Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 3 Next »

Configuration

Setting up a SSHLDAP instance consists of defining your LDAP schema according to a predefined set of variables in a file that is sourced before running the install script. These variables are as follows:

VariableDescriptionRecommended Value
SSHLDAP_BASE_DNThis defines the base location to search for Users, Groups, and Hosts.dc=${ziD},dc=com, where zID is the ziNet ID
SSHLDAP_BASE_TENANT_DNThis is the location of the tenant container. This allows SSHLDAP to support multi-tenant applications.dc=tenants,${SSHLDAP_BASE_DN}
SSHLDAP_BASE_OPS_DNThis is the location of the base LDAP container that holds SSH-specific LDAP Groups (for example a Host is an LDAP group).dc=ops,${SSHLDAP_BASE_DN}
SSHLDAP_USERS_TENANT_DNThis is the location of the User accounts for a specific tenant.ou=People,ou=${localTenantId},${SSHLDAP_BASE_TENANT_DN}, where localTenantId is the current tenantID.
SSHLDAP_GROUPS_TENANT_DNThis is the location of Groups for a specific tenant.ou=Groups,ou=${localTenantId},${SSHLDAP_BASE_TENANT_DN}
SSHLDAP_GROUPS_OPS_DNThis is the location of SSHLDAP Groups entities.ou=Groups,${SSHLDAP_BASE_OPS_DN}
SSHLDAP_LAYERS_OPS_DNThis is the location of SSHLDAP Layer entities.ou=Layers,${SSHLDAP_BASE_OPS_DN}
SSHLDAP_HOSTS_OPS_DNThis is the location of SSHLDAP Host entities.ou=Hosts,${SSHLDAP_BASE_OPS_DN}
SSHLDAP_SVCS_OPS_DNThis is the location that the SSHLDAP admin service account should be placed.ou=ServiceAccounts,${SSHLDAP_BASE_OPS_DN}
SSHLDAP_SUDO_OPS_DNThis is the location of SSHLDAP Sudo entities. This provides sudo access to a server.ou=Sudoers,${SSHLDAP_BASE_OPS_DN}
SSHLDAP_VARS_OPS_DNThis is the location of SSHLDAP variables for keeping track of the next available posixGroup or posixAccount counters. This helps to keep unique IDs.ou=Variables,${SSHLDAP_BASE_OPS_DN}
SSHLDAP_POSIX_UID_UPPERThis is the upper limit that local Linux accounts are assigned. As new SSHLDAP entities are created this counter will be the first available ID to be assigned to that entity.Must be a unique number greater than the highest uidNumber for all servers that will be setup using SSHLDAP. Normally 2000 is sufficient. But this depends on your specific environment.
SSHLDAP_POSIX_GUID_UPPERThis is the upper limit that local Linux groups are assigned. As new SSHLDAP entities are created this counter will be the first available ID to be assigned to that entity.Must be a unique number greater than the highest gidNumber for all servers that will be setup using SSHLDAP. Normally 2000 is sufficient. But this depends on your specific environment.
SSHLDAP_LDAP_FMT_OPTIONSLDAP search options"-LLL -o nettimeout=10 -o ldif-wrap=no"
SSHLDAP_LDAP_SERVER_URIThis is the location of the SSHLDAP LDAP server.ldaps://prod-ds1.ops.<your domain>.com:1636
SSHLDAP_SECURITY_GRPSThis is a comma separated list of local (NOT LDAP) Linux groups that should be allowed access to server. This variable enables existing legacy groups which have local logins to continue to have access to the server after SSHLDAP is isntalled.Varies. For Amazon Web Services EC2 Ubuntu instances, this value should be "ubuntu". That user account that all EC2 instances are spun up with.
SSHLDAP_PASSWD_SERVER_URIThis is the URI of a server that will be used for password changes rather than ldappasswd. 
SSHLDAP_ACI_DN_TYPEThis variable is used to construct a LDAP ACI that provides access to the LDAP password attributes. This allows for suppression of these attributes within the directory, but then provide a limited set of users access to the attributes. This is used on conjunction with SSHLDAP_ACI_DN. userdn or groupdn
SSHLDAP_ACI_DN

The following is an example:

dn: dc=${ziD},dc=com
changetype: modify
add: aci
aci: (target = "ldap:///dc=${ziD},dc=com")
(targetattr = "isMemberOf || memberOf || sshPublicKey || inetUserStatus || pwdAccountLockedTime || ds-pwp-account-disabled")
(version 3.0;acl "sshldap read attributes dc=${ziD},dc=com";
allow (search, read)(${SSHLDAP_ACI_DN_TYPE} ="ldap:///${SSHLDAP_ACI_DN}");)

an LDAP DN. See:

 

Scripts

 

 

  • No labels

0 Comments

You are not logged in. Any changes you make will be marked as anonymous. You may want to Log In if you already have an account.