How to Use Microsoft Active Directory as an LDAP Source with the Oracle ZFS Storage Appliance



Similar documents
Sun ZFS Storage Appliance Rule-Based Identity Mapping Between Active Directory and Network Information Services Implementation Guide

How to Configure IDMU on the Oracle ZFS Storage Appliance

An Oracle White Paper July Introducing the Oracle Home User in Oracle Database 12c for Microsoft Windows

OpenLDAP Oracle Enterprise Gateway Integration Guide

An Oracle White Paper September Directory Services Integration with Database Enterprise User Security

Oracle Directory Services Integration with Database Enterprise User Security O R A C L E W H I T E P A P E R F E B R U A R Y

Microsoft Active Directory Oracle Enterprise Gateway Integration Guide

An Oracle Technical White Paper May How to Configure Kaspersky Anti-Virus Software for the Oracle ZFS Storage Appliance

Configuring Microsoft Active Directory for Oracle Net Naming. An Oracle White Paper April 2014

An Oracle White Paper November Oracle Business Intelligence Standard Edition One 11g

An Oracle White Paper May Distributed Development Using Oracle Secure Global Desktop

An Oracle White Paper September Oracle WebLogic Server 12c on Microsoft Windows Azure

Using Symantec NetBackup with VSS Snapshot to Perform a Backup of SAN LUNs in the Oracle ZFS Storage Appliance

Configuring Microsoft Active Directory 2003 for Net Naming. An Oracle White Paper September 2008

An Oracle White Paper October BI Publisher 11g Scheduling & Apache ActiveMQ as JMS Provider

An Oracle White Paper March Integrating Microsoft SharePoint Server With Oracle Virtual Directory

Manage Oracle Database Users and Roles Centrally in Active Directory or Sun Directory. Overview August 2008

How to Configure Symantec Protection Engine for Network Attached Storage for the Oracle ZFS Storage Appliance

Oracle Enterprise Manager

An Oracle White Paper June How to Install and Configure a Two-Node Cluster

How To Load Data Into An Org Database Cloud Service - Multitenant Edition

An Oracle Communications White Paper December Serialized Asset Lifecycle Management and Property Accountability

An Oracle White Paper May Creating Custom PDF Reports with Oracle Application Express and the APEX Listener

An Oracle White Paper January, Enterprise Manager Cloud Control 12c: Configuring External User Authentication Using Microsoft Active Directory

G Cloud 7 Pricing Document

An Oracle White Paper April How to Install the Oracle Solaris 10 Operating System on x86 Systems

March Oracle Business Intelligence Discoverer Statement of Direction

An Oracle White Paper June Security and the Oracle Database Cloud Service

PeopleSoft Enterprise Directory Interface

An Oracle White Paper June RESTful Web Services for the Oracle Database Cloud - Multitenant Edition

An Oracle White Paper June, Provisioning & Patching Oracle Database using Enterprise Manager 12c.

An Oracle Technical White Paper January How to Configure the Trend Micro IWSA Virus Scanner for the Oracle ZFS Storage Appliance

An Oracle Technical White Paper June Oracle VM Windows Paravirtual (PV) Drivers 2.0: New Features

Microsoft Windows Server Multiprotocol Multipathing with the Oracle ZFS Storage Appliance

An Oracle White Paper January Integrating Oracle Application Express with Oracle Access Manager. Revision 1

An Oracle White Paper September Oracle Database and the Oracle Database Cloud

Migration Best Practices for OpenSSO 8 and SAM 7.1 deployments O R A C L E W H I T E P A P E R M A R C H 2015

Oracle Enterprise Manager

Integrating Microsoft Servers and the Oracle ZFS Storage Appliance

An Oracle White Paper April, Effective Account Origination with Siebel Financial Services Customer Order Management for Banking

G Cloud 7 Pricing Document

Oracle Fusion Middleware

Oracle Primavera Gateway

Setting up the integration between Oracle Social Engagement & Monitoring Cloud Service and Oracle RightNow Cloud Service

WebSphere MQ Oracle Enterprise Gateway Integration Guide

An Oracle White Paper February Oracle Data Integrator 12c Architecture Overview

An Oracle White Paper July Oracle Desktop Virtualization Simplified Client Access for Oracle Applications

