SlideShare ist ein Scribd-Unternehmen logo
1 von 19
Downloaden Sie, um offline zu lesen
9 Product               Documentation

   Likewise Enterprise




                                                                  Configuring Apache Web Server
                                                                  For Single Sign-On with Likewise
  IN THIS DOCUMENT
                                                                  Abstract
  •    Setting up an Apache HTTP
       Server for single sign-on with                             Likewise Enterprise lets you join Linux and Unix computers running the
       Likewise, Kerberos, and Active                             Apache HTTP Server to Microsoft Active Directory, yielding a range of
       Directory.
                                                                  benefits for users, system administrators, and managers.
  •    Understanding Integrated
       Windows Authentication.
                                                                  Users get single sign-on: They log on once to a workstation that is
  •    Likewise’s Apache                                          authenticated through Active Directory and automatically receive Kerberos-
        authentication architecture.
                                                                  based single sign-on for other computers and applications, including the
  •    Installing and configuring the
                                                                  Apache web server. System administrators rest easy with the knowledge
        mod_auth_kerb authentication
        modules.                                                  that users accessing your intranet through HTTP are securely
  •    Generating a keytab file.                                  authenticated with Kerberos 5 and authorized for access to the resources
                                                                  on your Apache web server. Managers see their operational costs drop as
  •    Testing authentication.
                                                                  their Linux and Unix computers running Apache are centrally managed
  •    Troubleshooting authentication.
                                                                  within Active Directory. Security managers find help in their quest for
  •    Dealing with common issues.                                regulatory compliance.

  REQUIREMENTS                                                        This document describes how to configure Likewise and the Apache HTTP
                                                                      Server to provide single sign-on authentication through Kerberos.
  •     Apache HTTP Server version
        2.0 or 2.2.
  •     The Linux or Unix computer                                About Likewise Enterprise
        running Apache must be using
        a platform that Likewise                                  By joining Linux, Unix, and Mac computers to Active Directory – a secure,
        supports.
                                                                  scalable, stable, and proven identity management system – Likewise gives
  •     Root access to the Linux or                               you the power to manage all your users' identities in one place, use the
        Unix computer running
        Apache.                                                   highly secure Kerberos 5 protocol to authenticate users in the same way on
                                                                  all your systems, apply granular access controls to sensitive resources,
  •     Privileges sufficient to join the
        Linux or Unix computer                                    and centrally administer Linux, Unix, Mac, and Windows computers with
        running Apache to Active                                  group policies. Likewise includes reporting and auditing capabilities that
        Directory.
                                                                  can help improve regulatory compliance. The result: lower operating costs,
                                                                  better security, enhanced compliance.




Copyright © 2008 Likewise Software. All rights reserved. 2.26.2008.                                                                        1
Product Documentation

Likewise: Configuring Apache Web Server for Single Sign-On




                                       The information contained in this document represents the current view of Likewise
                                       Software on the issues discussed as of the date of publication. Because Likewise
                                       Software must respond to changing market conditions, it should not be interpreted to be a
                                       commitment on the part of Likewise, and Likewise Software cannot guarantee the
                                       accuracy of any information presented after the date of publication.

                                       These documents are for informational purposes only. LIKEWISE SOFTWARE MAKES
                                       NO WARRANTIES, EXPRESS OR IMPLIED.

                                       Complying with all applicable copyright laws is the responsibility of the user. Without
                                       limiting the rights under copyright, no part of this document may be reproduced, stored in,
                                       or introduced into a retrieval system, or transmitted in any form, by any means
                                       (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose,
                                       without the express written permission of Likewise Software.

                                       Likewise may have patents, patent applications, trademarks, copyrights, or other
                                       intellectual property rights covering subject matter in this document. Except as expressly
                                       provided in any written license agreement from Likewise, the furnishing of this document
                                       does not give you any license to these patents, trademarks, copyrights, or other
                                       intellectual property.

                                       © 2008 Likewise Software. All rights reserved.

                                       Likewise and the Likewise logo are either registered trademarks or trademarks of
                                       Likewise Software in the United States and/or other countries. All other trademarks are
                                       property of their respective owners.

                                       Likewise Software
                                       15395 SE 30th Place, Suite #140
                                       Bellevue, WA 98007
                                       USA




                                       Copyright © 2008 Likewise Software. All rights reserved. 2.26.2008.
Product Documentation

Likewise: Configuring Apache Web Server for Single Sign-On




                                       Table of Contents
                                       INTRODUCTION............................................................................4

                                       UNDERSTANDING INTEGRATED WINDOWS
                                       AUTHENTICATION .......................................................................4
                                       Why use Integrated Windows Authentication? ...............................................4
                                       Kerberos, NTLMSSP versus Basic Authentication .........................................5
                                       Authentication versus Authorization................................................................5


                                       LIKEWISE APACHE AUTHENTICATION ARCHITECTURE ........5
                                       Authenticating with Kerberos............................................................................6
                                       Authenticating with Basic Authentication........................................................6


                                       CONFIGURING LIKEWISE AND APACHE FOR SSO..................6
                                       Overview of Setup Process................................................................................6
                                       Requirements ......................................................................................................7
                                         Check Whether Your Apache Server Supports Dynamic Modules ..................7
                                       Install mod_auth_kerb_centeris and mod_auth_pam Authentication
                                       Modules................................................................................................................8
                                         32-Bit Systems ..................................................................................................8
                                         64-Bit Systems ..................................................................................................9
                                         Install the Packages..........................................................................................9
                                       Add Directives to Apache Configuration File ..................................................9
                                       Setup Apache Server or Virtual Server To Use SSL (Optional) ...................10
                                       Generate Kerberos keytab File ........................................................................10
                                         Find the Group Name of the Apache Web Server ..........................................10
                                         Find the Server Name of the Web Site that Requires Authentication ............11
                                         Generate a Kerberos keytab file .....................................................................12
                                       Set mod_auth_kerb_centeris.so and mod_auth_sys_group.so ..................12


                                       TESTING AUTHENTICATION .....................................................14
                                       Test Single-Sign-On authentication for a domain user ................................14
                                       Test the Basic Authentication Fallback..........................................................14


                                       TROUBLESHOOTING .................................................................15
                                       Apache Log File ................................................................................................15
                                       The Microsoft KERBTRAY utility.....................................................................15
                                       KLIST Linux or Unix Utility...............................................................................16
                                       Common Issues ................................................................................................17
                                       Contact Technical Support ..............................................................................18




                                       Copyright © 2008 Likewise Software. All rights reserved. 2.26.2008.
Product Documentation

Likewise: Configuring Apache Web Server for Single Sign-On




                                       Introduction
                                       This document describes how to configure Likewise and the Apache
                                       HTTP Server to provide single sign-on authentication through Active
                                       Directory by using Kerberos 5.

                                       The target audience is network directory administrators who manage
                                       access to workstations, servers, and other network resources within
                                       Active Directory. The guide assumes that you know how to administer
                                       Active Directory as well as computers running Linux.

                                        Note: This guide assumes that you have installed Likewise on the
                                        Linux computer running your Apache HTTP Server and that you have
                                        joined the server to Active Directory. For instructions on how to install
                                        Likewise on a Linux computer and join it to Active Directory, see the
                                        Likewise Enterprise Installation Guide at
                                        http://www.likewisesoftware.com/resources/user_documentation/.

                                       Understanding Integrated Windows
                                       Authentication
                                       Integrated Windows Authentication was introduced with the Microsoft
                                       Windows 2000 operating system. It is based on the SPNEGO, Kerberos,
                                       and NTLMSSP protocols. The SPNEGO protocol is used between the
                                       web browser and the web server to negotiate the type of authentication
                                       that will be performed, usually either Kerberos or NTLMSSP. Kerberos is
                                       the preferred authentication mechanism. Both Kerberos and NTLMSSP
                                       are secure protocols that allow computers to authenticate a user over a
                                       non-secure channel. For web sites, this means that the Secure Socket
                                       Layer (SSL) protocol does not need to be enabled during the
                                       authentication phase.

                                       Why use Integrated Windows Authentication?

                                       Integrated Windows Authentication improves the overall security of a
                                       network because the user must log on by using his or her username and
                                       password only once. All subsequent accesses by that user to resources,
                                       such as web sites, file systems, and network printers are automatically
                                       authenticated with cached security tokens. Using Integrated Windows
                                       Authentication has the benefit of a centralized user account database
                                       where information about all users is kept in Active Directory. This is more
                                       secure than duplicating user names and passwords in configuration files


                                       Copyright © 2008 Likewise Software. All rights reserved. 2.26.2008.
Product Documentation

Likewise: Configuring Apache Web Server for Single Sign-On




                                       across various server computers, not to mention the management
                                       overhead of doing so.

                                       Kerberos, NTLMSSP versus Basic Authentication

                                       Integrated Windows Authentication uses the SPNEGO, Kerberos and
                                       NTLM authentication protocols. Not all browsers are capable of
                                       understanding these protocols. Another authentication protocol, Basic
                                       Authentication, is understood by all web browsers; it works by simply
                                       transferring username and password across the network from the web
                                       browser to the web server. The drawback of using Basic Authentication
                                       is that without SSL encryption, anyone can intercept the network
                                       communication and easily find out a user’s login name and password.
                                       Thus, Basic Authentication should be used only for sites that are
                                       protected with SSL encryption.

                                       Authentication versus Authorization

                                       The term authentication refers to the process of proving a user’s identity.
                                       Authorization, on the other hand, takes place after authentication and is
                                       used to limit the users or groups to perform only the actions that they are
                                       allowed, or authorized, to perform. Integrated Windows Authentication
                                       provides only the authentication mechanism while Windows authorization
                                       is usually accomplished using Access Control Lists (ACL).

                                       Likewise Apache Authentication Architecture
                                       The Likewise Apache Authentication architecture extends Integrated
                                       Windows Authentication to the Apache web server running on a Linux or
                                       Unix system. The authentication is implemented in a dynamically loaded
                                       Apache module: mod_auth_kerb_centeris. This module is based on
                                       a BSD licensed Apache module called mod_auth_kerb, but includes
                                       modifications so that it works with the Likewise.

                                       An additional module — mod_auth_sys_group — is used to provide
                                       authorization limiting access to the web site to the domain users or
                                       groups that you specify.

