Novell LDAP Proxy Server



Similar documents
Mobile App Quick Start

Novell SUSE Linux Enterprise Virtual Machine Driver Pack

ZENworks Mobile Management 3.0.x Deployment Quick Start

Novell Identity Manager

Novell Identity Manager Resource Kit

Novell Open Workgroup Suite Small Business Edition Helpdesk

Novell Access Manager

Novell Identity Manager Driver for Remedy Action Request System (ARS)

High Availability Configuration

Jobs Guide Identity Manager February 10, 2012

NOVELL ZENWORKS ENDPOINT SECURITY MANAGEMENT

Server Installation ZENworks Mobile Management 2.7.x August 2013

NDK: Novell edirectory Core Services. novdocx (en) 24 April Novell Developer Kit. NOVELL EDIRECTORY TM CORE SERVICES.

Novell Distributed File Services Administration Guide

Software Distribution Reference

Server Installation Guide ZENworks Patch Management 6.4 SP2

User Guide Novell iprint 1.1 March 2015

Novell Identity Manager

Database Management Reference

Installation and Configuration Guide

Administration Guide Messenger 2.2 July 30, 2013

Asset Management Reference

Administration Guide Messenger 3.0 February 2015

Certificate Management

For Active Directory Installation Guide

SSL Management Reference

System Administration Guide

Audit Management Reference

Asset Inventory Reference

Installation Guide. Novell Storage Manager for Active Directory. Novell Storage Manager for Active Directory Installation Guide

Password Management Guide

Policy Guide Access Manager 3.1 SP5 January 2013

Novell ZENworks 10 Configuration Management SP3

System Planning, Deployment, and Best Practices Guide

Administration Quick Start

Administration Guide. Novell Storage Manager for Active Directory. Novell Storage Manager for Active Directory Administration Guide

ATT8367-Novell GroupWise 2014 and the Directory Labs

How To Manage Storage With Novell Storage Manager 3.X For Active Directory

Administration Guide GroupWise Mobility Service 2.1 February 2015

2 Installing Privileged User Manager 2.3

Remote Management Reference

2 Downloading Access Manager 3.1 SP4 IR1

Administration Guide Modular Authentication Services (NMAS) April 2013

NetIQ Operations Center 5: The Best IT Management Tool in the World Lab

Installation and Configuration Guide

This Readme includes information pertaining to Novell Service Desk 7.0.

Remote Management Reference

User Application: Design Guide

Configuring File Servers and Active Directory with Domain Services for Windows-Lab

Database Maintenance ZENworks Mobile Management 2.7.x August 2013

Troubleshooting: 2 Solutions to Common Problems

2 Configuring GroupWise Mobility Service to Support Microsoft Outlook Clients

NetIQ Sentinel Quick Start Guide

Migration Tool Administration Guide

Generating an Apple Push Notification Service Certificate

Windows Client User Guide

Managing Macintosh OS-X with Novell ZCM 11.2 Lecture

User Self-Administration

Patch Management Reference

Patch Management Reference

Administration Guide Novell Filr May 2014

Advanced User Guide Vibe 4.0 March 2015

Upgrade and Migration Guide

Out-of-Band Management Reference

Novell ZENworks Server Management

Web Application User Guide

Install and Configure an Open Source Identity Server Lab

Migration Tool Administration Guide

Patch Management Reference

Novell Sentinel Log Manager 1.2 Release Notes. 1 What s New. 1.1 Enhancements to Licenses. Novell. February 2011

Novell Remote Manager Administration Guide

Novell Linux Management Pack for System Center Operations Manager

Android App User Guide

WebAccess User Guide GroupWise 2014 August 2014

User Source and Authentication Reference

ZENworks Adaptive Agent Reference

Administration Guide Certificate Server May 2013

Novell Access Manager

Monitoring Nginx Server

Full Disk Encryption Pre-Boot Authentication Reference

Trusted Applications GroupWise Software Developer Kit November 2012

SSL VPN Server Guide Access Manager 3.1 SP5 January 2013

Novell Identity Manager

Novell Storage ServicesTM File System Administration Guide for Linux

Full Disk Encryption Agent Reference

Novell PlateSpin Recon

Novell PlateSpin Portability Suite

Novell Identity Manager

Transcription:

AUTHORIZED DOCUMENTATION Best Features Guide Novell LDAP Proxy Server 1.0 October 2011 www.novell.com

Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this documentation, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. Further, Novell, Inc. reserves the right to revise this publication and to make changes to its content, at any time, without obligation to notify any person or entity of such revisions or changes. Further, Novell, Inc. makes no representations or warranties with respect to any software, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. Further, Novell, Inc. reserves the right to make changes to any and all parts of Novell software, at any time, without any obligation to notify any person or entity of such changes. Any products or technical information provided under this Agreement may be subject to U.S. export controls and the trade laws of other countries. You agree to comply with all export control regulations and to obtain any required licenses or classification to export, re-export or import deliverables. You agree not to export or re-export to entities on the current U.S. export exclusion lists or to any embargoed or terrorist countries as specified in the U.S. export laws. You agree to not use deliverables for prohibited nuclear, missile, or chemical biological weaponry end uses. See the Novell International Trade Services Web page (http://www.novell.com/info/exports/) for more information on exporting Novell software. Novell assumes no responsibility for your failure to obtain any necessary export approvals. Copyright 2011 Novell, Inc. All rights reserved. No part of this publication may be reproduced, photocopied, stored on a retrieval system, or transmitted without the express written consent of the publisher. Novell, Inc. 404 Wyman Street, Suite 500 Waltham, MA 02451 U.S.A. www.novell.com Online Documentation: To access the latest online documentation for this and other Novell products, see the Novell Documentation Web page (http://www.novell.com/documentation). Novell Trademarks For Novell trademarks, see the Novell Trademark and Service Mark list (http://www.novell.com/company/legal/ trademarks/tmlist.html). Third-Party Materials All third-party trademarks are the property of their respective owners.

4 Novell LDAP Proxy Server 1.0 Best Features Guide

Contents About This Guide 7 1 An Overview of the LDAP Proxy Server 9 1.1 Need for the LDAP Proxy 1.0................................................... 9 1.2 Features................................................................... 9 1.2.1 Ease of deployment................................................... 9 1.2.2 LDAP Proxy 1.0 as a Load Balancer...................................... 9 1.2.3 Fault Tolerance...................................................... 9 1.2.4 Flexible to act as a SSL-izer and as a Forward Proxy........................ 10 1.2.5 Unique message processing layer in the architecture........................ 10 2 Basic Functioning of LDAP Proxy 11 2.1 Organization of the Configuration file........................................... 11 2.1.1 Basic Functioning of the LDAP Proxy.................................... 11 2.1.2 The Configuration File................................................ 11 3 Proxy as a Load Balancer 13 3.1 Configuring the Listener..................................................... 13 3.2 Configuring the Back-end Server............................................... 13 3.3 Configuring the Proxy to Function as a Load Balancer.............................. 14 4 Introduction to the Proxy Policies 15 5 Client Network Policy, Directory Firewall 17 6 Operation Network Policy 19 7 Map Scheme Policy 21 8 Request Route Policy 23 Contents 5

6 Novell LDAP Proxy Server 1.0 Best Features Guide

About This Guide The Novell LDAP Proxy 1.0 Best Practices Guide discusses some good practices that can be followed while running Novell LDAP Proxy in your environment. The guide is organized into the following sections: Chapter 1, An Overview of the LDAP Proxy Server, on page 9 Chapter 2, Basic Functioning of LDAP Proxy, on page 11 Chapter 3, Proxy as a Load Balancer, on page 13 Chapter 4, Introduction to the Proxy Policies, on page 15 Chapter 5, Client Network Policy, Directory Firewall, on page 17 Chapter 6, Operation Network Policy, on page 19 Chapter 7, Map Scheme Policy, on page 21 Chapter 8, Request Route Policy, on page 23 Audience This guide is intended for network administrators. Feedback We want to hear your comments and suggestions about this manual and the other documentation included with this product. Please use the User Comments feature at the bottom of each page of the online documentation. Documentation Updates For the most recent version of the Novell LDAP Proxy 1.0 Best Practices Guide, visit the Novell Documentation Web site (http://www.novell.com/documentation/ldapproxy). Additional Documentation For additional Novell LDAP Proxy 1.0 documentation, refer to the following guides: Novell LDAP Proxy 1.0 Administration Guide Novell LDAP Proxy 1.0 Installation Guide Novell LDAP Proxy 1.0 Linux Readme Documentation Conventions In Novell documentation, a greater-than symbol (>) is used to separate actions within a step and items in a cross-reference path. About This Guide 7