June, 2015 Oracle s Siebel CRM Statement of Direction Client Platform Support

An Oracle White Paper May 2011 BETTER INSIGHTS AND ALIGNMENT WITH BUSINESS INTELLIGENCE AND SCORECARDS

How To Configure the Oracle ZFS Storage Appliance for Quest Authentication for Oracle Solaris

An Oracle White Paper December Leveraging Oracle Enterprise Single Sign-On Suite Plus to Achieve HIPAA Compliance

Unbreakable Linux Network An Overview

An Oracle White Paper October Realizing the Superior Value and Performance of Oracle ZFS Storage Appliance

An Oracle White Paper March Oracle s Single Server Solution for VDI

Oracle Identity Management Concepts and Architecture. An Oracle White Paper December 2003

ORACLE MANAGED FILE TRANSFER

An Oracle White Paper March Integrating the SharePoint 2007 Adapter with WebCenter Spaces ( & )

THE NEW BUSINESS OF BUSINESS LEADERS. Hiring and Onboarding

An Oracle White Paper May Oracle Database Cloud Service

Oracle SQL Developer Migration

An Oracle White Paper Dec Oracle Access Management Security Token Service

Oracle Financial Management Analytics

Managed Storage Services

Long User ID and Password Support In JD Edwards EnterpriseOne

Oracle Virtual Desktop Infrastructure. VDI Demo (Microsoft Remote Desktop Services) for Version 3.2

An Oracle White Paper September Advanced Java Diagnostics and Monitoring Without Performance Overhead

ORACLE OPS CENTER: VIRTUALIZATION MANAGEMENT PACK

Driving Down the High Cost of Storage. Pillar Axiom 600

Performance with the Oracle Database Cloud

Running Oracle s PeopleSoft Human Capital Management on Oracle SuperCluster T5-8 O R A C L E W H I T E P A P E R L A S T U P D A T E D J U N E

Load Testing Hyperion Applications Using Oracle Load Testing 9.1

Oracle Easy Connect Naming. An Oracle White Paper October 2007

An Oracle White Paper January Using Oracle's StorageTek Search Accelerator

An Oracle White Paper July Oracle Linux and Oracle VM Remote Lab User Guide

October Oracle Application Express Statement of Direction

ORACLE INFRASTRUCTURE AS A SERVICE PRIVATE CLOUD WITH CAPACITY ON DEMAND

Minutes on Modern Finance Midsize Edition

Primavera Unifier Integration Overview: A Web Services Integration Approach O R A C L E W H I T E P A P E R F E B R U A R Y

An Oracle White Paper February Rapid Bottleneck Identification - A Better Way to do Load Testing

Deploying Oracle Database 12c with the Oracle ZFS Storage Appliance

An Oracle White Paper February Integration with Oracle Fusion Financials Cloud Service

A Framework for Implementing World-Class Talent Management. The highest performing businesses are re-focusing on talent management

Oracle Identity Management: Integration with Windows. An Oracle White Paper December. 2004

An Oracle White Paper November Upgrade Best Practices - Using the Oracle Upgrade Factory for Siebel Customer Relationship Management

An Oracle White Paper December Cloud Candidate Selection Tool: Guiding Cloud Adoption

Deliver Oracle BI Publisher documents to Microsoft Office SharePoint Server An Oracle White Paper July 2008

SIX QUESTIONS TO ASK ANY VENDOR BEFORE SIGNING A SaaS E-COMMERCE CONTRACT

An Oracle White Paper April Oracle Fusion Talent Management Overview

Top Ten Reasons for Deploying Oracle Virtual Networking in Your Data Center

An Oracle White Paper October Oracle Data Integrator 12c New Features Overview

Using LDAP Authentication in a PowerCenter Domain

Oracle Fusion Applications Splitting Topology from Single to Multiple Host Servers

JD Edwards EnterpriseOne Tools. 1 Understanding JD Edwards EnterpriseOne Business Intelligence Integration. 1.1 Oracle Business Intelligence

