• Keine Ergebnisse gefunden

User Identities 297 Network–wide Usermanagement: NIS (uses RPC) NIS (binding client to server) 5

N/A
N/A
Protected

Academic year: 2022

Aktie "User Identities 297 Network–wide Usermanagement: NIS (uses RPC) NIS (binding client to server) 5"

Copied!
5
0
0

Wird geladen.... (Jetzt Volltext ansehen)

Volltext

(1)

Back to UNIX-Usermanagement: Concept of Groups

each user belongs toexactly oneprincipal group (❀/etc/passwd) the group ID and name defined in/etc/group

users may belong to additional groups

$ id theobald

uid=55177(theobald) gid=1111(stl)

groups=1111(stl), 1113(stlnagios),60001(cuda)

corresponding entries in/etc/group cuda:*:60001:dweber,bohr,theobald

5. User Identities 293

Managing Users: Remarks

• password file protection: file locking, commandvipw

• different usersshould havedifferent UIDs.

• network wide identities with NIS, NIS+, SMB, LDAP . . .

Managing Users: Creating an Account

• append a line in/etc/passwd, use new UID

• if a new group ID is used, append a line in /etc/group

• (Linux/Solaris) append a line in/etc/shadow, password field = ,,*”

• create the home directory of the user

• change owner and group of the home directory

• change protection bits of the home directory

• set the first password of the user with thepasswdcommand

5. User Identities 295

Managing Users: Disabling/Removing an Account

• set the corresponding password field in/etc/shadow to ,,*”

• change protection bits of the home directory to---

• do a backup of the home directory

• recursively delete the contents of the home directory

• remove entry from/etc/passwd

(2)

Managing Users: useradd/userdel

tools (not standardized)

adduser/useraddandrmuser/deluser/userdelcommands

The steps above are especially useful

• if tools likeadduserare missing

• for shell scripts creating many accounts

5. User Identities 297

Network–wide Usermanagement: NIS (uses RPC)

NIS (binding client to server)

5. User Identities 299

(3)

Network–wide Usermanagement: NIS (1)

NIS = network information service

invented by Sun as an RPC application ≈1988 needportmap(FreeBSD:rpcbind) service consists of

• server: distributes user account informationypserv

• client: asks for correct authenticationypbind

common identity string: theYP–Domainname(see domainname(1)) ypinitsets up a NIS server from/etc/master.passwd

5. User Identities 301

Network–wide Usermanagement: NIS (2)

server: startypserv NISmapsunder/var/yp control access through

• /var/yp/securenets(FreeBSD/Linux)

• /var/yp/ypserv.acl(OpenBSD)

update/etc/master.passwd ❀makein/var/yp

Problem: where do the usernames come from?

5. User Identities 303

Network–wide Usermanagement: NIS (3)

client: startypbind, domain name is command-line arg two ways to refer to NIS-entries:

• /etc/nsswitch.conf includenis keyword

• /etc/master.passwd include+:*:::::::: entry passwdcommand❀local password file❀NIS server same goes for group, hosts, services, . . .

rootaccountlocally(for network problems, server shutdown etc.)

(4)

Network–wide Usermanagement: NIS (4)

commands

ypwhichprints the NIS server name

ypmatch username passwdprints the passwd entry of username ypcat passwdprints the passwd map

more centralisation : group, services, hosts, . . .

5. User Identities 305

Network–wide Usermanagement: LDAP overview

LDAP=lightweight directory access protocol concept used withActive Directorywithin Windows openldap: user management / AD emulation / integration

server sideslapd

AD = special case of LDAP data tedious configuration work maybe SSL configuration

client side PAM

nss ldap ldap.conf

Network–wide Usermanagement: LDAP client

configure LDAP server to be contacted (ldap port 389, ldaps 636) /usr/local/etc/ldap.conf

/usr/local/etc/openldap/ldap.conf

-> host stl-s-proj2.htw-saarland.de stl-s-proj1.htw-saarland.de

simple LDAP query

ldapsearch -x -b "ou=organizational_unit"

install packagenss ldap

(enablesldapkeyword in/etc/nsswitch.conf)

install packagepam ldap(enablesldapkeyword in/etc/pam.dfiles)

5. User Identities 307

PAM: Mixing Authentication Methods

• different auth for different users

• different auth for different services

• extensible mechanism for new auth methods

(5)

5. User Identities 309

Pluggable Authentication Module (1)

variety of authentication methods

• smartcards

• Kerberos

• one–time–passwords (OPIE)

• . . . (what next?)

configurablemodulesneeded❀PAM

Pluggable Authentication Module (2)

directory /etc/pam.d

config files with sections auth authentication functions

account account management functions session session handling functions

password password management functions entries (example):

auth sufficient pam_opie.so

5. User Identities 311

Managing Users: More Commands

password-related commands for users and admins

• vipw(root)

• chpasschange password entries (root)

• chshchange shell (root/user)

• chfnchange real name (root/user)

• passwdchange password (root/user)

• pw swiss army knife to change password entries (FreeBSD)

Referenzen

ÄHNLICHE DOKUMENTE

National strategies (2.a.), national competent authorities / bodies (2.b.) & level of discretion on transposition and implementation given to Member States (2.g.) In

quamvis eryfipelas faepius fpuria fit, id tamen ut ftatirn monflrabimus alia e x caufa profi- ciscitur. I n univerfum quoque alienus ab eo fum, ut inflammationem ftatuam,

The Nestar CP/M utility SETREAL.COM makes such usage possible, by temporarily making available to the operating system the software that allows the user to read

(containing virtual device drivers).. It may also contain a NETWORK e PROFILE configuration file. Boot diskettes are available from your system manager. Creating

The configuration settings includes information such as the IP address; the Network Storage Server name; the Workgroup name; all User account details; any Share details and access

public static void main(String[] argv) { Socket socket;..

public static void main(String[] argv) { Socket socket;.

While traffic models that are based on moment generating functions are known for a variety of types of flows, we advance theory by providing corresponding models for a number