8 Novell LDAP Proxy Server 1.0 Best Features Guide

1An Overview of the LDAP Proxy Server 1 Novell's LDAP Proxy 1.0 is a versatile product that is used to enhance an existing directory infrastructure. The LDAP Proxy 1.0 improves the security, the scalability, and the reliability of any directory infrastructure. 1.1 Need for the LDAP Proxy 1.0 The LDAP Proxy server helps to overcome certain handicaps that arise as a result of connecting directly to a directory server. Novell's LDAP Proxy 1.0 acts like a directory firewall by protecting the directory servers from furnishing information to clients from un-trusted networks and by regulating requests and responses based on certain parameters. The LDAP Proxy Server achieves improvements on the reliability and the scalability by balancing the load between any set of replica servers and by efficient fault tolerance mechanisms. 1.2 Features This section gives a brief insight into the features of LDAP Proxy 1.0. 1.2.1 Ease of deployment Novell's LDAP Proxy Server is completely transparent to a client and is extremely easy to deploy and manage. 1.2.2 LDAP Proxy 1.0 as a Load Balancer To improve the scalability and the performance of a directory infrastructure, in stressful scenarios, Novell's LDAP Proxy 1.0 could be configured to act as a load balancer. As a load balancer, the LDAP Proxy 1.0 distributes the load among configured back-end group of servers. The distribution is governed by the algorithm configured by the user. In general, a connection based round robin algorithm based on priority is used to distribute the load. The LDAP Proxy 1.0 could also route requests based on the namespace. 1.2.3 Fault Tolerance Novell's LDAP Proxy 1.0 groups clients based on certain criteria. Each of these groupings is identified as a role and intuitive policies, configured in the LDAP Proxy Server, govern the roles. A directory server is assumed to be unavailable because, The connection attempt returns an error, or The connection has timed out, or The directory server is unhealthy An Overview of the LDAP Proxy Server 9

In such scenarios, the LDAP Proxy 1.0 1. Detects the unavailability of the directory server 2. Identifies another server that can cater to the identified client role 3. Routes the connection to this newly identified server 1.2.4 Flexible to act as a SSL-izer and as a Forward Proxy The LDAP Proxy 1.0 is designed to act as both, 1. A simple forward proxy that merely regulates the traffic to a directory server 2. A complex SSL-izer that imparts high security to the directory server 1.2.5 Unique message processing layer in the architecture The LDAP Proxy 1.0 s architecture comprises of a message processing layer that handles client requests based on certain effective policies. These policies define conditions, and actions based on the evaluation of the conditions. The message processor takes care of placing search restrictions, connection restrictions, and operation restrictions on incoming client requests. 10 Novell LDAP Proxy Server 1.0 Best Features Guide

2Basic Functioning of LDAP Proxy 2 After the LDAP Proxy 1.0 is installed in your system, the LDAP Proxy 1.0 has to be configured before starting it. When LDAP Proxy 1.0 is installed, the proxy s rpm creates a directory called conf in your system. The configuration file is an xml file present in this conf directory. To configure the LDAP Proxy 1.0, to work in accordance with your needs, you have to edit the xml file present in the conf directory. This section of the document describes the various elements of the xml (configuration) file. 2.1 Organization of the Configuration file Prior to analyzing how the configuration file is organized it is important to understand the basic functioning of the LDAP Proxy 1.0. 2.1.1 Basic Functioning of the LDAP Proxy The LDAP Proxy 1.0 acts as a mediator between the network and the directory servers with the aim of improving the performance of the directory servers. It listens for requests from the network, establishes the identity of the incoming requests, based on the identity processes the client requests, decides to which back-end server group the processed request is to be forwarded and forwards the request to the identified back-end server group. The uniqueness of LDAP Proxy 1.0 lies in transforming the incoming request based on identity. To transform the incoming requests certain effective policies are applied to the requests. 2.1.2 The Configuration File The proxy configuration should define, The interfaces the proxy is going to listen on; this definition should also include the protocols to be used for listening. The mechanism for establishing the identity of the incoming requests. The back-end servers to which the incoming requests could be forwarded. The back-end server grouping; this definition states how the proxy is to achieve load balancing. The policies to be applied to the incoming requests. Basic Functioning of LDAP Proxy 11

12 Novell LDAP Proxy Server 1.0 Best Features Guide

3Proxy as a Load Balancer 3 To improve the scalability and the performance of a directory infrastructure, in stressful scenarios, Novell's LDAP Proxy 1.0 could be configured to act as a load balancer. As a load balancer, the LDAP Proxy 1.0 distributes the load among configured back-end group of servers. The distribution is governed by the algorithm configured by the user. In general, a connection based round robin algorithm based on priority is used to distribute the load. The LDAP Proxy 1.0 could also route requests based on the namespace. 3.1 Configuring the Listener A listener is where the LDAP Proxy 1.0 listens for incoming requests. The proxy is capable of listening on multiple sources. Any number of listeners can be configured for the LDAP Proxy 1.0. The listener can be a port- secure or unsecure, or an interface. The list-listener section of the configuration file, lists all the listeners configured for the proxy. You can add any number of listeners to this list. Each listener should have, 1. An identity to identify the listener. 2. A service section that specifies, The protocol the listener is going to follow to listen for requests. The port or the interface on which the listener is going to listen for requests. 3. At the least one request route policy that states where the incoming requests have to be forwarded to. 3.2 Configuring the Back-end Server A back-end server is a directory server to which the LDAP Proxy 1.0 is connected. The LDAP Proxy 1.0 intercepts the requests to the back-end servers and transforms the requests based on certain policies and then forwards the transformed requests to the back-end servers, thereby improving the performance of the directory servers. A minimum of two back-end servers have to be configured for the LDAP Proxy 1.0. This facilitates load balancing and fault tolerance. A health check has to be periodically performed on the directory server to identify any performance degradation. The list-backend-server section of the configuration file, lists all the back-end servers configured for the proxy. You can add any number of servers to this list. Each back-end server configuration should have, 1. An identity to identify the back-end server. Proxy as a Load Balancer 13