                                       The mod_auth_kerb_centeris module implements the SPNEGO,
                                       Kerberos, and Basic Authentication protocols. In doing so, it provides the
                                       majority of the Integrated Windows Authentication functionality, with the
                                       exception of the NTLMSSP protocol. The module uses the SPNEGO
                                       protocol to negotiate whether Kerberos or Basic Authentication is used.



                                       Copyright © 2008 Likewise Software. All rights reserved. 2.26.2008.
Product Documentation

Likewise: Configuring Apache Web Server for Single Sign-On




                                       Authenticating with Kerberos

                                       If the client browser is able to obtain a Kerberos ticket from the Active
                                       Directory domain controller for the requested URL, Kerberos
                                       authentication is used and the user does not need to provide his or her
                                       username and password to access the web site. The Kerberos ticket is
                                       sent to the web server, which decrypts it and validates it by using the
                                       Kerberos system libraries.

                                       The Kerberos ticket contains the user’s principal name, which being
                                       created by a Windows domain controller is in the form <user>@<full
                                       domain name>; example: user@mydoamain.com.

                                       The principal name is converted by mod_auth_kerb_centeris to a
                                       format — <short domain name><user> — needed by the
                                       mod_auth_sys_group authorization module, example:
                                       MYDOMAINuser. If the authorization is successful, the server sends the
                                       requested web page to the client, but with additional authentication
                                       information that allows the web browser to validate the authenticity of the
                                       web server for mutual authentication.

                                       Authenticating with Basic Authentication

                                       If the client browser is not able to obtain a Kerberos ticket from the Active
                                       Directory Controller and mod_auth_kerb_centeris is configured with the
                                       KrbMethodK5Passwd parameter set to “on” then Basic Authentication is
                                       used. The browser prompts the user for username and password and
                                       sends this information in clear-text to the web server. The web server
                                       tries to obtain a Kerberos ticket on user’s behalf directly from the Domain
                                       Controller. If successful, it processes the Kerberos ticket and performs
                                       authorization. If the Authorization is successful, the server sends the
                                       requested web page to the client, but unlike with full Kerberos
                                       authentication, it does not include the additional authentication
                                       information that allows the client to authenticate the web server’s identity.

                                       Configuring Likewise and Apache for SSO
                                       Overview of Setup Process

                                             1. Confirm that your components meet the requirements.

                                             2. Install the mod_auth_kerb_centeris and mod_auth_pam
                                                Apache authentication modules.




                                       Copyright © 2008 Likewise Software. All rights reserved. 2.26.2008.
Product Documentation

Likewise: Configuring Apache Web Server for Single Sign-On




                                             3. Configure the main Apache server or Virtual Host to use SSL
                                                (optional).

                                             4. Generate a Kerberos keytab file for the Apache server.

                                             5. Configure the mod_auth_kerb_centeris.so and
                                                mod_auth_sys_group.so modules.

                                       Requirements

                                            •      At minimum, setting up Apache SSO authentication requires two
                                                   systems, a Linux or Unix computer running the Apache HTTP
                                                   Server and an Active Directory domain controller.

                                            •      You must have root access to a Linux or Unix system that is
                                                   supported by Likewise; for a list of supported platforms, see
                                                   http://www.likewisesoftware.com/products/likewise_enterprise/sup
                                                   ported_platforms.php.

                                            •      You must have installed the Likewise agent on the Linux or Unix
                                                   computer and joined the computer to Active Directory; for
                                                   instructions on how to install the Likewise agent and join the
                                                   server to a domain, see Likewise Enterprise Installation Guide at
                                                   http://www.likewisesoftware.com/resources/user_documentation/

                                            •      The supported versions of Apache HTTP Server are 2.0 and 2.2.
                                                   It is recommended that you use the Apache version that came
                                                   with your Linux or Unix system. If you need to install the Apache
                                                   server manually, you can get it and installation instructions at
                                                   http://httpd.apache.org.

                                            •      The Apache HTTP Server that you are using must support
                                                   dynamic loading of the Apache modules in order to load the
                                                   mod_auth_kerb_centeris module.

                                       Check Whether Your Apache Server Supports Dynamic Modules
                                             1. Execute the following command on the Linux or Unix system after
                                                the Apache HTTP Server has been installed:

                                                    # httpd –l

                                                    Depending on the system, the command may be
                                                    /usr/sbin/httpd –l, /usr/sbin/httpd2 –l or in another
                                                    location.


                                       Copyright © 2008 Likewise Software. All rights reserved. 2.26.2008.
Product Documentation

Likewise: Configuring Apache Web Server for Single Sign-On




                                               2. Verify that mod_so.c is displayed in the list of the compiled in
                                                  modules.

                                         Important: For Apache installations that are compiled from the source
                                         code, ensure that --enable-module=so is specified when
                                         ./configure is executed:

                                         # ./configure --enable-module=so



                                         Install mod_auth_kerb_centeris and mod_auth_pam Authentication
                                         Modules

                                         The mod_auth_kerb_centeris and mod_auth_pam Authentication
                                         modules are installed from RPM packages. The packages are specific to
                                         each Linux or Unix operating system, but may also vary if the Apache
                                         web server was upgraded from the version shipped with the Linux or
                                         Unix system.

                                         The following tables list the RPM package names for each supported
                                         system.

                                         32-Bit Systems
     Operating System                                  RPM packages
     Red Hat Enterprise Linux ES / AS v4               mod_auth_kerb_centeris-5.0-6.redhat.i386.rpm
     CentOS 4.2, 4.1                                   mod_auth_pam_rhel-1.0-1.i386.rpm
     CentOS 4.4, 4.3
     Fedora Core 4 (with full updates)
     Red Hat Enterprise Linux ES / AS v3               mod_auth_kerb_centeris-5.0-6.rhel3.i386.rpm
                                                       mod_auth_pam-1.1.1-1.rhel3.i386.rpm
     Fedora Core 5                                     mod_auth_kerb_centeris-5.0-6.fc5.i386.rpm
                                                       mod_auth_pam-1.1.1-4.fc5.i386.rpm
     SUSE Linux Enterprise Server 9 (SP3)              mod_auth_kerb_centeris-5.0-6.suse92.i586.rpm
     SUSE Linux Professional 9.2                       mod_auth_pam_suse-1.0-1.i586.rpm
     SUSE Linux Enterprise Server 10                   mod_auth_kerb_centeris-5.0-6.suse.apache2.2.i586.rpm
     SUSE Linux 10.1                                   mod_auth_pam_suse-1.0-1.apache2.2.i586.rpm
     SUSE Linux Professional 9.3                       mod_auth_kerb_centeris-5.0-6.suse.i586.rpm
     SUSE Linux 10.0                                   mod_auth_pam_suse-1.0-1.i586.rpm
     SUSE Linux 10.0 OSS




                                         Copyright © 2008 Likewise Software. All rights reserved. 2.26.2008.
Product Documentation

Likewise: Configuring Apache Web Server for Single Sign-On




                                         64-Bit Systems
     Operating System                                  RPM packages
     Red Hat Enterprise Linux ES / AS v4               mod_auth_kerb_centeris-5.0-6.redhat.x86_64.rpm
     CentOS 4.4, 4.3                                   mod_auth_pam-1.1.1-4.x86_64.rpm
     Fedora Core 4 (with full updates)
     Red Hat Enterprise Linux ES / AS v3               mod_auth_kerb_centeris-5.0-6.rhel3.x86_64.rpm
                                                       mod_auth_pam-1.1.1-1.rhel3.x86_64.rpm
     Fedora Core 5                                     mod_auth_kerb_centeris-5.0-6.fc5.x86_64.rpm
                                                       mod_auth_pam-1.1.1-4.fc5.x86_64.rpm
     SUSE Linux Enterprise Server 9 (SP3)              mod_auth_kerb_centeris-5.0-6.suse_heimdal.x86_64.rpm
                                                       mod_auth_pam-1.1.1-1.x86_64.rpm
     SUSE Linux Enterprise Server 10                   mod_auth_kerb_centeris-5.0-6.suse.apache2.2.x86_64.rpm
     SUSE Linux 10.1                                   mod_auth_pam-1.1.1-1.apache2.2.x86_64.rpm



                                         Contact Likewise support at http://www.likewisesoftware.com/support/ to
                                         obtain the modules for your platform.

                                         Install the Packages
                                         To install the mod_auth_kerb_centeris and mod_auth_pam packages,
                                         execute the following commands substituting the <version> for the
                                         correct version for your system:

                                           # rpm –i mod_auth_kerb_centeris-5.0-6.<version>

                                           # rpm –i mod_auth_pam<version>


                                         Note: The mod_auth_pam RPM package contains two modules. Only
                                         one of the two modules, mod_auth_sys_group.so, is necessary to
                                         complete the setup documented in this guide.

                                         The Apache web server configuration must now be modified to load the
                                         mod_auth_kerb_centeris.so and mod_auth_sys_group.so modules. The
                                         location of the Apache configuration file will depend on your Linux or
                                         Unix distribution.

                                         Add Directives to Apache Configuration File

                                         Add the following directives to the Apache configuration file to configure
                                         Apache to load the mod_auth_kerb_centeris.so and
                                         mod_auth_sys_group.so modules.



                                         Copyright © 2008 Likewise Software. All rights reserved. 2.26.2008.
Product Documentation

Likewise: Configuring Apache Web Server for Single Sign-On




     Platforms       Directives
     Red Hat         LoadModule auth_kerb_module modules/mod_auth_kerb_centeris.so
     Linux           LoadModule auth_sys_group_module modules/mod_auth_sys_group.so
     Novell SuSE     LoadModule auth_kerb_module /usr/lib/apache2-prefork/mod_auth_kerb_centeris.so
     Linux           LoadModule auth_sys_group_module /usr/lib/apache2-prefork/mod_auth_sys_group.so



                                       Setup Apache Server or Virtual Server To Use SSL (Optional)

                                       It is recommended that all web sites that require authentication
                                       communicate over the Secure Socket Layer (SSL) protocol. SSL
                                       encrypts all data that passes between the client browser and the web
                                       server. Furthermore, SSL allows performing Basic Authentication as a
                                       fallback mechanism in a secure fashion. Basic Authentication is the only
                                       fallback mechanism provided by mod_auth_kerb_centeris in the case
                                       when the primary, Kerberos authentication does not succeed. This is
                                       especially important if the protected website also needs to be accessible
                                       from outside the corporate network.

