[Date Prev][Date Next]
[Chronological]
[Thread]
[Top]
Re: ACL/ACI && SASL
Turbo Fredriksson wrote:
"Quanah" == Quanah Gibson-Mount <quanah@stanford.edu> writes:
We use
Quanah> Kerberos V5 extensively, and make use of krb5PrincipalName
Quanah> to do the mappings you are talking about, which indeed
Quanah> allows us to have more flexible ACL's.
Could you give me some ACL/ACI examples on how you have set it up?
We do exactly the same. You need to use a saslregexp to translate the
Kerberos SASL identity into an LDAP username - we use:
saslRegexp uid=(.*),cn=(.*),cn=GSSAPI,cn=auth \
ldap:///dc=inf,dc=ed,dc=ac,dc=uk??sub?krbName=$1@$2
(We're storing a user's Kerberos principal in the krbName attribute)
Quanah> I will note that for the servers, you will want to compile
Quanah> them against Heimdal K5 and NOT MIT Kerberos V5 if you are
Quanah> using threads, as your servers will not be stable
Quanah> otherwise. ;) For clients, it doesn't really matter too
Quanah> much.
We've patched Cyrus SASL 1.x locally to add support for a mutex around
GSSAPI operations. Providing that _every_ GSSAPI operation is mutex
protected, slapd seems to run fine with MIT Kerberos. I'm happy to make
the patch available to anyone who's interested.
Cheers,
Simon.