Using an external LDAP server for authentication
Posted: Fri Feb 24, 2006 3:59 pm
Sorry to have to ask about this, but I've been over all the past posts, tech notes (including "External Authentication Using LDAP") and other material I can find, and am still stuck.
We are evaluating Scalix 10 as a possible replacement for our aging Exchange 5.5 server. We operate a company LDAP server, which we use for employee authentication on in-house applications, and are hoping to use this to authenticate employees for access to Scalix web-mail. We installed Scalix 10 on a Fedora Core 4 test box for evaluation.
The Fedora Core 4 server is using our company LDAP server for user authentication. That works fine.
We've been able to establish a test user account in Scalix, and change it's authid to match its counterpart in our company LDAP server. We also followed the advice in file /var/opt/scalix/sys/pam.d/ual.remote, commenting out "auth required om_auth nullok" at the top, and uncommenting the lines under "LDAP authentication 1". Then we created file /var/opt/scalix/sys/om_ldap.conf, specifying host, search, base, and filter values appropriate to our company LDAP server.
Then we rebooted the system and tested. We can log in to Scalix webmail under the test account using the authid for it that we supplied, but only if we do not supply a password. This implies that the Scalix server is looking at the local registry (where no password is set), not our company server, for the password.
However, we've had to extrapolate quite a bit on the instructions we found in "External Authentication using LDAP", where:
- the path to the ual.remote and ual.local files is not specified (in fact, complete paths aren't specified for anything)
- the instructions regarding modifications don't match what we found in our deployed ual.remote and ual.local files, assuming we are looking in the right place
- it is implied that the sysadmin should be editing an existing om_ldap.conf file, but we couldn't find one and so just created one from scratch
Is there documentation on this topic that be a little more current, and/or more applicable to our situation? If not, how should we proceed?
We did, by the way, get LDAP integration to our company LDAP server to work just fine for a Zimbra server that's under evaluation in parallel (on another test box). They have a GUI in their admin tool for this function, so it's quite a bit simpler to do, but this does imply that the issue isn't with our company LDAP server.
Thanks - Dave W.
We are evaluating Scalix 10 as a possible replacement for our aging Exchange 5.5 server. We operate a company LDAP server, which we use for employee authentication on in-house applications, and are hoping to use this to authenticate employees for access to Scalix web-mail. We installed Scalix 10 on a Fedora Core 4 test box for evaluation.
The Fedora Core 4 server is using our company LDAP server for user authentication. That works fine.
We've been able to establish a test user account in Scalix, and change it's authid to match its counterpart in our company LDAP server. We also followed the advice in file /var/opt/scalix/sys/pam.d/ual.remote, commenting out "auth required om_auth nullok" at the top, and uncommenting the lines under "LDAP authentication 1". Then we created file /var/opt/scalix/sys/om_ldap.conf, specifying host, search, base, and filter values appropriate to our company LDAP server.
Then we rebooted the system and tested. We can log in to Scalix webmail under the test account using the authid for it that we supplied, but only if we do not supply a password. This implies that the Scalix server is looking at the local registry (where no password is set), not our company server, for the password.
However, we've had to extrapolate quite a bit on the instructions we found in "External Authentication using LDAP", where:
- the path to the ual.remote and ual.local files is not specified (in fact, complete paths aren't specified for anything)
- the instructions regarding modifications don't match what we found in our deployed ual.remote and ual.local files, assuming we are looking in the right place
- it is implied that the sysadmin should be editing an existing om_ldap.conf file, but we couldn't find one and so just created one from scratch
Is there documentation on this topic that be a little more current, and/or more applicable to our situation? If not, how should we proceed?
We did, by the way, get LDAP integration to our company LDAP server to work just fine for a Zimbra server that's under evaluation in parallel (on another test box). They have a GUI in their admin tool for this function, so it's quite a bit simpler to do, but this does imply that the issue isn't with our company LDAP server.
Thanks - Dave W.