                                       Configuring SSL for the main Apache server or virtual server is beyond
                                       the scope of this guide. Various installations of the Apache web server
                                       provide sample SSL configuration files that can be included from the
                                       main httpd.conf file. In most cases you will need to generate a self-
                                       signed SSL certificate or for production environments purchase a
                                       commercial certificate. On most Linux or Unix systems a self signed
                                       certificate can be generated using the openssl command.

                                       Generate Kerberos keytab File

                                       The Kerberos keytab file is necessary to authenticate incoming requests.
                                       It contains encrypted, local copy of the host’s key and if compromised
                                       may allow unrestricted access to the host computer. It is therefore crucial
                                       to protect it with the appropriate file access permissions. This file must
                                       be readable by the user group under which the Apache web server is
                                       running, usually apache on Red Hat systems or www on SuSE systems.

                                       Find the Group Name of the Apache Web Server
                                                1. Locate the main Apache httpd.conf configuration file.

                                                2. Search the httpd.conf file for the Group directive (case
                                                   sensitive).




                                       Copyright © 2008 Likewise Software. All rights reserved. 2.26.2008.
Product Documentation

Likewise: Configuring Apache Web Server for Single Sign-On




                                                       Example: Group apache



                                       Next, you will need to find out the server name of the web site that will
                                       require authentication. The authentication will actually protect a specific
                                       directory, thus restricting access to a physical location on the file system.
                                       The directory to protect will either be in the context of the main Apache
                                       server or in the context of a Virtual Host.

                                       Find the Server Name of the Web Site that Requires Authentication
                                                1. Locate the Apache configuration file that contains the
                                                   <Directory> directive of the physical directory to be protected by
                                                   authentication. Depending on your setup this may be in the
                                                   main httpd.conf configuration file or a file included from the main
                                                   file.

                                                2.     Locate the ServerName directive within the <VirtualHost>
                                                       container containing the <Directory> directive or locate the
                                                       global ServerName directive if not using <VirtualHost>.

                                                       Example:
                                                       <VirtualHost *:80>
                                                       ServerName myserver:80
                                                       DocumentRoot /srv/www/htdocs
                                                       <Directory /srv/www/htdocs>
                                                       AllowOverride None
                                                       Options –Indexes
                                                       Order allow,deny
                                                       Allow from all
                                                       </Directory>
                                                       The server name in the example above is myserver.



                                       Note: If the ServerName is not specified in the configuration file, try
                                       doing a reverse DNS name lookup on the IP address of the host or just
                                       use the hostname of the Linux or Unix system.

                                       You will also need to know the full domain name of the domain to which
                                       the Linux or Unix system is joined. Finally, you will need to figure out
                                       where to save the generated keytab file. It is possible to keep one keytab




                                       Copyright © 2008 Likewise Software. All rights reserved. 2.26.2008.
Product Documentation

Likewise: Configuring Apache Web Server for Single Sign-On




                                       file for all Virtual Host sites on your server or to create a separate keytab
                                       file for each Virtual Host.

                                       Generate a Kerberos keytab file
                                         The steps below use a sample Apache user account name: apache, a
                                         sample server name: myserver, a sample full domain name:
                                         MYDOMAIN.COM and a sample Kerberos keytab file name:
                                         /etc/apache2/protected/krb5_myserver.keytab. Substitute your own
                                         names for these values.

                                                1. Set the KRB5_KTNAME environment variable to point to the
                                                   Kerberos keytab file to be generated.
                                                   # export
                                                   KRB5_KTNAME=FILE:/etc/apache2/protected/krb5_myserv
                                                   er.keytab

                                                2. Generate keytab entry for the default HTTP service principal.
                                                   # /usr/centeris/bin/lwinet ads keytab add HTTP –P

                                                3. Generate keytab entry for myserver service principal
                                                   # /usr/centeris/bin/lwinet ads keytab add
                                                   HTTP/myserver@MYDOMAIN.COM –P

                                                4. Generate keytab entry for myserver.mydomain.com HTTP
                                                   service principal
                                                   # /usr/centeris/bin/lwinet ads keytab add
                                                   HTTP/myserver.mydomain.com@MYDOMAIN.COM –P

                                                5. Change the group ownership of the keytab file
                                                   # chown root.www
                                                   /etc/apache2/protected/krb5_myserver.keytab

                                                6. Set appropriate file permissions of the keytab file
                                                   # chmod 640 /etc/apache2/protected/krb5_myserver.keytab


                                       Set mod_auth_kerb_centeris.so and mod_auth_sys_group.so

                                       The only configuration that remains is to modify the Apache configuration
                                       file by adding appropriate directives in each <Directory> container that is
                                       to be protected.




                                       Copyright © 2008 Likewise Software. All rights reserved. 2.26.2008.
Product Documentation

Likewise: Configuring Apache Web Server for Single Sign-On




                                       To enable single sign-on authentication, add the following directives
                                       inside the protected <Directory> container:

                                         Note: Replace /etc/apache2/protected/krb5_myserver.keytab with your
                                         own keytab file name and replace MYDOMAIN with your short domain
                                         name.

                                         AuthType Kerberos
                                         Krb5Keytab
                                         /etc/apache2/protected/krb5_myserver.keytab
                                         KrbMethodK5Passwd on
                                         AuthName "Secure Server"
                                         require group "MYDOMAINdomain users"
                                         require user “MYDOMAINAdministrator”



                                       The following table explains the meaning of the commonly used
                                       directives for mod_auth_kerb_centeris.so and mod_auth_sys_group.so
                                       modules.

                                         Directive Name                         Values                   Explanation
                                         AuthType                               “Kerberos”               This value should always be set to
                                                                                                         “Kerberos”.
                                         Krb5Keytab                             file path                Points to the location of the Kerberos
                                                                                                         V5 keytab file readable by Apache.
                                         KrbMethodK5Passwd                      “on” or “off”            Enables or disables Basic
                                                                                                         Authentication fallback mechanism.
                                                                                                         Should only be set to “on” if SSL is
                                                                                                         enabled.
                                         AuthName                               quoted                   The name of the authorization realm for
                                                                                string                   a directory. This realm is given to the
                                                                                                         client so that the user knows which
                                                                                                         username and password to send.
                                         require user                           space                    Only the named users can access the
                                                                                delimited                resource.
                                                                                user list
                                         require group                          space                    Only users in the named groups can
                                                                                delimited                access the resource.
                                                                                group list



                                       To complete the configuration, you must restart the Apache web server:



                                       Copyright © 2008 Likewise Software. All rights reserved. 2.26.2008.
Product Documentation

Likewise: Configuring Apache Web Server for Single Sign-On




                                         Red Hat Linux                    # /etc/init.d/httpd restart

                                         Novell SuSE                      # /etc/init.d/apache2 restart
                                         Linux



                                       Testing Authentication
                                       The first test is to determine if Integrated Windows Authentication is
                                       working for all domain users. The require group “MYDOMAINdomain
                                       users” directive will allow any user that is part of the “domain users”
                                       group to authenticate.

                                       Note: Use Internet Explorer because it supports Integrated Windows
                                       Authentication. Verify that the “Enable Integrated Windows
                                       Authentication” checkbox is selected in the Internet Explorer Internet
                                       Options dialog on the Advanced tab.

                                       Test Single-Sign-On authentication for a domain user

                                               1. Logon to a Windows computer that is joined to the same domain
                                                  you joined your Linux or Unix system to. Logon as a domain
                                                  user.

                                               2. Access the protected web site from Internet Explorer.
                                                  NOTE: Do not access the site using the IP address of the server
                                                  because doing so will not result in the Internet Explorer getting a
                                                  Kerberos ticket for the server. Use the server name instead.
                                                  Example: https://myserver

                                       The authentication should succeed without a need to provide a user
                                       name and password.

                                       Test the Basic Authentication Fallback

                                       The second test is to determine if the Basic Authentication fallback
                                       mechanism is working. This test will only work if the
                                       KrbMethodK5Passwd directive was set to “on” and for production
                                       environments should only be done over SSL.

                                                1. Logon to a Windows computer using a local user account.
                                                   Alternatively, you can logon to a computer that is joined to a
                                                   different domain than the Linux or Unix Web server. Another
                                                   possibility is to use another browser that does not support


                                       Copyright © 2008 Likewise Software. All rights reserved. 2.26.2008.
Product Documentation

Likewise: Configuring Apache Web Server for Single Sign-On




                                                       Integrated Windows Authentication.

                                                2. Access the protected web site from the browser.
                                                   Example: https://myserver

                                                3. You should be prompted for user name and password.

                                       The authentication should succeed after providing a domain user name
                                       and password. Be sure to prefix the user name with the short domain
                                       name. For example: MYDOMAINAdministrator.




                                       Troubleshooting
                                       In the case of authentication failure, there are some diagnostic tools that
                                       may help diagnose a problem.

                                       Apache Log File

                                       The Apache log file may contain helpful information as to the nature of
                                       the problem. Locate your Apache log file by examining the ErrorLog
                                       directives in the Apache configuration file. You can increase the logging
                                       detail by setting the LogLevel directive to “debug”.

                                       The Microsoft KERBTRAY utility

                                       The Microsoft KERBTRAY utility, part of Microsoft Windows 2000
                                       Resource Kit, will help to determine if the Internet Explorer browser
                                       obtained a Kerberos ticket for your web server. Integrated Windows
                                       Authentication requires that the client obtains a Kerberos ticked from the
                                       Active Directory. To check if the web browser obtained a Kerberos ticket
                                       for your web server:

                                                1. Logon to a Windows computer that is joined to the domain you
                                                   joined you Linux or Unix system to. Logon as a domain user.

                                                2. Install the Microsoft KERBTRAY utility. The setup should be
                                                   available at the following URL
                                                       http://download.microsoft.com/download/win2000platform/kerbtray/1.0
                                                       0.0.1/NT5/EN-US/kerbtray_setup.exe.


                                                3. Launch KERBTRAY.EXE. This will install an icon in your
                                                   taskbar tray.



