AD Schema Update IPBrick iportalmais



Similar documents
IPBrick - Member of AD domain IPBrick iportalmais

IPBrick - Member of an AD domain IPBRICK SA

Troubleshooting Active Directory Server

Managing an Active Directory Infrastructure O BJECTIVES

Configuring Microsoft Active Directory for Oracle Net Naming. An Oracle White Paper April 2014

LDAP Server Configuration Example

Configuring Microsoft Active Directory for Integration with NextPage NXT 3 Access Control

Modifying the Active Directory Schema to Support Mac Systems

Active Directory Schema modification in SafeWord RemoteAccess

Managing an Active Directory Infrastructure

Configuring Microsoft Active Directory 2003 for Net Naming. An Oracle White Paper September 2008

Integrating PISTON OPENSTACK 3.0 with Microsoft Active Directory

LDAP Server Configuration Example

Step-by-Step Guide to Active Directory Bulk Import and Export

Using LDAP Authentication in a PowerCenter Domain

Linux/Unix Active Directory Authentication Integration Using Samba Winbind

Configuring Apache Web Server for x509 User Authentication

Steps to setup authentication and enrolment through LDAP protocol

Step-by-Step Guide to Bulk Import and Export to Active Directory

LDAP Implementation AP561x KVM Switches. All content in this presentation is protected 2008 American Power Conversion Corporation

Upgrading User-ID. Tech Note PAN-OS , Palo Alto Networks, Inc.

Directory Configuration Guide

How To Enable A Websphere To Communicate With Ssl On An Ipad From Aaya One X Portal On A Pc Or Macbook Or Ipad (For Acedo) On A Network With A Password Protected (

Customer Tips. Configuring Color Access on the WorkCentre 7328/7335/7345 using Windows Active Directory. for the user. Overview

BlackShield ID. QUICKStart Guide. Integrating Active Directory Lightweight Services

How To - Implement Single Sign On Authentication with Active Directory

Active Directory Domain Migration Checklist ADUM Active Directory Migrator

Introduction Installing and Configuring the LDAP Server Configuring Yealink IP Phones Using LDAP Phonebook...

LifeSize Control Installation Guide

HELP DOCUMENTATION E-SSOM DEPLOYMENT GUIDE

How to install Small Business Server 2003 in an existing Active

ILTA HAND 6B. Upgrading and Deploying. Windows Server In the Legal Environment

Technical Bulletin 005 Revised 2010/12/10

RSA Authentication Manager 7.1 Microsoft Active Directory Integration Guide

Configuring Color Access on the WorkCentre 7120 Using Microsoft Active Directory Customer Tip

How to Enable LDAP Directory Services Authentication to Microsoft Active Directory in the HP cclass Onboard Administrator

WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide

How To Use Directcontrol With Netapp Filers And Directcontrol Together

The following gives an overview of LDAP from a user's perspective.

Active Directory Change Notifier Quick Start Guide

How To Take Advantage Of Active Directory Support In Groupwise 2014

SCOPTEL WITH ACTIVE DIRECTORY USER DOCUMENTATION

Managing User Accounts

How To Authenticate On An Xtma On A Pc Or Mac Or Ipad (For A Mac) On A Network With A Password Protected (For An Ipad) On An Ipa Or Ipa (For Mac) With A Log

Configuring idrac6 for Directory Services

Apple Technical White Paper. Best Practices for Integrating OS X Lion with Active Directory

Integration Guide. SafeNet Authentication Service. Integrating Active Directory Lightweight Services

Configuring User Identification via Active Directory

EMC Celerra Network Server

Basic Configuration. Key Operator Tools older products. Program/Change LDAP Server (page 3 of keyop tools) Use LDAP Server must be ON to work

Chapter. Managing Group Policy MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER:

Module 3: Implementing an Organizational Unit Structure

Active Directory and Cisco CallManager Integration Troubleshooting Guide

Application Note. SA Server and ADAM

Tool Tip. SyAM Management Utilities and Non-Admin Domain Users

PRODUCT WHITE PAPER LABEL ARCHIVE. Adding and Configuring Active Directory Users in LABEL ARCHIVE

Module 4: Implementing User, Group, and Computer Accounts

How To Set Up A Webmin Account On A Libc (Libc) On A Linux Server On A Windows 7.5 (Amd) With A Password Protected Password Protected (Windows) On An Ubuntu (Amd

Active Directory Quick Reference Guide for PowerCAMPUS Self-Service 7.x. Release 5 July 2011

LDaemon. This document is provided as a step by step procedure for setting up LDaemon and common LDaemon clients.