2. A service section that specifies, The protocol the directory server is going to follow to receive requests. The port or the interface through which the directory server would receive the requests from the LDAP Proxy 1.0. 3. A health check section that specifies the kind of request to be sent to the directory server to check if it is functioning properly. If this section is not specified then the server s health is monitored by sending a simple bind request. If the server responds within 7200 seconds then the server is assumed to be performing normally. 3.3 Configuring the Proxy to Function as a Load Balancer The back-end servers configured using the LDAP Proxy 1.0 could be grouped together for the purpose of balancing the load between the servers. Currently connection based load balancing is supported by the LDAP Proxy 1.0. The back-end servers that are grouped together have to be replicas of each other. In connection based load balancing the maximum number of connections to the back-end server and the capability of each server is taken into account and based on these two factors the load is shared between the back-end servers in a group. 14 Novell LDAP Proxy Server 1.0 Best Features Guide

4Introduction to the Proxy Policies 4 The policies configured in the LDAP Proxy 1.0 act as the message processing centers. The policies enable the LDAP Proxy 1.0 to analyze the incoming requests and based on the rules defined while configuring the policies, the LDAP Proxy acts upon these incoming requests. Any number of policies could be configured for the LDAP Proxy 1.0. Every policy has a rule associated with it. The rule has a condition part and an action part. For every rule, if the condition part evaluates to true then a specified action is performed else a default action is performed. You can configure five types of policies in LDAP Proxy. They are, 1. Client Network Policy 2. Operation Restriction Policy 3. Map Schema Policy 4. Request Route Policy 5. Search Request Policy The list-policy section of the configuration file lists all the policies configured for the LDAP Proxy 1.0. You can add any number of policies to this list. Every policy should have a rule section. This rule section comprises, A condition that the incoming request has to be checked for. An action that has to be performed on the incoming request if the condition evaluates to true. A default action that has to be performed if the condition evaluates to false. Introduction to the Proxy Policies 15

16 Novell LDAP Proxy Server 1.0 Best Features Guide

5Client Network Policy, Directory Firewall 5 The Client Network Policy is an optional policy. This policy is the most restrictive of all the policies and hence is applied to the incoming request before any other policy. This policy is applicable to all the clients. This policy establishes from which client the incoming request is received and based on the identity of the client decides if that request from that client has to be allowed or not. By this functionality the Client Network Policy acts as a directory firewall. Client Network Policy, Directory Firewall 17

18 Novell LDAP Proxy Server 1.0 Best Features Guide

6Operation Network Policy 6 The operation restriction policy is used to restrict the functions an incoming request could perform on a directory structure, based on the identity of the request. This policy is tied with the Request Route Policy that establishes the identity of an incoming request. Once the identity of the request is established, this policy checks the message type of the incoming requests. If the message type matches any of the types specified in the conditions section of the Operation Restriction Policy, then this policy rejects such requests. Operation Network Policy 19

20 Novell LDAP Proxy Server 1.0 Best Features Guide

7Map Scheme Policy 7 The Map Schema Policy is used to enable every user to get a user specific view of the directory information. Theimportance of this policy is that the application need not change for the sake of the directory. If there is an incoming request that contains certain attributes whose naming conventions are not similar to the ones used in the directory,then this policy could be configured to change the incoming request so that the directory understands the request. The incoming request is changed by mapping the attributes and the object classes of the request to attributes and object classes that can be comprehended by the directory server. Map Scheme Policy 21

22 Novell LDAP Proxy Server 1.0 Best Features Guide

8Request Route Policy 8 This policy is used to bind the listener configuration, the back-end server configuration, and the other policies. The condition in the request route policy determines the identity of an incoming request. Based on the identity, the request route policy performs an action on the incoming request. This action could include transforming the incoming request by applying some other policy. The request route policy has no default action. If the request route policy is unable to establish the identity of an incoming request then that request is ignored. For every listener configured there should be at the least one request route policy associated with the listener. For each listener any number of request route policies could be configured. The most restrictive request route policy should be applied first to the request coming in through the listener. Request Route Policy 23

24 Novell LDAP Proxy Server 1.0 Best Features Guide