                                       Copyright © 2008 Likewise Software. All rights reserved. 2.26.2008.
Product Documentation

Likewise: Configuring Apache Web Server for Single Sign-On




                                                4. Access the protected web site from Internet Explorer using the
                                                   server name in the URL rather than the IP address.
                                                   Example: https://myserver

                                                5. Double click on the KERBTRAY icon in the taskbar tray. This
                                                   will show a dialog displaying all Kerberos tickets.

                                                6. Look for the name of your domain in the list of the tickets. Under
                                                   your domain look for service principal that will look like
                                                   HTTP/myserver.mydomain.com.


                                       KLIST Linux or Unix Utility

                                       The klist Linux or Unix utility, part of the krb5-client package, may be
                                       used to check the Kerberos keytab file on the Linux or Unix system. The
                                       output of this command will display all service principal tickets that are
                                       contained in the keytab file. This command may be unavailable on some
                                       systems. To use klist to examine the contents of a Kerberos keytab file:

                                         NOTE: Replace myserver with your own server name and
                                         mydomain.com with your domain name.

                                                1. Locate the Kerberos keytab file for the protected web site. You
                                                   may need to find the Krb5Keytab directive in the Apache
                                                   configuration file.

                                                2. Execute the klist –k <keytab file name> command.
                                                   # klist -k krb5_myserver.keytab

                                                3. Verify that the correct service principal names are displayed.
                                                   The names to look for are HTTP/myserver@MYDOMAIN.COM
                                                   and HTTP/myserver.mydomain.com@MYDOMAIN.COM. It is
                                                   normal to see multiple entries for the same name.

                                                       Example output:
                                                       # klist -k krb5_myserver.keytab
                                                       Keytab name: FILE:krb5_myserver.keytab
                                                       KVNO Principal
                                                       ---- --------------------------------------------------------------------------
                                                         6 HTTP/myserver@MYDOMAIN.COM
                                                         6 HTTP/myserver@MYDOMAIN.COM
                                                         6 HTTP/myserver@MYDOMAIN.COM
                                                         6 HTTP/myserver.mydomain.com@MYDOMAIN.COM



                                       Copyright © 2008 Likewise Software. All rights reserved. 2.26.2008.
Product Documentation

Likewise: Configuring Apache Web Server for Single Sign-On




                                                         6 HTTP/myserver.mydomain.com@MYDOMAIN.COM
                                                         6 HTTP/myserver.mydomain.com@MYDOMAIN.COM


                                       If the service principal names are not correct, go back to the Generate
                                       Kerberos keytab file step above to generate a new Kerberos keytab file.

                                       Common Issues

                                       As Authentication problems may be difficult to diagnose, start with
                                       double checking all the configuration parameters including the validity of
                                       the generated Kerberos keytab file. If all the configuration parameters
                                       appear to be correct then examine the list of common problems below.

                                         Problem                         Explanation
                                         System clock out                For Kerberos authentication to work the system clocks on
                                         of sync                         all involved systems must not be more than 5 minutes
                                                                         apart. Make sure that the time on the Active Directory
                                                                         server, Linux or Unix web server and the client are
                                                                         synchronized.
                                         User accessing                  If Kerberos ticket was obtained on the client or the user
                                         the web site is                 correctly entered his credentials during Basic
                                         not on the                      Authentication prompt it may be the case the authentication
                                         “require” list                  worked but the authorization failed. In this case the
                                                                         error_log Apache log file will contain a line similar to the
                                                                         one below.
                                                                         access to / failed, reason: user MYDOMAINuser not
                                                                         allowed access
                                                                         Add the user to the “require user” directive or add the
                                                                         user’s group to “require group” directive.
                                         User accessing                  If the client user is logged into a domain different than the
                                         the web site is                 domain of the web server then one of two things will
                                         logged to wrong                 happen. If the KrbMethodK5Passwd directive is set to “on”
                                         domain                          then the user will be prompted for credentials. If
                                                                         KrbMethodK5Passwd is set to “off” the authentication will
                                                                         fail and the “Authorization Required” page will be displayed.
                                         Internet Explorer               This problem is common if the web site is accessed using a
                                         web browser                     URL that includes the full domain name such as
                                         does not                        https://myserver.mydomain.com. Internet Explorer will
                                         consider the                    only try to obtain Kerberos tickets for websites that are in
                                         URL as part of                  the Local Intranet zone. Try accessing the web site using
                                         the Local                       just the server name, for example https://myserver.
                                         Intranet zone.                  Alternatively, you can add the URL to a list of Local Intranet
                                                                         sites using the Sites/Advanced buttons in the Internet
                                                                         Options dialog on the Security tab.




                                       Copyright © 2008 Likewise Software. All rights reserved. 2.26.2008.
Product Documentation

Likewise: Configuring Apache Web Server for Single Sign-On




                                         Service Principal               This is a rather rare problem, but very difficult to diagnose
                                         Name of the web                 because of lack of good error that is returned to the web
                                         site is mapped to               server. This can happen if the ktpass Windows utility was
                                         more than one                   used on the Domain Controller to generate a Kerberos
                                         object in the                   keytab file.
                                         Active Directory
                                                                         To diagnose this problem log onto the Active Directory
                                                                         domain controller and open the Event Viewer. Look for
                                                                         event of type=Error, source=KDC, and event ID=11. The
                                                                         text of the event will be similar to the below message.
                                                                         There are multiple accounts with name
                                                                         HTTP/myserver.mydomain.com of type
                                                                         DS_SERVICE_PRINCIPAL_NAME.


                                                                         Fixing this problem will require locating the computer or
                                                                         user objects used to map the service principal name in the
                                                                         Active Directory. The Active Directory Users and
                                                                         Computers MMC snap-in allows running custom LDAP
                                                                         queries. Use a LDAP query similar to this one
                                                                         “(servicePrincipalName=HTTP/myserver.mydomain.com)”
                                                                         to locate the Active Directory objects. Once object have
                                                                         been located then the spurious User object may be deleted.
                                                                         If the object cannot be deleted then use the ADSI Edit
                                                                         MMC snap-in to manually remove the
                                                                         “HTTP/myserver.mydomain.com” string from the
                                                                         servicePrincipalName object property.



                                       Contact Technical Support

                                       For either post-sales technical support or for free technical support
                                       during an evaluation period, please visit the Likewise support web page
                                       at http://www.likewisesoftware.com/support/. You can use the support
                                       page to register for support, submit incidents, and receive direct
                                       technical assistance.

                                       Technical support may ask for your Likewise version, Linux version, and
                                       Microsoft Windows version. To find the Likewise product version, in the
                                       Likewise Console, on the menu bar, click Help, and then click About.




                                       Copyright © 2008 Likewise Software. All rights reserved. 2.26.2008.
Product Documentation

Likewise: Configuring Apache Web Server for Single Sign-On




                                       ABOUT LIKEWISE

                                       Likewise Software is an open source company that provides audit and authentication
                                       solutions designed to improve security, reduce operational costs and help
                                       demonstrate regulatory compliance in mixed network environments. Likewise Open
                                       allows large organizations to securely authenticate Linux, UNIX and Mac systems
                                       with a unified directory such as Microsoft Active Directory. Additionally, Likewise
                                       Enterprise includes world-class group policy, audit and reporting modules.
                                       Likewise Software is a Bellevue, WA-based software company funded by leading
                                       venture capital firms Ignition Partners, Intel Capital, and Trinity Ventures. Likewise
                                       has experienced management and engineering teams in place and is led by senior
                                       executives from leading technology companies such as Microsoft, F5 Networks,
                                       EMC and Mercury.




                                       Copyright © 2008 Likewise Software. All rights reserved. 2.26.2008.

Weitere ähnliche Inhalte

Was ist angesagt?

Essbase installation 11.1.1.3 chapter
Essbase installation 11.1.1.3 chapterEssbase installation 11.1.1.3 chapter
Essbase installation 11.1.1.3 chapterAmit Sharma
 
John Burkholder: SharePoint 2010 in a multi tenant and hosted environment-nyc
John Burkholder: SharePoint 2010 in a multi tenant and hosted environment-nycJohn Burkholder: SharePoint 2010 in a multi tenant and hosted environment-nyc
John Burkholder: SharePoint 2010 in a multi tenant and hosted environment-nycSharePoint Saturday NY
 
Hyperion 11-1-2-3-installation-guide-on-linux
Hyperion 11-1-2-3-installation-guide-on-linuxHyperion 11-1-2-3-installation-guide-on-linux
Hyperion 11-1-2-3-installation-guide-on-linuxAmit Sharma
 
Bisp hyperion11 1 1 3 installation guide
Bisp hyperion11 1 1 3 installation guideBisp hyperion11 1 1 3 installation guide
Bisp hyperion11 1 1 3 installation guideAmit Sharma
 
Windows Loves Drupal
Windows Loves DrupalWindows Loves Drupal
Windows Loves DrupalAcquia
 
Php apache vs iis By Hafedh Yahmadi
Php apache vs iis  By Hafedh YahmadiPhp apache vs iis  By Hafedh Yahmadi
Php apache vs iis By Hafedh YahmadiTechdaysTunisia
 
Actor Model Import Connector for Microsoft Active Directory
Actor Model Import Connector for Microsoft Active DirectoryActor Model Import Connector for Microsoft Active Directory
Actor Model Import Connector for Microsoft Active Directoryprotect724rkeer
 
Oracle Hyperion EPM 11.1.2.4 - part 1
Oracle Hyperion EPM 11.1.2.4 - part 1Oracle Hyperion EPM 11.1.2.4 - part 1
Oracle Hyperion EPM 11.1.2.4 - part 1Alex Liu
 
Build sites on iis
Build sites on iisBuild sites on iis
Build sites on iisPaul Davis
 
Intro to Alfresco for Developers
Intro to Alfresco for DevelopersIntro to Alfresco for Developers
Intro to Alfresco for DevelopersJeff Potts
 
Drupal security
Drupal securityDrupal security
Drupal securityTechday7
 

Was ist angesagt? (20)

Understanding IIS
Understanding IISUnderstanding IIS
Understanding IIS
 
IIS PPT (1)
IIS PPT (1)IIS PPT (1)
IIS PPT (1)
 
