LDAP Intergration With AIX, Linux and DB2
LDAP Intergration With AIX, Linux and DB2
LDAP Intergration With AIX, Linux and DB2
Ver 0.1
Mar 2012
Responsibility Name
Author Sonny Laskar (TCS)
Reviewed By Raj Ghose
Approved By
Distribution List
Document Version
Version Date Author Description of Change
1. INTRODUCTION...................................................................................4
8. SAMPLE SCENARIOS..........................................................................13
9. List of Abbreviations......................................................................................... 15
Example:
1) User XYZ has UID=10 amd GID=100
2) Ensure the user have no process with ps –ef | grep <username>
3) We need to have UID=11 and GID=101
4) Change UID=11 for XYZ
$ chuser id=11 XYZ
5) Change files owned by UID 10 to UID 11
$ find / -user 10 -exec chown XYZ {} \;
6) Change GID=101
$ Edit /etc/group and /etc/passwd properly
7) Change files owned by GID 100 to GID 101
$ find / -group 100 -exec chgrp 101 {} \;
8) Confirm with id command and checks permissions.
Dual Authentication:
Major Operating systems support dual authentication modes. Hence if the LDAP server is unavailable due
to any unscheduled downtime, then the users present in the local operating systems can be used to login
into the server. For this purpose, all the Application users are created on OS level.
RFC2307 Standard:
The RFC2307 standard defines the schema definition for LDAP-OS authentication. All users on LDAP to
be used for Unix-based authentication have to be created as per RFC2307 standard. Read more about
this at www.rfc-editor.org/rfc/rfc2307.txt
Crypt Encryption:
The Unix password encryption crypt will be used to store the password of all users on the LDAP server.
This is a one-way encryption.
Access Control:
The following are the advantages of Transparent LDAP over plugin-based LDAP authentication:
1) Transparent LDAP is more robust than plugin-based LDAP.
2) DB2 can use dual authentication feature of OS to have application users to still authenticate
locally thereby reducing impact during unscheduled downtime.
3) Configuring Transparent LDAP is easy compared to plugin-based LDAP.
1. Create LDAP user AMIT for TCS ETL Team member which will be used by
the ETL Admin to grant access to Datastage. The user does not need
OS/DB access.
Create the user using mkuser command and set the groups to etldev and
hostsallowedlogin to NULL and shell=/dev/null as OS/DB access is not
needed. Later the ETL Admin would grant necessary privilege from his end
to that user. Set the password of the user with passwd command. This
step will be needed whenever a new user is created. We will avoid stating
this in coming examples.
$ mkuser -R LDAP groups=etldev hostsallowedlogin=NULL shell=/dev/null
amit
$ passwd –R LDAP amit
2. Create LDAP user AMIT for TCS ETL Team member which will be used by
the ETL Admin to grant access to Datastage. The user needs DB access to
BCU database and will connect to admin node.
Create the user using mkuser command and set the groups to etldev and
hostsallowedlogin to the hostname of the server where the database
exists. In partitioned database, only allow the admin node and standby
node. If the user will use load authority to connect to all partitions then all
the servers involved in the partition setup should be allowed in
hostsallowedlogin attribute. Later the ETL Admin would grant necessary
privilege from his end to that user.
$ mkuser -R LDAP groups=etldev hostsallowedlogin=SURYAa01 amit
3. Create LDAP user AMIT for TCS Cognos Team member which will be used
by the Cognos Admin to grant access to reports. The user needs DB
access to BCU database and will connect to admin node but no OS login.
Create the user using mkuser command and set the groups to cogdev
and hostsallowedlogin to the hostname of the server where the database
exists. In partitioned database, only allow the admin node and standby
node. If the user will use load authority to connect to all partitions then all
the servers involved in the partition setup should be allowed in
hostsallowedlogin attribute. Later the Cognos Admin would grant
necessary privilege from his end to that user.
$ mkuser -R LDAP groups=cogdev
hostsallowedlogin=SURYAa01,SURYAs01,SURYAs02 shell=/dev/null amit
5. Create LDAP user AMIT for TCS DBA Team member who will have the
DBADM Admin privilege. The user needs OS access to all database
Servers.
Create the user using mkuser command and set the groups to tcsdba
and hostsallowedlogin to the hostname of all database server.
$ mkuser -R LDAP groups=tcsdba hostsallowedlogin=
dprithvi01,dprithvi02,dshukraprd,dshukrastb,dbrahaspati01,dbrahaspati0
2,dshani01,dSURYAa01,dSURYAm01,dSURYAd03,dSURYAd02,dSURYAd01,
dSURYAd04,dSURYAd06,dSURYAd05,dSURYAs01,dSURYAapp01,dSURYAap
p02 amit
6. Create LDAP user AMIT for SBI/IBM Team member who will have OS login
on a particular server with hostname TESTSVR.
$ mkuser -R LDAP hostsallowedlogin=TESTSVR amit
7. Create LDAP user AMIT for SBI/IBM Team member who needs DB access to
hostname TESTSVR but not OS access.
It the users requires only DB access and not OS access and this is true for
all the servers then set the initial shell program to /dev/null. This prevents
the user from OS access. But this will not work if the user needs OS access
on some other server.
$ mkuser -R LDAP shell=/dev/null hostsallowedlogin=TESTSVR amit
8. Create LDAP user AMIT for SBI/IBM Team member who will be a Business
user and does not need access to OS/DB and needs access to Portal only.
Such users reside outside the boundary of system users. User needs to be
created in ou=SBIUSERS.dc=com (refer chart here). Use the LDAP SOP
document for this.