Virtual Compute Appliance Frequently Asked Questions

An Oracle White Paper June High Performance Connectors for Load and Access of Data from Hadoop to Oracle Database

An Oracle Best Practice Guide April Best Practices for Designing Contact Center Experiences with Oracle RightNow CX Cloud Service

Oracle Net Services for Oracle10g. An Oracle White Paper May 2005

An Oracle White Paper March Managing Metadata with Oracle Data Integrator

Introduction to Virtual Datacenter

An Oracle Technical Article November Certification with Oracle Linux 6

Transcription:

An Oracle Technical White Paper November 2014 How to Use Microsoft Active Directory as an LDAP Source with the Oracle ZFS Storage Appliance

Table of Contents Introduction...3 Active Directory LDAP Services...4 Configuring the Oracle ZFS Storage Appliance for AD Access...6 Configuring the Oracle ZFS Storage Appliance for LDAP Access...9 Verifying Expected Operation...11 Complex AD Directory Structures...16 Conclusion...20 2

Introduction The Oracle ZFS Storage Appliance integrates advanced hardware and software architectures to offer a facile, multiprotocol storage system capable of running the most demanding workload. This workload includes a variety of simultaneously operating applications and advanced data services. First class performance characteristics are illustrated by the results of industry standard benchmarks like SPC-1, SPC-2 and SPECsfs. As a unified storage platform, the Oracle ZFS Storage Appliance can be configured to operate in multiple environments concurrently. In order to fully integrate into these environments, it is necessary to subscribe to the naming systems appropriate to the particular environment. For Microsoft Windows, this is usually Active Directory and for UNIX environments, LDAP is one of the most commonly deployed directory systems. In some circumstances, it is desirable to provide services to both Microsoft Windows and UNIX environments where Active Directory is the only deployment directory service. This document describes how to use the Active Directory service to provide LDAP services that allow Identity Mapping to bridge the different environments. For the purposes of this document, the Active Directory domain is called the fictional example.org. 3

Active Directory LDAP Services Microsoft Active Directory is the industry-standard directory service for Microsoft Windows environments. Active Directory (AD) is a well-integrated combination of Kerberos for authentication, Lightweight Directory Access Protocol (LDAP) for authorization, and directory services and Domain Name System (DNS) for host name resolution and service location. AD is used to store information about users, groups, shares and many other types of shared objects. The Oracle ZFS Storage Appliance integrates directly with AD to provide the consistent security and ownership details across Microsoft Windows environments. Out of the box, however, AD does not have a way to represent UNIX environment identities which are defined by user IDs (UIDs) and group IDs (GIDs) represented by positive integers. Other details such as home directories, group membership, default shell and encrypted passwords are also missing by default from AD. Some details (such as the GECOS field) can be borrowed from standard AD attributes. By design, AD is extensible by schema modification. This means that it is possible to add attributes to objects where applications require, such as adding UIDs and GIDs to allow the Windows AD domain controller to manage UNIX environment directory accesses. Windows Server versions up to and including Windows Server 2012 R2 have the facility to provide NIS directory access to UNIX hosts by installing Microsoft Identity Mapping for UNIX. The standard for UNIX LDAP directory access is encapsulated in RFC 2307; installing Microsoft Identity Mapping for UNIX modifies the AD schema to comply with RFC 2307. There are a number of commercial packages that also provide the compliance with RFC 2307. Active Directory s LDAP service is not normally evident other than through the standard AD tools such as ADSI Edit, which allows access to the raw LDAP directory. It is through tools like these that the directory structure can be verified when the AD configuration varies from a simple out-of-thebox setup. An example of a newly created Active Domain is shown in Figure 1 in the Active Directory Users and Computers application and also in the more structured ADSI Edit in Figure 2. Figure 1. Active Directory Users and Computers view of Newly Created Domain 4

Figure 2. ADSI Edit view of the newly created domain The ADSI Edit view exposes more of the LDAP structure to the AD schema. Other LDAP browsers are available, both commercially and as freeware, but since ADSI Edit is installed by default in Windows Server AD Server deployments, it will be used in this example. In order to enable the UNIX attributes within Active Directory Users and Computers, you must create a blank NIS configuration, by importing empty text files in the IDMU NIS migration wizard. A tutorial covering use of Microsoft IDMU with the Oracle ZFS Storage Appliance is available at: http://www.oracle.com/technetwork/articles/systems-hardware-architecture/o11-051-zffsa-idmumapping-405716.pdf 5