IIS
IISIIS
IIS
 
How to Monitor IIS
How to Monitor IISHow to Monitor IIS
How to Monitor IIS
 
Essbase installation 11.1.1.3 chapter
Essbase installation 11.1.1.3 chapterEssbase installation 11.1.1.3 chapter
Essbase installation 11.1.1.3 chapter
 
John Burkholder: SharePoint 2010 in a multi tenant and hosted environment-nyc
John Burkholder: SharePoint 2010 in a multi tenant and hosted environment-nycJohn Burkholder: SharePoint 2010 in a multi tenant and hosted environment-nyc
John Burkholder: SharePoint 2010 in a multi tenant and hosted environment-nyc
 
Hyperion 11-1-2-3-installation-guide-on-linux
Hyperion 11-1-2-3-installation-guide-on-linuxHyperion 11-1-2-3-installation-guide-on-linux
Hyperion 11-1-2-3-installation-guide-on-linux
 
IIS 7.0 +
IIS 7.0 +IIS 7.0 +
IIS 7.0 +
 
SQL Server: Security
SQL Server: SecuritySQL Server: Security
SQL Server: Security
 
Bisp hyperion11 1 1 3 installation guide
Bisp hyperion11 1 1 3 installation guideBisp hyperion11 1 1 3 installation guide
Bisp hyperion11 1 1 3 installation guide
 
Understanding iis part2
Understanding iis part2Understanding iis part2
Understanding iis part2
 
Windows Loves Drupal
Windows Loves DrupalWindows Loves Drupal
Windows Loves Drupal
 
Php apache vs iis By Hafedh Yahmadi
Php apache vs iis  By Hafedh YahmadiPhp apache vs iis  By Hafedh Yahmadi
Php apache vs iis By Hafedh Yahmadi
 
Actor Model Import Connector for Microsoft Active Directory
Actor Model Import Connector for Microsoft Active DirectoryActor Model Import Connector for Microsoft Active Directory
Actor Model Import Connector for Microsoft Active Directory
 
Windows Loves drupal
Windows Loves drupalWindows Loves drupal
Windows Loves drupal
 
Oracle Hyperion EPM 11.1.2.4 - part 1
Oracle Hyperion EPM 11.1.2.4 - part 1Oracle Hyperion EPM 11.1.2.4 - part 1
Oracle Hyperion EPM 11.1.2.4 - part 1
 
Build sites on iis
Build sites on iisBuild sites on iis
Build sites on iis
 
Is Drupal secure?
Is Drupal secure?Is Drupal secure?
Is Drupal secure?
 
Intro to Alfresco for Developers
Intro to Alfresco for DevelopersIntro to Alfresco for Developers
Intro to Alfresco for Developers
 
Drupal security
Drupal securityDrupal security
Drupal security
 

Andere mochten auch

Configuring Apache Web Server for Single Sign-On with Likewise 5
Configuring Apache Web Server for Single Sign-On with Likewise 5Configuring Apache Web Server for Single Sign-On with Likewise 5
Configuring Apache Web Server for Single Sign-On with Likewise 5webhostingguy
 
Apache2 BootCamp : Understanding Apache Internals
Apache2 BootCamp : Understanding Apache InternalsApache2 BootCamp : Understanding Apache Internals
Apache2 BootCamp : Understanding Apache InternalsWildan Maulana
 
INSTALLING AND CONFIGURING APACHE TOOLKIT FOR SERVICEGUARD ...
INSTALLING AND CONFIGURING APACHE TOOLKIT FOR SERVICEGUARD ...INSTALLING AND CONFIGURING APACHE TOOLKIT FOR SERVICEGUARD ...
INSTALLING AND CONFIGURING APACHE TOOLKIT FOR SERVICEGUARD ...webhostingguy
 
Apache thrift
Apache thriftApache thrift
Apache thriftducdv
 
APACHE WEB SERVER FOR LINUX
APACHE WEB SERVER FOR LINUXAPACHE WEB SERVER FOR LINUX
APACHE WEB SERVER FOR LINUXwebhostingguy
 
Configuring the Apache Web Server
Configuring the Apache Web ServerConfiguring the Apache Web Server
Configuring the Apache Web Serverwebhostingguy
 
Apache web server tutorial for linux
Apache web server tutorial for linuxApache web server tutorial for linux
Apache web server tutorial for linuxSahad Sali
 
Apache HTTPd Server 2.2 Presentation
Apache HTTPd Server 2.2 PresentationApache HTTPd Server 2.2 Presentation
Apache HTTPd Server 2.2 Presentationultimatetux
 

Andere mochten auch (16)

Configuring Apache Web Server for Single Sign-On with Likewise 5
Configuring Apache Web Server for Single Sign-On with Likewise 5Configuring Apache Web Server for Single Sign-On with Likewise 5
Configuring Apache Web Server for Single Sign-On with Likewise 5
 
Apache
ApacheApache
Apache
 
Apache2 BootCamp : Understanding Apache Internals
Apache2 BootCamp : Understanding Apache InternalsApache2 BootCamp : Understanding Apache Internals
Apache2 BootCamp : Understanding Apache Internals
 
Installing and configuring apache
Installing and configuring apacheInstalling and configuring apache
Installing and configuring apache
 
Its3 Drupal
Its3 DrupalIts3 Drupal
Its3 Drupal
 
INSTALLING AND CONFIGURING APACHE TOOLKIT FOR SERVICEGUARD ...
INSTALLING AND CONFIGURING APACHE TOOLKIT FOR SERVICEGUARD ...INSTALLING AND CONFIGURING APACHE TOOLKIT FOR SERVICEGUARD ...
INSTALLING AND CONFIGURING APACHE TOOLKIT FOR SERVICEGUARD ...
 
Css
CssCss
Css
 
Apache thrift
Apache thriftApache thrift
Apache thrift
 
Apache ppt
Apache pptApache ppt
Apache ppt
 
APACHE WEB SERVER FOR LINUX
APACHE WEB SERVER FOR LINUXAPACHE WEB SERVER FOR LINUX
APACHE WEB SERVER FOR LINUX
 
Configuring the Apache Web Server
Configuring the Apache Web ServerConfiguring the Apache Web Server
Configuring the Apache Web Server
 
Apache http server
Apache http serverApache http server
Apache http server
 
Apache web server tutorial for linux
Apache web server tutorial for linuxApache web server tutorial for linux
Apache web server tutorial for linux
 
Apache Ppt
Apache PptApache Ppt
Apache Ppt
 
Apache HTTPd Server 2.2 Presentation
Apache HTTPd Server 2.2 PresentationApache HTTPd Server 2.2 Presentation
Apache HTTPd Server 2.2 Presentation
 
Apache HTTP Server
Apache HTTP ServerApache HTTP Server
Apache HTTP Server
 

Ähnlich wie Configuring Apache Web Server For Single Sign-On with Likewise

Web sever environmentA Web server is a program that uses HTTP (Hy.pdf
Web sever environmentA Web server is a program that uses HTTP (Hy.pdfWeb sever environmentA Web server is a program that uses HTTP (Hy.pdf
Web sever environmentA Web server is a program that uses HTTP (Hy.pdfaquacareser
 
How to Use NDS eDirectory to Secure Apache Web Server for NetWare
How to Use NDS eDirectory to Secure Apache Web Server for NetWareHow to Use NDS eDirectory to Secure Apache Web Server for NetWare
How to Use NDS eDirectory to Secure Apache Web Server for NetWarewebhostingguy
 
VMworld 2013: Deploying vSphere with OpenStack: What It Means to Your Cloud E...
VMworld 2013: Deploying vSphere with OpenStack: What It Means to Your Cloud E...VMworld 2013: Deploying vSphere with OpenStack: What It Means to Your Cloud E...
VMworld 2013: Deploying vSphere with OpenStack: What It Means to Your Cloud E...VMworld
 
開放原始碼 Ch1.2 intro - oss - apahce foundry (ver 2.0)
開放原始碼 Ch1.2   intro - oss - apahce foundry (ver 2.0)開放原始碼 Ch1.2   intro - oss - apahce foundry (ver 2.0)
開放原始碼 Ch1.2 intro - oss - apahce foundry (ver 2.0)My own sweet home!
 
Introducing AWS OpsWorks, a DevOps application management platform
Introducing AWS OpsWorks, a DevOps application management platformIntroducing AWS OpsWorks, a DevOps application management platform
Introducing AWS OpsWorks, a DevOps application management platformAmazon Web Services
 
Bridging IaaS With PaaS To Deliver The Service-Oriented Data Center
Bridging IaaS With PaaS To Deliver The Service-Oriented Data CenterBridging IaaS With PaaS To Deliver The Service-Oriented Data Center
Bridging IaaS With PaaS To Deliver The Service-Oriented Data CenterChris Haddad
 
Opscode Webinar: Managing Your VMware Infrastructure with Chef
Opscode Webinar: Managing Your VMware Infrastructure with ChefOpscode Webinar: Managing Your VMware Infrastructure with Chef
Opscode Webinar: Managing Your VMware Infrastructure with ChefChef Software, Inc.
 
Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014Akash Mahajan
 
深探-IaC-(Infrastructure as Code-基礎設施即程式碼-)-在-AWS-上的應用
深探-IaC-(Infrastructure as Code-基礎設施即程式碼-)-在-AWS-上的應用深探-IaC-(Infrastructure as Code-基礎設施即程式碼-)-在-AWS-上的應用
深探-IaC-(Infrastructure as Code-基礎設施即程式碼-)-在-AWS-上的應用Amazon Web Services
 
Mastering checkpoint-1-basic-installation
Mastering checkpoint-1-basic-installationMastering checkpoint-1-basic-installation
Mastering checkpoint-1-basic-installationnetworkershome
 
Open Stack Cloud Services
Open Stack Cloud ServicesOpen Stack Cloud Services
Open Stack Cloud ServicesSaurabh Gupta
 
Streamlining Deployments in a Large Websphere Environment
Streamlining Deployments in a Large Websphere Environment Streamlining Deployments in a Large Websphere Environment
Streamlining Deployments in a Large Websphere Environment XebiaLabs
 
Application Virtualization overview - BayCUG
Application Virtualization overview - BayCUGApplication Virtualization overview - BayCUG
Application Virtualization overview - BayCUGDenis Gundarev
 
59264945-Websphere-Security.pdf
59264945-Websphere-Security.pdf59264945-Websphere-Security.pdf
59264945-Websphere-Security.pdfDeepakAC3
 
Open source software governance with DejaCode
Open source software governance with DejaCodeOpen source software governance with DejaCode
Open source software governance with DejaCodenexB Inc.
 