Sample Configuration: Cisco UCS, LDAP and Active Directory

Using Windows Administrative Tools on VNX

CHAPTER THREE. Managing Groups

Create, Link, or Edit a GPO with Active Directory Users and Computers

Sharp Remote Device Manager (SRDM) Server Software Setup Guide

How to monitor AD security with MOM

Managing Celerra for the Windows Environment

Quality Center LDAP Guide

How To - Implement Clientless Single Sign On Authentication in Single Active Directory Domain Controller Environment

SharePoint AD Information Sync Installation Instruction

NSi Mobile Installation Guide. Version 6.2

HP Device Manager 4.7

Managing User Accounts

Flexible Identity. LDAP Synchronization Agent guide. Bronze. version 1.2

Migrating Active Directory to Windows Server 2012 R2

Deploying ModusGate with Exchange Server. (Version 4.0+)

escan SBS 2008 Installation Guide

How To Install Ctera Agent On A Pc Or Macbook With Acedo (Windows) On A Macbook Or Macintosh (Windows Xp) On An Ubuntu (Windows 7) On Pc Or Ipad

In the Active Directory Domain Services Window, click Active Directory Domain Services.

MICROSOFT ISA SERVER 2006

Novell Identity Manager

Skyward LDAP Launch Kit Table of Contents

SITEMINDER SSO FOR EMC DOCUMENTUM REST

Modular Messaging. Release 3.0 / 3.1. Diminished Permissions for Exchange.

IIS, FTP Server and Windows

How to Order and Install Odette Certificates. Odette CA Help File and User Manual

Quick Start Guide for Parallels Virtuozzo

Microsoft Virtual Labs. Active Directory New User Interface

S/MIME on Good for Enterprise MS Online Certificate Status Protocol. Installation and Configuration Notes. Updated: October 08, 2014

SCADA Security. Enabling Integrated Windows Authentication For CitectSCADA Web Client. Applies To: CitectSCADA 6.xx and 7.xx VijeoCitect 6.xx and 7.

Integrating idrac 7 with Microsoft Active Directory

Integrating idrac7 With Microsoft Active Directory

Alpha High Level Description

Active Directory integration with CloudByte ElastiStor

Installation Guide. . All right reserved. For more information about Specops Inventory and other Specops products, visit

The Windows Server 2003 Environment. Introduction. Computer Roles. Introduction to Administering Accounts and Resources. Lab 2

Digipass Plug-In for IAS. IAS Plug-In IAS. Microsoft's Internet Authentication Service. Installation Guide

Transcription:

AD Schema Update IPBrick iportalmais October 2006

2 Copyright c iportalmais All rights reserved. October 2006. The information in this document can be changed without further notice. The declarations, technical data, configurations and recommendations of this document are supposedly precise and reliable, but they are presented with no expressed or implicit warranty. AD Schema Update iportalmais - 2006

Contents 1 Active Directory - LDAP 5 1.1 Microsoft Services For Unix...................... 5 1.2 Active Directory - Schema SNAP-IN................. 8 1.3 Windows 2003 Server Support Tools................. 8 1.4 AutoFS LDAP Schema......................... 9 1.4.1 Schema Definitions....................... 9 1.4.2 AD Schema Registration.................... 9 1.4.3 Organizational Unit....................... 13 1.4.4 Anonymous Access....................... 14 2 IPBrick 15 2.1 AD Data................................. 15 2.2 IPBrick Configuration......................... 16 iportalmais - 2006 AD Schema Update