Configuring the Oracle ZFS Storage Appliance for AD Access In order to create the appropriate authentication objects and permissions, the Oracle ZFS Storage Appliance should be configured to access AD. As mentioned previously, the DNS service plays a large role in AD and the Oracle ZFS Storage Appliance must therefore be configured to use the Windows DNS Service. Clock synchronization is also important for correct AD operation. Clock skew between the Oracle ZFS Storage Appliance and the AD Domain Controllers must be less than 15 minutes for a successful AD join. It is highly recommended to install a Network Time Protocol (NTP) service and to configure the Oracle ZFS Storage Appliance and the AD domain controllers to become clients of the service. 1. Using the browser user interface (BUI) of the Oracle ZFS Storage Appliance, ensure that the DNS configuration refers to the same DNS server as the Active Directory servers. As shown in the following figure, access the DNS Configuration screen by selecting Configuration > Services > DNS. Figure 3. Verifying DNS configuration 2. Ensure the clocks on the Oracle ZFS Storage Appliance and Windows AD Domain controllers are in synchronization. In the BUI, select Configuration >Services > NTP. Enter the appropriate values for NTP Server(s) address details. Figure 4. Verifying clock synchronization 6

3. From the Configuration > Services > Active Directory page, click the Join Domain button as shown in the following figure. Figure 5. Active Directory service page 4. Enter the details of a Domain Administrator with the authority to allow the Oracle ZFS Storage Appliance to join the AD, as seen in figure 6. Click APPLY to continue. Figure 6. Entering the AD administrator details 5. Upon a successful join operation, acknowledgement similar to the following is displayed. Figure 7. Successful AD Join If a message indicating Access is denied is displayed, and the AD Domain Administrator username and password are correct, it may be necessary to change the LAN Manager compatibility level to Level 2. Do so by selecting Configuration > Services > SMB and selecting the level from the dropdown towards the bottom of Properties as shown in Figure 8. Then you can return to step 3 to repeat the join domain process. 7

Figure 8. Configuring the LAN Manager compatibility level The Oracle ZFS Storage Appliance is now able to resolve Windows environment users and groups from Active Directory. In addition, the necessary permissions are now in place for the Oracle ZFS Storage Appliance to access AD through the LDAP interface. 8

Configuring the Oracle ZFS Storage Appliance for LDAP Access Given the example AD domain example.com, it is represented in the LDAP interface as the Distinguished Name (DN) DC=example,DC=org. This DN will be used as the base for searches. In order to configure the Oracle ZFS Storage Appliance LDAP client, navigate to Configuration > Services > LDAP. Enter the Base search DN, following the format just described (in this example, DC=example,DC=org). Enable Subtree (or recursive) searches to allow the LDAP client to descend into the appropriate tree structures built up in AD. It is possible to create a proxy user in AD to allow the Oracle ZFS Storage Appliance to access LDAP. However, as the previous section configured AD to allow access to LDAP, the bind credential level can be set to Self, which will avoid the need to store the proxy user DN and password. Next, the AD domain controllers should be added as Servers. In the following example, two AD domain controllers are nominated: w2k8-ad and w2k8-ad2. Figure 9. Configuring the LDAP client interface The next step is to define the Schema definition. By design, Windows users and groups share the same namespace thus you cannot have a user and a group with the same name. By default these objects live in the Users container which is represented in AD as CN=Users,<BASE-DN>. In the example, the container is CN=Users,DC=example,DC=org. This DN is then used as the User Search Descriptor in the Schema Definition. UNIX environments, however, have separate namespaces for users and groups definitions, which allows groups to be created with the same name as users. To accommodate this difference, the group search descriptor must be set to the same as the user search descriptor. 9