Oracle IaaS including OCM and Ravello
Oracle IaaS including OCM and RavelloOracle IaaS including OCM and Ravello
Oracle IaaS including OCM and RavelloAndrey Akulov
 
VMworld 2015: Build and Run Cloud Native Apps in your Software Defined Data C...
VMworld 2015: Build and Run Cloud Native Apps in your Software Defined Data C...VMworld 2015: Build and Run Cloud Native Apps in your Software Defined Data C...
VMworld 2015: Build and Run Cloud Native Apps in your Software Defined Data C...VMworld
 

Ähnlich wie Configuring Apache Web Server For Single Sign-On with Likewise (20)

Web sever environmentA Web server is a program that uses HTTP (Hy.pdf
Web sever environmentA Web server is a program that uses HTTP (Hy.pdfWeb sever environmentA Web server is a program that uses HTTP (Hy.pdf
Web sever environmentA Web server is a program that uses HTTP (Hy.pdf
 
How to Use NDS eDirectory to Secure Apache Web Server for NetWare
How to Use NDS eDirectory to Secure Apache Web Server for NetWareHow to Use NDS eDirectory to Secure Apache Web Server for NetWare
How to Use NDS eDirectory to Secure Apache Web Server for NetWare
 
VMworld 2013: Deploying vSphere with OpenStack: What It Means to Your Cloud E...
VMworld 2013: Deploying vSphere with OpenStack: What It Means to Your Cloud E...VMworld 2013: Deploying vSphere with OpenStack: What It Means to Your Cloud E...
VMworld 2013: Deploying vSphere with OpenStack: What It Means to Your Cloud E...
 
M meijer api management - tech-days 2015
M meijer   api management - tech-days 2015M meijer   api management - tech-days 2015
M meijer api management - tech-days 2015
 
開放原始碼 Ch1.2 intro - oss - apahce foundry (ver 2.0)
開放原始碼 Ch1.2   intro - oss - apahce foundry (ver 2.0)開放原始碼 Ch1.2   intro - oss - apahce foundry (ver 2.0)
開放原始碼 Ch1.2 intro - oss - apahce foundry (ver 2.0)
 
presentation_finals
presentation_finalspresentation_finals
presentation_finals
 
Introducing AWS OpsWorks, a DevOps application management platform
Introducing AWS OpsWorks, a DevOps application management platformIntroducing AWS OpsWorks, a DevOps application management platform
Introducing AWS OpsWorks, a DevOps application management platform
 
Bridging IaaS With PaaS To Deliver The Service-Oriented Data Center
Bridging IaaS With PaaS To Deliver The Service-Oriented Data CenterBridging IaaS With PaaS To Deliver The Service-Oriented Data Center
Bridging IaaS With PaaS To Deliver The Service-Oriented Data Center
 
Opscode Webinar: Managing Your VMware Infrastructure with Chef
Opscode Webinar: Managing Your VMware Infrastructure with ChefOpscode Webinar: Managing Your VMware Infrastructure with Chef
Opscode Webinar: Managing Your VMware Infrastructure with Chef
 
Infrastructure as Code
Infrastructure as CodeInfrastructure as Code
Infrastructure as Code
 
Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014
 
深探-IaC-(Infrastructure as Code-基礎設施即程式碼-)-在-AWS-上的應用
深探-IaC-(Infrastructure as Code-基礎設施即程式碼-)-在-AWS-上的應用深探-IaC-(Infrastructure as Code-基礎設施即程式碼-)-在-AWS-上的應用
深探-IaC-(Infrastructure as Code-基礎設施即程式碼-)-在-AWS-上的應用
 
Mastering checkpoint-1-basic-installation
Mastering checkpoint-1-basic-installationMastering checkpoint-1-basic-installation
Mastering checkpoint-1-basic-installation
 
Open Stack Cloud Services
Open Stack Cloud ServicesOpen Stack Cloud Services
Open Stack Cloud Services
 
Streamlining Deployments in a Large Websphere Environment
Streamlining Deployments in a Large Websphere Environment Streamlining Deployments in a Large Websphere Environment
Streamlining Deployments in a Large Websphere Environment
 
Application Virtualization overview - BayCUG
Application Virtualization overview - BayCUGApplication Virtualization overview - BayCUG
Application Virtualization overview - BayCUG
 
59264945-Websphere-Security.pdf
59264945-Websphere-Security.pdf59264945-Websphere-Security.pdf
59264945-Websphere-Security.pdf
 
Open source software governance with DejaCode
Open source software governance with DejaCodeOpen source software governance with DejaCode
Open source software governance with DejaCode
 
Oracle IaaS including OCM and Ravello
Oracle IaaS including OCM and RavelloOracle IaaS including OCM and Ravello
Oracle IaaS including OCM and Ravello
 
VMworld 2015: Build and Run Cloud Native Apps in your Software Defined Data C...
VMworld 2015: Build and Run Cloud Native Apps in your Software Defined Data C...VMworld 2015: Build and Run Cloud Native Apps in your Software Defined Data C...
VMworld 2015: Build and Run Cloud Native Apps in your Software Defined Data C...
 

Mehr von webhostingguy

Running and Developing Tests with the Apache::Test Framework
Running and Developing Tests with the Apache::Test FrameworkRunning and Developing Tests with the Apache::Test Framework
Running and Developing Tests with the Apache::Test Frameworkwebhostingguy
 
MySQL and memcached Guide
MySQL and memcached GuideMySQL and memcached Guide
MySQL and memcached Guidewebhostingguy
 
Novell® iChain® 2.3
Novell® iChain® 2.3Novell® iChain® 2.3
Novell® iChain® 2.3webhostingguy
 
Load-balancing web servers Load-balancing web servers
Load-balancing web servers Load-balancing web serversLoad-balancing web servers Load-balancing web servers
Load-balancing web servers Load-balancing web serverswebhostingguy
 
SQL Server 2008 Consolidation
SQL Server 2008 ConsolidationSQL Server 2008 Consolidation
SQL Server 2008 Consolidationwebhostingguy
 
Master Service Agreement
Master Service AgreementMaster Service Agreement
Master Service Agreementwebhostingguy
 
PHP and MySQL PHP Written as a set of CGI binaries in C in ...
PHP and MySQL PHP Written as a set of CGI binaries in C in ...PHP and MySQL PHP Written as a set of CGI binaries in C in ...
PHP and MySQL PHP Written as a set of CGI binaries in C in ...webhostingguy
 
Dell Reference Architecture Guide Deploying Microsoft® SQL ...
Dell Reference Architecture Guide Deploying Microsoft® SQL ...Dell Reference Architecture Guide Deploying Microsoft® SQL ...
Dell Reference Architecture Guide Deploying Microsoft® SQL ...webhostingguy
 
Managing Diverse IT Infrastructure
Managing Diverse IT InfrastructureManaging Diverse IT Infrastructure
Managing Diverse IT Infrastructurewebhostingguy
 
Web design for business.ppt
Web design for business.pptWeb design for business.ppt
Web design for business.pptwebhostingguy
 
IT Power Management Strategy
IT Power Management Strategy IT Power Management Strategy
IT Power Management Strategy webhostingguy
 
Excel and SQL Quick Tricks for Merchandisers
Excel and SQL Quick Tricks for MerchandisersExcel and SQL Quick Tricks for Merchandisers
Excel and SQL Quick Tricks for Merchandiserswebhostingguy
 
Parallels Hosting Products
Parallels Hosting ProductsParallels Hosting Products
Parallels Hosting Productswebhostingguy
 
Microsoft PowerPoint presentation 2.175 Mb
Microsoft PowerPoint presentation 2.175 MbMicrosoft PowerPoint presentation 2.175 Mb
Microsoft PowerPoint presentation 2.175 Mbwebhostingguy
 

Mehr von webhostingguy (20)

File Upload
File UploadFile Upload
File Upload
 
Running and Developing Tests with the Apache::Test Framework
Running and Developing Tests with the Apache::Test FrameworkRunning and Developing Tests with the Apache::Test Framework
Running and Developing Tests with the Apache::Test Framework
 
MySQL and memcached Guide
MySQL and memcached GuideMySQL and memcached Guide
MySQL and memcached Guide
 
Novell® iChain® 2.3
Novell® iChain® 2.3Novell® iChain® 2.3
Novell® iChain® 2.3
 
Load-balancing web servers Load-balancing web servers
Load-balancing web servers Load-balancing web serversLoad-balancing web servers Load-balancing web servers
Load-balancing web servers Load-balancing web servers
 
SQL Server 2008 Consolidation
SQL Server 2008 ConsolidationSQL Server 2008 Consolidation
SQL Server 2008 Consolidation
 
What is mod_perl?
What is mod_perl?What is mod_perl?
What is mod_perl?
 
What is mod_perl?
What is mod_perl?What is mod_perl?
What is mod_perl?
 
Master Service Agreement
Master Service AgreementMaster Service Agreement
Master Service Agreement
 
Notes8
Notes8Notes8
Notes8
 
PHP and MySQL PHP Written as a set of CGI binaries in C in ...
PHP and MySQL PHP Written as a set of CGI binaries in C in ...PHP and MySQL PHP Written as a set of CGI binaries in C in ...
PHP and MySQL PHP Written as a set of CGI binaries in C in ...
 
Dell Reference Architecture Guide Deploying Microsoft® SQL ...
Dell Reference Architecture Guide Deploying Microsoft® SQL ...Dell Reference Architecture Guide Deploying Microsoft® SQL ...
Dell Reference Architecture Guide Deploying Microsoft® SQL ...
 