4 CONTENTS AD Schema Update iportalmais - 2006

Chapter 1 Active Directory - LDAP 1.1 Microsoft Services For Unix The MS Services for Unix software can be obtained from Microsft Website at: http://www.microsoft.com/windowsserversystem/sfu/ http://www.microsoft.com/windowsserversystem/sfu/downloads/default.asp You must login with a msn passport, the same account information that enables you to login to msn messenger. The file size is about 217.6 MB and it is an autoexecutable zip file. To install, you must follow these steps: 1. Download the file to the server; 2. Uncompress it to c:\tempsfu; 3. Now you must close all MMC consoles as well as any Active Directory managment windows you might have open; 4. Execute c:\tempsfu\setup.exe (you can delete this file later) 5. Select all the default options - Do not write anything in any of the fields; 6. For the modifications to take place, you must reboot the server. This can be done at the end. In the domain controllers where you want to create users, you must install this software. It adds tabs to the Active Directory that allow the edition and management of unix properties, like User Identification (UID) and Group Identification (GID) of objects like groups, users and machines. After finishing installing the software, it s necessary to specify the Unix Attributes for: Users; Groups; iportalmais - 2006 AD Schema Update

6 Active Directory - LDAP Figure 1.1: Administrators group properties That can be done in AD - Users and Computers. For groups (Figure 1.1) you need to specify this fields: Nis Domain: it s the AD domain (in example: iporatal2003); GID: user identification (group id); More information: GID Domain Users : 513; GID Domain Admin : 512. UID administrator: 10000 Only after the definition of Unix Attributes for groups, it s possible to define the Unix Attributes for users, because each user have a Primary Group ID. For users (Figure 1.2) its necessary to specify the following information: AD Schema Update iportalmais - 2006

1.1 Microsoft Services For Unix 7 Figure 1.2: IPBrick as AD member - Users Nis Domain: it s the AD domain (in example: iporatal2003); UID: user identification (user id); Home Directory: the user directory; Primary Group: the user group; Note: To migrate groups to IPBrick including the users that belong to those groups, it s necessary that: The groups have the Unix Attributes defined; The users members of this groups have the Unix Attributes defined; iportalmais - 2006 AD Schema Update

8 Active Directory - LDAP The users should be added to groups in: User Properties, Member of. 1.2 Active Directory - Schema SNAP-IN To enable working in LDAP schema in AD, you must activate the correct MMC Snap-In. This must be done one time per server as follows: start -> run regsvr32 schmmgmt.dll To access the snap-in, follow the steps: 1. Start -> Run : mmc 2. File -> Add/Remove Snap-in 3. Add 4. Active Directory Schema 5. Add 6. Close 7. Ok 1.3 Windows 2003 Server Support Tools A tool named ADSI Edit will be necessary. ADSI Edit is part of Windows 2003 Server Support Tools. To use this tool you must install Windows 2003 Server Support Tools, and then: 1. press START -> Run : mmc 2. File -> Add/Remove Snap-in 3. Add 4. ADSI Edit 5. Add 6. Close 7. Ok If you want to work locally at the server, you must: 1. Right click at ADSI Edit AD Schema Update iportalmais - 2006

1.4 AutoFS LDAP Schema 9 2. Select Connect To... 3. Then you should check: Connection Point: Domain and/or Configuration Computer: Default or Domain domain.com NOTA: Until the end of this chapter, we ll work with Connection Point checked for Domain or Configuration. 1.4 AutoFS LDAP Schema You must register the schema of Automount service at LDAP. 1.4.1 Schema Definitions # OID Base is 1.3.6.1.4.1.2312.4 # # Attribute types are under 1.3.6.1.4.1.2312.4.1 # Object classes are under 1.3.6.1.4.1.2312.4.2 # Syntaxes are under 1.3.6.1.4.1.2312.4.3 # Attribute Type Definitions attributetype ( 1.3.6.1.1.1.1.25 NAME automountinformation DESC Information used by the autofs automounter EQUALITY caseexactia5match SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 SINGLE-VALUE ) objectclass ( 1.3.6.1.1.1.1.9 NAME automount SUP top STRUCTURAL DESC An entry in an automounter map MUST ( cn $ automountinformation $ objectclass ) MAY ( description ) ) objectclass ( 1.3.6.1.4.1.2312.4.2.2 NAME automountmap SUP top STRUCTURAL DESC An group of related automount objects MUST ( ou ) ) 1.4.2 AD Schema Registration You can choose one of two procedures to register LDAP schema of automount class of LDAP on AD. One of them is manual and the other is automatic. Only one of this should be executed, never both. These two procedures are now explained. iportalmais - 2006 AD Schema Update