The attributes uidnumber and gidnumber are defined in AD once IDMU is installed on the domain controllers and no mapping needs to occur. Other attributes are provided with slightly different names from the naming required by UNIX environments. The following is a suggested list of the mappings: USER ATTRIBUTE gecos homedirectory userpassword uid AD EQUIVALENT CN unixhomedirectory unixuserpassword samaccountname In order to allow these mappings to take place, it is necessary to map the UNIX object class posixaccount to the AD object class User. Similarly for group access, the UNIX object class posixgroup should be mapped to AD object class group with the search descriptor set to the same as that for users (due to the shared namespace AD employs.) To implement these changes with the Oracle ZFS Storage Appliance BUI, navigate to Configuration > Services > LDAP (as shown in Figure 9) and select Edit to the right of the 'Schema definition' line. This will bring up the Edit LDAP Schema Definition dialog window as shown in Figure 10. Complete the following: Figure 10. Edit LDAP Schema Definition Users 1. Enter the appropriate Search descriptor. The example shows CN=Users,DC=example,DC=org. Add the attribute mappings for gecos, homedirectory, userpassword and uid either by using the suggested mappings or from those determined from your own AD schema. Click the plus icon to add any additional attribute mappings. 2. Enter the Object class mappings for posixaccount and shadowaccount. The latter must be different from the posixaccount as schema maps must be unique. Ultimately, mapping to person has the same effect. 3. Select the Group tab from the top left of the dialog box and enter the same search descriptor as in step 1. 10

Figure 11. Edit LDAP Schema Definition Groups 4. Enter the Object class mapping for posixgroup and click Save. Verifying Expected Operation Once these schema definition changes have been made, check that the mapping occurs as expected in order to ensure that consistent ownership and permissions are maintained between Windows and UNIX environments. Note: In order to test the correct mapping, there must be at least one user defined in AD with UNIX attributes configured. Similarly, there must be a security group in AD with its UNIX attributes configured prior to defining the user s UNIX attributes. For example, a group defined in AD as unixusers has been allocated the gid 10000. A user defined in AD as andrew has been allocated the uid 70592, with the primary group defined as unixusers. Figure 12. UNIX Attributes for 'andrew' Another user has been defined in AD with the name sharon, and she does not have defined UNIX attributes. 11

Figure 13. No defined UNIX Attributes for sharon From the Oracle ZFS Storage Appliance BUI, navigate to Configuration > Services > Identity Mapping. Ensure that the Mapping mode is set to IDMU. If necessary, change and Apply the change. Select Mappings. From the Mappings screen, enter the Identity andrew and leave the Windows Domain at the default. Click the SHOW button. Figure 14. Verifying mapping details for andrew - 1 As can be seen in Figure 14, user andrew does indeed have the correct user ID (70592.) The Group Properties can be ignored here because there is no group called andrew and thus an ephemeral ID has been generated but will never be used. By selecting the Unix Platform radiobox, the Windows ID can now be shown and, correctly, no group is displayed in this case. 12

Figure 15. Verifying mapping details for andrew - 2 Similar results display when selecting the Group Type radio box and entering unixusers. Searching for sharon s details produces no Windows details because, even though an ephemeral UID is automatically generated, there is no way to permanently map the Windows user ID to the ephemeral UNIX user ID (Figures 16 and 17). Figure 16. Ephemeral IDs created for sharon 13

Figure 17. No Windows User ID displayed for sharon In order to provide a mapping between the UNIX and Windows environments for user sharon, it is necessary to enter the UNIX attributes on the Active Directory Users and Computers wizard. In this example, her UNIX UID is 70593 and she is assignd to the group unixusers. Figure 18. Adding sharon to the UNIX environment Once the changes have been applied, rerunning the mapping test shows the expected results as shown in Figure 19 and Figure 20. 14

Figure 19. Newly applied UID for sharon Figure 20. Newly applied Windows ID for sharon 15