Managing Diverse IT Infrastructure
Managing Diverse IT InfrastructureManaging Diverse IT Infrastructure
Managing Diverse IT Infrastructure
 
Web design for business.ppt
Web design for business.pptWeb design for business.ppt
Web design for business.ppt
 
IT Power Management Strategy
IT Power Management Strategy IT Power Management Strategy
IT Power Management Strategy
 
Excel and SQL Quick Tricks for Merchandisers
Excel and SQL Quick Tricks for MerchandisersExcel and SQL Quick Tricks for Merchandisers
Excel and SQL Quick Tricks for Merchandisers
 
OLUG_xen.ppt
OLUG_xen.pptOLUG_xen.ppt
OLUG_xen.ppt
 
Parallels Hosting Products
Parallels Hosting ProductsParallels Hosting Products
Parallels Hosting Products
 
Microsoft PowerPoint presentation 2.175 Mb
Microsoft PowerPoint presentation 2.175 MbMicrosoft PowerPoint presentation 2.175 Mb
Microsoft PowerPoint presentation 2.175 Mb
 
Reseller's Guide
Reseller's GuideReseller's Guide
Reseller's Guide
 

Configuring Apache Web Server For Single Sign-On with Likewise

  • 1. 9 Product Documentation Likewise Enterprise Configuring Apache Web Server For Single Sign-On with Likewise IN THIS DOCUMENT Abstract • Setting up an Apache HTTP Server for single sign-on with Likewise Enterprise lets you join Linux and Unix computers running the Likewise, Kerberos, and Active Apache HTTP Server to Microsoft Active Directory, yielding a range of Directory. benefits for users, system administrators, and managers. • Understanding Integrated Windows Authentication. Users get single sign-on: They log on once to a workstation that is • Likewise’s Apache authenticated through Active Directory and automatically receive Kerberos- authentication architecture. based single sign-on for other computers and applications, including the • Installing and configuring the Apache web server. System administrators rest easy with the knowledge mod_auth_kerb authentication modules. that users accessing your intranet through HTTP are securely • Generating a keytab file. authenticated with Kerberos 5 and authorized for access to the resources on your Apache web server. Managers see their operational costs drop as • Testing authentication. their Linux and Unix computers running Apache are centrally managed • Troubleshooting authentication. within Active Directory. Security managers find help in their quest for • Dealing with common issues. regulatory compliance. REQUIREMENTS This document describes how to configure Likewise and the Apache HTTP Server to provide single sign-on authentication through Kerberos. • Apache HTTP Server version 2.0 or 2.2. • The Linux or Unix computer About Likewise Enterprise running Apache must be using a platform that Likewise By joining Linux, Unix, and Mac computers to Active Directory – a secure, supports. scalable, stable, and proven identity management system – Likewise gives • Root access to the Linux or you the power to manage all your users' identities in one place, use the Unix computer running Apache. highly secure Kerberos 5 protocol to authenticate users in the same way on all your systems, apply granular access controls to sensitive resources, • Privileges sufficient to join the Linux or Unix computer and centrally administer Linux, Unix, Mac, and Windows computers with running Apache to Active group policies. Likewise includes reporting and auditing capabilities that Directory. can help improve regulatory compliance. The result: lower operating costs, better security, enhanced compliance. Copyright © 2008 Likewise Software. All rights reserved. 2.26.2008. 1
  • 2. Product Documentation Likewise: Configuring Apache Web Server for Single Sign-On The information contained in this document represents the current view of Likewise Software on the issues discussed as of the date of publication. Because Likewise Software must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Likewise, and Likewise Software cannot guarantee the accuracy of any information presented after the date of publication. These documents are for informational purposes only. LIKEWISE SOFTWARE MAKES NO WARRANTIES, EXPRESS OR IMPLIED. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in, or introduced into a retrieval system, or transmitted in any form, by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of Likewise Software. Likewise may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this document. Except as expressly provided in any written license agreement from Likewise, the furnishing of this document does not give you any license to these patents, trademarks, copyrights, or other intellectual property. © 2008 Likewise Software. All rights reserved. Likewise and the Likewise logo are either registered trademarks or trademarks of Likewise Software in the United States and/or other countries. All other trademarks are property of their respective owners. Likewise Software 15395 SE 30th Place, Suite #140 Bellevue, WA 98007 USA Copyright © 2008 Likewise Software. All rights reserved. 2.26.2008.
  • 3. Product Documentation Likewise: Configuring Apache Web Server for Single Sign-On Table of Contents INTRODUCTION............................................................................4 UNDERSTANDING INTEGRATED WINDOWS AUTHENTICATION .......................................................................4 Why use Integrated Windows Authentication? ...............................................4 Kerberos, NTLMSSP versus Basic Authentication .........................................5 Authentication versus Authorization................................................................5 LIKEWISE APACHE AUTHENTICATION ARCHITECTURE ........5 Authenticating with Kerberos............................................................................6 Authenticating with Basic Authentication........................................................6 CONFIGURING LIKEWISE AND APACHE FOR SSO..................6 Overview of Setup Process................................................................................6 Requirements ......................................................................................................7 Check Whether Your Apache Server Supports Dynamic Modules ..................7 Install mod_auth_kerb_centeris and mod_auth_pam Authentication Modules................................................................................................................8 32-Bit Systems ..................................................................................................8 64-Bit Systems ..................................................................................................9 Install the Packages..........................................................................................9 Add Directives to Apache Configuration File ..................................................9 Setup Apache Server or Virtual Server To Use SSL (Optional) ...................10 Generate Kerberos keytab File ........................................................................10 Find the Group Name of the Apache Web Server ..........................................10 Find the Server Name of the Web Site that Requires Authentication ............11 Generate a Kerberos keytab file .....................................................................12 Set mod_auth_kerb_centeris.so and mod_auth_sys_group.so ..................12 TESTING AUTHENTICATION .....................................................14 Test Single-Sign-On authentication for a domain user ................................14 Test the Basic Authentication Fallback..........................................................14 TROUBLESHOOTING .................................................................15 Apache Log File ................................................................................................15 The Microsoft KERBTRAY utility.....................................................................15 KLIST Linux or Unix Utility...............................................................................16 Common Issues ................................................................................................17 Contact Technical Support ..............................................................................18 Copyright © 2008 Likewise Software. All rights reserved. 2.26.2008.
  • 4. Product Documentation Likewise: Configuring Apache Web Server for Single Sign-On Introduction This document describes how to configure Likewise and the Apache HTTP Server to provide single sign-on authentication through Active Directory by using Kerberos 5. The target audience is network directory administrators who manage access to workstations, servers, and other network resources within Active Directory. The guide assumes that you know how to administer Active Directory as well as computers running Linux. Note: This guide assumes that you have installed Likewise on the Linux computer running your Apache HTTP Server and that you have joined the server to Active Directory. For instructions on how to install Likewise on a Linux computer and join it to Active Directory, see the Likewise Enterprise Installation Guide at http://www.likewisesoftware.com/resources/user_documentation/. Understanding Integrated Windows Authentication Integrated Windows Authentication was introduced with the Microsoft Windows 2000 operating system. It is based on the SPNEGO, Kerberos, and NTLMSSP protocols. The SPNEGO protocol is used between the web browser and the web server to negotiate the type of authentication that will be performed, usually either Kerberos or NTLMSSP. Kerberos is the preferred authentication mechanism. Both Kerberos and NTLMSSP are secure protocols that allow computers to authenticate a user over a non-secure channel. For web sites, this means that the Secure Socket Layer (SSL) protocol does not need to be enabled during the authentication phase. Why use Integrated Windows Authentication? Integrated Windows Authentication improves the overall security of a network because the user must log on by using his or her username and password only once. All subsequent accesses by that user to resources, such as web sites, file systems, and network printers are automatically authenticated with cached security tokens. Using Integrated Windows Authentication has the benefit of a centralized user account database where information about all users is kept in Active Directory. This is more secure than duplicating user names and passwords in configuration files Copyright © 2008 Likewise Software. All rights reserved. 2.26.2008.
  • 5. Product Documentation Likewise: Configuring Apache Web Server for Single Sign-On across various server computers, not to mention the management overhead of doing so. Kerberos, NTLMSSP versus Basic Authentication Integrated Windows Authentication uses the SPNEGO, Kerberos and NTLM authentication protocols. Not all browsers are capable of understanding these protocols. Another authentication protocol, Basic Authentication, is understood by all web browsers; it works by simply transferring username and password across the network from the web browser to the web server. The drawback of using Basic Authentication is that without SSL encryption, anyone can intercept the network communication and easily find out a user’s login name and password. Thus, Basic Authentication should be used only for sites that are protected with SSL encryption. Authentication versus Authorization The term authentication refers to the process of proving a user’s identity. Authorization, on the other hand, takes place after authentication and is used to limit the users or groups to perform only the actions that they are allowed, or authorized, to perform. Integrated Windows Authentication provides only the authentication mechanism while Windows authorization is usually accomplished using Access Control Lists (ACL). Likewise Apache Authentication Architecture The Likewise Apache Authentication architecture extends Integrated Windows Authentication to the Apache web server running on a Linux or Unix system. The authentication is implemented in a dynamically loaded Apache module: mod_auth_kerb_centeris. This module is based on a BSD licensed Apache module called mod_auth_kerb, but includes modifications so that it works with the Likewise. An additional module — mod_auth_sys_group — is used to provide authorization limiting access to the web site to the domain users or groups that you specify. The mod_auth_kerb_centeris module implements the SPNEGO, Kerberos, and Basic Authentication protocols. In doing so, it provides the majority of the Integrated Windows Authentication functionality, with the exception of the NTLMSSP protocol. The module uses the SPNEGO protocol to negotiate whether Kerberos or Basic Authentication is used. Copyright © 2008 Likewise Software. All rights reserved. 2.26.2008.
