mac os x authentication

22
Mac OS X Authentication Kerberos and LDAP Issue Darren R. Davis Macintosh Specialist University of Utah Student Computing Labs

Upload: others

Post on 13-Jan-2022

11 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Mac OS X Authentication

Mac OS X Authentication

Kerberos and LDAP Issue

Darren R. Davis

Macintosh Specialist

University of Utah

Student Computing Labs

Page 2: Mac OS X Authentication

• Kerberos• Enterprise Directory

– Using LDAP to search

• Mac OS X Client Setup– Kerberos– Directory Access

System Implementation

Page 3: Mac OS X Authentication

• Ticket based authentication developed at MIT (many web sites)

• Many applications support it for authentication and authorization

• Realm = UTAH.EDU• Three KDCs

– Secured and replicated– Configured for fail-over

Kerberos

Page 4: Mac OS X Authentication

• Lightweight Directory Access Protocol• Directories are special network

databases optimized for searching– Think of a phone book– You have name, search, and find number– Used for storing user information

• SCL does not store passwords in the Directory

LDAP Directory

Page 5: Mac OS X Authentication

• All Mac OS X clients running Jaguar• Kerberos client (built in)• Directory configuration (built in)

– Apple Directory Access Utility

Mac OS X 10.2.x Clients

Page 6: Mac OS X Authentication

• Must edit XML document– /etc/authorization

• Several configuration options– Kerberos authentication required for login– Post-login Kerberos authentication

• Apple support documents– 107153– 107154

Enabling Kerberos Login

Page 7: Mac OS X Authentication

• Apple supplied utility• “Directory Access”• Configure LDAPv3

Mac OS X Directory Setup

Page 8: Mac OS X Authentication

Mac OS X Login Process

KerberosClient Plug-In

to Login

Mac OS XLogin

DirectoryServer

Login passes user name to Directory Server

A default user created just for LDAP is used to authenticate to Directory to get user information.

Page 9: Mac OS X Authentication

Mac OS X Login Process

KerberosClient Plug-In

to Login

Mac OS XLogin

DirectoryServer

If user is in the Directory, user attributes are returned

Page 10: Mac OS X Authentication

Mac OS X Login Process

KerberosClient Plug-In

to Login

Mac OS XLogin

DirectoryServer

Kerberos Client has user info, so authenticate

KerberosServer

Page 11: Mac OS X Authentication

Mac OS X Login Process

KerberosClient Plug-In

to Login

Mac OS XLogin

DirectoryServer

Yes! user is authentic

KerberosServer

Page 12: Mac OS X Authentication

Mac OS X Login Process

KerberosClient Plug-In

to Login

Mac OS XLogin

DirectoryServer

Directory searched again for user attributes

LDAP BIND Attempted!Meaning the Username and Kerberos Password sent to Directory Server.

Page 13: Mac OS X Authentication

Mac OS X Login Process

KerberosClient Plug-In

to Login

Mac OS XLogin

DirectoryServer

Login gets remaining user attributes

Page 14: Mac OS X Authentication

Mac OS X Login ProcessUser is logged in and attributes used for user identity

Page 15: Mac OS X Authentication

• Use SSL for all LDAP information– Everything is encrypted so OK

• Configure Directory Access to use AuthenticationAuthority attribute– Set to an existing Directory attribute that

always has a value!

Solutions

Page 16: Mac OS X Authentication

Directory Access

Page 17: Mac OS X Authentication

Directory Access

Page 18: Mac OS X Authentication

Directory Access

Page 19: Mac OS X Authentication

Directory Access

Page 20: Mac OS X Authentication

Directory Access

Page 21: Mac OS X Authentication

Directory Access

Page 22: Mac OS X Authentication

Questions and Answers

?