10 Active Directory - LDAP Automatic In this case we ll use the following file auto.ldf: dn: CN=automountInformation,CN=Schema,CN=Configuration,<DOMAIN_BASE_DN> changetype: add objectclass: top objectclass: attributeschema cn: automountinformation distinguishedname: CN=automountInformation,CN=Schema,CN=Configuration,<DOMAIN_BASE_DN> instancetype: 4 attributeid: 1.3.6.1.1.1.1.25 attributesyntax: 2.5.5.5 issinglevalued: TRUE admindisplayname: automountinformation admindescription: Information used by the autofs automounter omsyntax: 22 ldapdisplayname: automountinformation name: automountinformation objectguid:: bx2hccx+lkkiq28wzfx4da== schemaidguid:: hw1az+cuk0av85ejqryd3a== objectcategory: CN=Attribute-Schema,CN=Schema,CN=Configuration,<DOMAIN_BASE_DN> showinadvancedviewonly: TRUE dn: changetype: modify replace: schemaupdatenow schemaupdatenow: 1 - dn: CN=automount,CN=Schema,CN=Configuration,<DOMAIN_BASE_DN> changetype: add objectclass: top objectclass: classschema cn: automount defaultobjectcategory: CN=automount,CN=Schema,CN=Configuration,<DOMAIN_BASE_DN> governsid: 1.3.6.1.1.1.1.9 instancetype: 4 objectcategory: CN=Class-Schema,CN=Schema,CN=Configuration,<DOMAIN_BASE_DN> schemaidguid:: beduwpwclu2utzstxwtdvw== subclassof: top mustcontain: automountinformation mustcontain: cn AD Schema Update iportalmais - 2006

1.4 AutoFS LDAP Schema 11 mustcontain: objectclass maycontain: description rdnattid: cn admindisplayname: automount admindescription: An entry in an automounter map objectclasscategory: 1 ldapdisplayname: automount name: automount posssuperiors: container posssuperiors: organizationalunit showinadvancedviewonly: TRUE objectguid:: 3tsP09E/dEea64uGAcwbsA== systemonly: FALSE defaultsecuritydescriptor: D:(A;;RPWPCRCCDCLCLOLORCWOWDSDDTDTSW;;;DA)(A;;RPWPCRCCDCLCLORCWOWDSDDTSW;;;SY) (A;;RPLCLORC;;;AU) dn: changetype: modify replace: schemaupdatenow schemaupdatenow: 1 - It is necessary to change <DOMAIN_BASE_DN> to the domain you re using. As an example, if you are using a domain named domain.com you should have: DC=domain,DC=com Procedure: 1. At Schema Master Server you must have the permission to update AD schema. To do this you must use the registry editor (Start -> Run -> regedt32 ); 2. Find the following key HKEY_LOCAL_MACHINE SYSTEM CurrentControlSet Services NTDS Parameters - Schema Update Allowed 3. Edit the variable named (Schema Update Allowed); 4. Click at Binary and change its value to 1. At command prompt you must execute the following command to add LDIF to AD: iportalmais - 2006 AD Schema Update

12 Active Directory - LDAP ldifde -i -k -c CN=Schema,CN=Configuration,DC=domain,DC=com \ CN=Schema,CN=Configuration,DC=domain,DC=com -s localhost \ -f auto.ldf Manual In this case you must enter the Active Directory Schema console and follow these steps: 1. Right click at Attributes and choose Create Attribute; 2. Read the notice and procede; 3. Now you must complete the form (Create New Attribute) with the following values: Common Name: automountinformation LDAP Display Name: automountinformation Unique X500 Object ID: 1.3.6.1.1.1.1.25 Description: Information used by the autofs automounter Syntax: IA5-String OK 4. Right click at Classes and choose Create Class; 5. Read notice and procede; 6. Complete the form (Create New Schema Class) with the following values: Common Name: automount LDAP Display Name: automount Unique X500 Object ID: 1.3.6.1.1.1.1.9 Description: An entry in an automounter map Parent Class: top Class Type: Structural Next Mandatory: cn, automountinformation, objectclass Optional: description Finish 7. Right click at Classes and choose Create Class; 8. Read notice and procede; 9. Complete the form (Create New Schema Class) with the following values: AD Schema Update iportalmais - 2006

