rather than add it to the p4tickets file with 'p4 login -p'.

fin.