Serveur LDAP ne marche pas - réseaux et sécurité - Linux et OS Alternatifs
Marsh Posté le 16-03-2007 à 08:42:30
Certainement.
Donnez moi la méthode.
Je rentre toutes les informations que le système me demande.
Marsh Posté le 16-03-2007 à 15:11:09
Finalement mon serveur comment à marcher. J'ai opté pour un serveur PDC Samba LDAP.
Mais je suis bloqué au niveau du smbldap-populate.
Voici le message qu'il me ramène
entry sambaDomaineName=srvdonnees,dc=srvldap,dc=ci already exist. Updating it ...
failed to modify entry entry: modifications require authentication at /usr/sbin/smbldap-populate line 488, <GEN1> line 21.
Please provide a password for the domain root:
/usr/sbin/smbldap-passwd: user root doesn't exist .
Avez vous une idée du problème.
Marsh Posté le 17-03-2007 à 11:01:31
Donnez moi un coup de main.
Voici ma source de travail :
http://damstux.free.fr/wiki/index. [...] Samba_LDAP
Marsh Posté le 17-03-2007 à 13:10:37
J'avance petit à petit.
Voici mon nouveau problème:
Je suis à l'authentification Unix.
J'ai passé l'étape de NSS et PAM
Quand je lance getent passwd voici les erreurs que j'ai:
debian1:~# getent passwd
root:x:0:0:rootrootbin/bash
daemon:x:1:1:daemonusr/sbinbin/sh
bin:x:2:2:binbinbin/sh
sys:x:3:3:sysdevbin/sh
sync:x:4:65534:syncbinbin/sync
games:x:5:60:gamesusr/gamesbin/sh
man:x:6:12:manvar/cache/manbin/sh
lp:x:7:7:lpvar/spool/lpdbin/sh
mail:x:8:8:mailvar/mailbin/sh
news:x:9:9:newsvar/spool/newsbin/sh
uucp:x:10:10:uucpvar/spool/uucpbin/sh
proxy:x:13:13:proxybinbin/sh
www-data:x:33:33:www-datavar/wwwbin/sh
backup:x:34:34:backupvar/backupsbin/sh
list:x:38:38:Mailing List Managervar/listbin/sh
irc:x:39:39:ircdvar/run/ircdbin/sh
gnats:x:41:41:Gnats Bug-Reporting System (admin)var/lib/gnatsbin/sh
nobody:x:65534:65534:nobodynonexistentbin/sh
Debian-exim:x:102:102:var/spool/exim4bin/false
srvtest:x:1000:1000:serveur test,,,home/srvtestbin/bash
messagebus:x:100:103:var/run/dbusbin/false
hal:x:104:104:Hardware abstraction layer,,,var/run/halbin/false
sshd:x:101:65534:var/run/sshdbin/false
identd:x:103:65534:var/run/identdbin/false
bind:x:105:107:var/cache/bindbin/false
saned:x:109:109::/home/saned:/bin/false
gdm:x:106:111:Gnome Display Manager:/var/lib/gdm:/bin/false
SOS pour un frère en difficulté
Marsh Posté le 29-06-2007 à 09:41:50
J'ai repris mon install avec debian etch,
Mon objectif est de mettre en place un serveur proxy avec authentification LDAP.
J'ai configuré Openldap, tout marche très bien. j'arrive à joindre des users au domain.
J'ai configuré squid et tout semble bien marché mais quand je vais sur un poste client et que je lance mon navigateur, je n'arrive pas à m'authentifier. aucun mot de passe ne marche.
Que peut être le problème ?
Merci
Marsh Posté le 29-06-2007 à 10:24:28
rootpw admin
# slappasswd
New Password:
Re-enter new password:
{SSHA}5y67xJ/t7esuGKUD7TQPcgykd8xiYMO2
lol ca vient faire quoi ca ici ?
Marsh Posté le 29-06-2007 à 10:34:53
J'ai corrigé tout ça voilà pourquoi mon ldap marche très.
C'est maintenant l'authentification squid qui ne marche pas dans le navigateur
Marsh Posté le 15-03-2007 à 17:44:19
Salut à tous,
Je suis en train de mettre en oeuvre service ldap sur mon serveur Debian Sarge.
Malheusement j'ai des problèmes de configuration.
Voici mon fichier /etc/ldap/slapd.conf
# Allow LDAPv2 binds
allow bind_v2
# This is the main slapd configuration file. See slapd.conf(5) for more
# info on the configuration options.
#######################################################################
# Global Directives:
# Features to permit
#allow bind_v2
# Schema and objectClass definitions
include /etc/ldap/schema/core.schema
include /etc/ldap/schema/cosine.schema
include /etc/ldap/schema/nis.schema
include /etc/ldap/schema/inetorgperson.schema
# Schema check allows for forcing entries to
# match schemas for their objectClasses's
schemacheck on
# Where the pid file is put. The init.d script
# will not stop the server if you change this.
pidfile /var/run/slapd/slapd.pid
# List of arguments that were passed to the server
argsfile /var/run/slapd.args
# Read slapd.conf(5) for possible values
loglevel 0
# Where the dynamically loaded modules are stored
modulepath /usr/lib/ldap
moduleload back_bdb
#######################################################################
# Specific Backend Directives for bdb:
# Backend specific directives apply to this backend until another
# 'backend' directive occurs
backend bdb
checkpoint 512 30
#######################################################################
# Specific Backend Directives for 'other':
# Backend specific directives apply to this backend until another
# 'backend' directive occurs
#backend <other>
#######################################################################
# Specific Directives for database #1, of type bdb:
# Database specific directives apply to this databasse until another
# 'database' directive occurs
database bdb
# The base of your directory in database #1
suffix "dc=srvdonnees, dc=ci"
rootdn "cn=admin, dc=srvdonnnees, dc=ci"
rootpw admin
# slappasswd
New Password:
Re-enter new password:
{SSHA}5y67xJ/t7esuGKUD7TQPcgykd8xiYMO2
# Where the database file are physically stored for database #1
directory "/var/lib/ldap"
# Indexing options for database #1
index objectClass eq
# Save the time that the entry gets modified, for database #1
lastmod on
# Where to store the replica logs for database #1
# replogfile /var/lib/ldap/replog
# The userPassword by default can be changed
# by the entry owning it if they are authenticated.
# Others should not be able to see it, except the
# admin entry below
# These access lines apply to database #1 only
access to attribute=userPassword
by dn="cn=admin, dc=srvdonnees, dc=ci" write
by anonymous auth
by self write
by * none
# Ensure read access to the base for things like
# supportedSASLMechanisms. Without this you may
# have problems with SASL not knowing what
# mechanisms are available and the like.
# Note that this is covered by the 'access to *'
# ACL below too but if you change that as people
# are wont to do you'll still need this if you
# want SASL (and possible other things) to work
# happily.
access to dn.base="" by * read
# The admin dn has full write access, everyone else
# can read everything.
access to *
by dn="cn=admin, dc=srvdonnees, dc=ci" write
by * read
# For Netscape Roaming support, each user gets a roaming
# profile for which they have write access to
#access to dn=".*,ou=Roaming,o=morsnet"
# by dn="cn=admin,dc=srvdonnees" write
# by dnattr=owner write
#######################################################################
# Specific Directives for database #2, of type 'other' (can be bdb too):
# Database specific directives apply to this databasse until another
# 'database' directive occurs
#database <other>
# The base of your directory for database #2
#suffix "dc=debian,dc=org"
Merci de me donner un coup de main.