1.4 AutoFS LDAP Schema 13 Common Name: automountmap LDAP Display Name: automountmap Unique X500 Object ID: 1.3.6.1.4.1.2312.4.2.2 Description: An group of related automount objects Parent Class: top Class Type: Structural Next Mandatory: ou Optional: Finish As the last task, you must: 1. Select Classes and find class named automount; 2. Right click at automount Class and select properties; 3. Tab Relationship; 4. At Possible Superior add: organizationalunit and top 5. OK 1.4.3 Organizational Unit The home location of each user is stored in an Organizational Unit (OU). First you must enter ADSI Edit and logon to Domain. Then you should: 1. Rigth click over domain DC=domain,dc=com and choose New Object. 2. Class: organizationalunit 3. Next 4. Value: auto.home 5. Next 6. Finish iportalmais - 2006 AD Schema Update

14 Active Directory - LDAP 1.4.4 Anonymous Access Its mandatory to allow anonymous access to LDAP information. This can be done trought ADSI Edit, Configuration. 1. Rigth click over the following entrance and select Properties; CN=Directory Service,CN=Windows NT,CN=Services,CN=Configuration,DC=domain,D 2. Edit the variable named dsheuristics and change the seventh digit to the value 2, as in the following example: 3. OK 4. OK Original Value - Value after edition <Not Set> 0000002 001 0010002 Then you must configure ACLs at OU=auto.home: 1. ADSI Edit - Domain; 2. Select OU=auto.home and right click; 3. Select Properties and choose Security; 4. Add an entrie with the following information: Add : ANONYMOUS LOGON : Add : Read Advanced Select line ANONYMOUS LOGON and Edit... Alter Apply onto: This object and all child objects OK OK Atention: Anonymous logon permissions should be defined only for OU=auto.home and his sons. AD Schema Update iportalmais - 2006

Chapter 2 IPBrick 2.1 AD Data An easy way to find the necessary Base DNs is using the ADSI Edit tool refered in 1.3. After connecting to server (refered in 1.3), a window like Figure 2.1 appears and the domain in use is visible (dc=iporatal2003,dc=local). Figure 2.1: ASDI Edit - Domain In Figure 2.2 the users BASE DN is visible. In this case is the username administrador. The BASE DN for that user is: cn=administrador,cn=users,dc=iporatal2003,dc=local and the users BASE DN is cn=users,dc=iporatal2003,dc=local. In groups (Figure 2.2), the BASE DN is cn=builtin,dc=iporatal2003,dc=local. iportalmais - 2006 AD Schema Update

16 IPBrick Figure 2.2: ASDI Edit - Users Figure 2.3: ASDI Edit - Groups 2.2 IPBrick Configuration In IPBrick the configuration should be in agreement to the AD. In the Figure 2.4 example, the junction will be done to a AD with the following AD Schema Update iportalmais - 2006

2.2 IPBrick Configuration 17 definitions: AD Server IP Adress: 192.168.69.28 Netbios Domain: iporatal2003 Realm: iporatal2003.local Domain Administrator: administrador; Password: (do utilizador anterior); Base DN: dc=iporatal2003,dc=local; Administrator DN: cn=administrador,cn=users,dc=iporatal2003,dc=local; Users search Base DN: cn=users,dc=iporatal2003,dc=local; Groups search Base DN: ou=builtin,dc=iporatal2003,dc=local! Attention: This data must be as the AD configuration. The data present here is just an example. Contact the AD administrator to know the correctly BASE DN s, or you can obtain that in thought information in 2.1. Figure 2.4: IPBrick like AD member To access this configuration, in IPBrick interface, go to Advanced Settings IPBrick Authentication section. iportalmais - 2006 AD Schema Update