Complex AD Directory Structures Where large and complex AD schemas have been deployed, Windows AD administrators may impose a hierarchy of users broken down by geography and/or function. It may be desirable then to limit the searches in certain circumstances to a single subtree or subtrees to allow optimum ID resolution speed by reducing the search space. To illustrate this, the fictional example.org has over 20,000 active AD users defined spread across multiple countries. In order to maintain a manageable hierarchy, the AD administrators have implemented a geographically arranged tree. A subset of this tree concentrating on just the users is shown in Figure 21. Figure 21. Example.ORG hierarchy In order to keep the highest possible lookup performance, the storage administrators have decided that they will restrict searches to just the geographic areas and the administrative user subtrees. Users exist within the country Organizational Units (OU) and these countries are contained in the geographical OU. A separate AdminUsers OU has also been created to allow group policies to be applied to these users without affecting the geographical users or vice versa. As there is no common node other than the root of the domain and it would not be advisable to search the entire tree for users for performance reasons, the Oracle ZFS Storage Appliance offers an alternative approach in which the multiple subtrees can be nominated for searches by separating the DNs with a semicolon. In the simple example, the user search descriptor was CN=Users,DC=example,DC=org. Using the additional search feature, the user search descriptor for the more complex configuration becomes: OU=AdminUsers,DC=example,DC=org; OU=Americas,DC=example,DC=org; \ OU=APAC,DC=example,DC=org; OU=Europe,DC=example,DC=org The Oracle ZFS Storage Appliance will then search each of these subtrees in turn to attempt to resolve any references. Thus, it may make sense to alter the order for the OUs, depending on where the Oracle ZFS Storage Appliances are sited, as well as which user base makes most use of the services offered by the Oracle ZFS Storage Appliance. 16

Additionally, the Group search descriptor should also be changed if groups are arranged in a similar manner that is, under each geographical OU, or if there is a separate OU created to hold the security groups in AD, which might be the case where the functional unit assignment is defined in a global sense rather than geographical. In the example.org domain, there are three users in the US OU and five in the UK OU, as shown in Figures 22 and 23 respectively. Figure 22. US OU Users Figure 23. UK OU Users The ADSI Edit view of this configuration is shown in Figure 24. 17

Figure 24. ADSI Edit view With the User Search Descriptor set appropriately to capture the geographical units as well as the administrative users, IDMU can resolve and map from any of the nominated subtrees. Some examples of this are shown in the following figures. Figure 25. Resolving from AdminUsers Figure 26. Resolving from AdminUsers 18

Figure 27. Resolving from UK Figure 28. Resolving from UK 19

Conclusion The Oracle ZFS Storage Appliance provides a platform on which to bridge the gap between Windows and UNIX environments in a secure and consistent manner. Access authorization granted in one environment is mirrored in the other where the appropriate mappings are available. By providing the flexibility to tailor the search descriptors, both simple and highly complex Active Directory schemas can be handled in a simple and consistent manner. By providing the LDAP interfaces, the Identity Mapping feature brings together two disparate environments allowing the sharing of data and reduction in the number of storage islands where spare storage cannot be used in any other environment. 20

How to Use Microsoft Active Directory as an LDAP Source with the Oracle ZFS Storage Appliance November 2014 Version 1.0 Author: Andrew Ness Oracle Corporation World Headquarters 500 Oracle Parkway Redwood Shores, CA 94065 U.S.A. Worldwide Inquiries: Phone: +1.650.506.7000 Fax: +1.650.506.7200 Copyright 2014, Oracle and/or its affiliates. All rights reserved. This document is provided for information purposes only and the contents hereof are subject to change without notice. This document is not warranted to be error-free, nor subject to any other warranties or conditions, whether expressed orally or implied in law, including implied warranties and conditions of merchantability or fitness for a particular purpose. We specifically disclaim any liability with respect to this document and no contractual obligations are formed either directly or indirectly by this document. This document may not be reproduced or transmitted in any form or by any means, electronic or mechanical, for any purpose, without our prior written permission. Oracle and Java are registered trademarks of Oracle and/or its affiliates. Other names may be trademarks of their respective owners. Intel and Intel Xeon are trademarks or registered trademarks of Intel Corporation. All SPARC trademarks are used under license and are trademarks or registered trademarks of SPARC International, Inc. AMD, Opteron, the AMD logo, and the AMD Opteron logo are trademarks or registered trademarks of Advanced Micro Devices. UNIX is a registered trademark licensed through X/Open Company, Ltd. 0611 oracle.com