  • 6. Product Documentation Likewise: Configuring Apache Web Server for Single Sign-On Authenticating with Kerberos If the client browser is able to obtain a Kerberos ticket from the Active Directory domain controller for the requested URL, Kerberos authentication is used and the user does not need to provide his or her username and password to access the web site. The Kerberos ticket is sent to the web server, which decrypts it and validates it by using the Kerberos system libraries. The Kerberos ticket contains the user’s principal name, which being created by a Windows domain controller is in the form <user>@<full domain name>; example: user@mydoamain.com. The principal name is converted by mod_auth_kerb_centeris to a format — <short domain name><user> — needed by the mod_auth_sys_group authorization module, example: MYDOMAINuser. If the authorization is successful, the server sends the requested web page to the client, but with additional authentication information that allows the web browser to validate the authenticity of the web server for mutual authentication. Authenticating with Basic Authentication If the client browser is not able to obtain a Kerberos ticket from the Active Directory Controller and mod_auth_kerb_centeris is configured with the KrbMethodK5Passwd parameter set to “on” then Basic Authentication is used. The browser prompts the user for username and password and sends this information in clear-text to the web server. The web server tries to obtain a Kerberos ticket on user’s behalf directly from the Domain Controller. If successful, it processes the Kerberos ticket and performs authorization. If the Authorization is successful, the server sends the requested web page to the client, but unlike with full Kerberos authentication, it does not include the additional authentication information that allows the client to authenticate the web server’s identity. Configuring Likewise and Apache for SSO Overview of Setup Process 1. Confirm that your components meet the requirements. 2. Install the mod_auth_kerb_centeris and mod_auth_pam Apache authentication modules. Copyright © 2008 Likewise Software. All rights reserved. 2.26.2008.
  • 7. Product Documentation Likewise: Configuring Apache Web Server for Single Sign-On 3. Configure the main Apache server or Virtual Host to use SSL (optional). 4. Generate a Kerberos keytab file for the Apache server. 5. Configure the mod_auth_kerb_centeris.so and mod_auth_sys_group.so modules. Requirements • At minimum, setting up Apache SSO authentication requires two systems, a Linux or Unix computer running the Apache HTTP Server and an Active Directory domain controller. • You must have root access to a Linux or Unix system that is supported by Likewise; for a list of supported platforms, see http://www.likewisesoftware.com/products/likewise_enterprise/sup ported_platforms.php. • You must have installed the Likewise agent on the Linux or Unix computer and joined the computer to Active Directory; for instructions on how to install the Likewise agent and join the server to a domain, see Likewise Enterprise Installation Guide at http://www.likewisesoftware.com/resources/user_documentation/ • The supported versions of Apache HTTP Server are 2.0 and 2.2. It is recommended that you use the Apache version that came with your Linux or Unix system. If you need to install the Apache server manually, you can get it and installation instructions at http://httpd.apache.org. • The Apache HTTP Server that you are using must support dynamic loading of the Apache modules in order to load the mod_auth_kerb_centeris module. Check Whether Your Apache Server Supports Dynamic Modules 1. Execute the following command on the Linux or Unix system after the Apache HTTP Server has been installed: # httpd –l Depending on the system, the command may be /usr/sbin/httpd –l, /usr/sbin/httpd2 –l or in another location. Copyright © 2008 Likewise Software. All rights reserved. 2.26.2008.
  • 8. Product Documentation Likewise: Configuring Apache Web Server for Single Sign-On 2. Verify that mod_so.c is displayed in the list of the compiled in modules. Important: For Apache installations that are compiled from the source code, ensure that --enable-module=so is specified when ./configure is executed: # ./configure --enable-module=so Install mod_auth_kerb_centeris and mod_auth_pam Authentication Modules The mod_auth_kerb_centeris and mod_auth_pam Authentication modules are installed from RPM packages. The packages are specific to each Linux or Unix operating system, but may also vary if the Apache web server was upgraded from the version shipped with the Linux or Unix system. The following tables list the RPM package names for each supported system. 32-Bit Systems Operating System RPM packages Red Hat Enterprise Linux ES / AS v4 mod_auth_kerb_centeris-5.0-6.redhat.i386.rpm CentOS 4.2, 4.1 mod_auth_pam_rhel-1.0-1.i386.rpm CentOS 4.4, 4.3 Fedora Core 4 (with full updates) Red Hat Enterprise Linux ES / AS v3 mod_auth_kerb_centeris-5.0-6.rhel3.i386.rpm mod_auth_pam-1.1.1-1.rhel3.i386.rpm Fedora Core 5 mod_auth_kerb_centeris-5.0-6.fc5.i386.rpm mod_auth_pam-1.1.1-4.fc5.i386.rpm SUSE Linux Enterprise Server 9 (SP3) mod_auth_kerb_centeris-5.0-6.suse92.i586.rpm SUSE Linux Professional 9.2 mod_auth_pam_suse-1.0-1.i586.rpm SUSE Linux Enterprise Server 10 mod_auth_kerb_centeris-5.0-6.suse.apache2.2.i586.rpm SUSE Linux 10.1 mod_auth_pam_suse-1.0-1.apache2.2.i586.rpm SUSE Linux Professional 9.3 mod_auth_kerb_centeris-5.0-6.suse.i586.rpm SUSE Linux 10.0 mod_auth_pam_suse-1.0-1.i586.rpm SUSE Linux 10.0 OSS Copyright © 2008 Likewise Software. All rights reserved. 2.26.2008.
  • 9. Product Documentation Likewise: Configuring Apache Web Server for Single Sign-On 64-Bit Systems Operating System RPM packages Red Hat Enterprise Linux ES / AS v4 mod_auth_kerb_centeris-5.0-6.redhat.x86_64.rpm CentOS 4.4, 4.3 mod_auth_pam-1.1.1-4.x86_64.rpm Fedora Core 4 (with full updates) Red Hat Enterprise Linux ES / AS v3 mod_auth_kerb_centeris-5.0-6.rhel3.x86_64.rpm mod_auth_pam-1.1.1-1.rhel3.x86_64.rpm Fedora Core 5 mod_auth_kerb_centeris-5.0-6.fc5.x86_64.rpm mod_auth_pam-1.1.1-4.fc5.x86_64.rpm SUSE Linux Enterprise Server 9 (SP3) mod_auth_kerb_centeris-5.0-6.suse_heimdal.x86_64.rpm mod_auth_pam-1.1.1-1.x86_64.rpm SUSE Linux Enterprise Server 10 mod_auth_kerb_centeris-5.0-6.suse.apache2.2.x86_64.rpm SUSE Linux 10.1 mod_auth_pam-1.1.1-1.apache2.2.x86_64.rpm Contact Likewise support at http://www.likewisesoftware.com/support/ to obtain the modules for your platform. Install the Packages To install the mod_auth_kerb_centeris and mod_auth_pam packages, execute the following commands substituting the <version> for the correct version for your system: # rpm –i mod_auth_kerb_centeris-5.0-6.<version> # rpm –i mod_auth_pam<version> Note: The mod_auth_pam RPM package contains two modules. Only one of the two modules, mod_auth_sys_group.so, is necessary to complete the setup documented in this guide. The Apache web server configuration must now be modified to load the mod_auth_kerb_centeris.so and mod_auth_sys_group.so modules. The location of the Apache configuration file will depend on your Linux or Unix distribution. Add Directives to Apache Configuration File Add the following directives to the Apache configuration file to configure Apache to load the mod_auth_kerb_centeris.so and mod_auth_sys_group.so modules. Copyright © 2008 Likewise Software. All rights reserved. 2.26.2008.
  • 10. Product Documentation Likewise: Configuring Apache Web Server for Single Sign-On Platforms Directives Red Hat LoadModule auth_kerb_module modules/mod_auth_kerb_centeris.so Linux LoadModule auth_sys_group_module modules/mod_auth_sys_group.so Novell SuSE LoadModule auth_kerb_module /usr/lib/apache2-prefork/mod_auth_kerb_centeris.so Linux LoadModule auth_sys_group_module /usr/lib/apache2-prefork/mod_auth_sys_group.so Setup Apache Server or Virtual Server To Use SSL (Optional) It is recommended that all web sites that require authentication communicate over the Secure Socket Layer (SSL) protocol. SSL encrypts all data that passes between the client browser and the web server. Furthermore, SSL allows performing Basic Authentication as a fallback mechanism in a secure fashion. Basic Authentication is the only fallback mechanism provided by mod_auth_kerb_centeris in the case when the primary, Kerberos authentication does not succeed. This is especially important if the protected website also needs to be accessible from outside the corporate network. Configuring SSL for the main Apache server or virtual server is beyond the scope of this guide. Various installations of the Apache web server provide sample SSL configuration files that can be included from the main httpd.conf file. In most cases you will need to generate a self- signed SSL certificate or for production environments purchase a commercial certificate. On most Linux or Unix systems a self signed certificate can be generated using the openssl command. Generate Kerberos keytab File The Kerberos keytab file is necessary to authenticate incoming requests. It contains encrypted, local copy of the host’s key and if compromised may allow unrestricted access to the host computer. It is therefore crucial to protect it with the appropriate file access permissions. This file must be readable by the user group under which the Apache web server is running, usually apache on Red Hat systems or www on SuSE systems. Find the Group Name of the Apache Web Server 1. Locate the main Apache httpd.conf configuration file. 2. Search the httpd.conf file for the Group directive (case sensitive). Copyright © 2008 Likewise Software. All rights reserved. 2.26.2008.
  • 11. Product Documentation Likewise: Configuring Apache Web Server for Single Sign-On Example: Group apache Next, you will need to find out the server name of the web site that will require authentication. The authentication will actually protect a specific directory, thus restricting access to a physical location on the file system. The directory to protect will either be in the context of the main Apache server or in the context of a Virtual Host. Find the Server Name of the Web Site that Requires Authentication 1. Locate the Apache configuration file that contains the <Directory> directive of the physical directory to be protected by authentication. Depending on your setup this may be in the main httpd.conf configuration file or a file included from the main file. 2. Locate the ServerName directive within the <VirtualHost> container containing the <Directory> directive or locate the global ServerName directive if not using <VirtualHost>. Example: <VirtualHost *:80> ServerName myserver:80 DocumentRoot /srv/www/htdocs <Directory /srv/www/htdocs> AllowOverride None Options –Indexes Order allow,deny Allow from all </Directory> The server name in the example above is myserver. Note: If the ServerName is not specified in the configuration file, try doing a reverse DNS name lookup on the IP address of the host or just use the hostname of the Linux or Unix system. You will also need to know the full domain name of the domain to which the Linux or Unix system is joined. Finally, you will need to figure out where to save the generated keytab file. It is possible to keep one keytab Copyright © 2008 Likewise Software. All rights reserved. 2.26.2008.
  • 12. Product Documentation Likewise: Configuring Apache Web Server for Single Sign-On file for all Virtual Host sites on your server or to create a separate keytab file for each Virtual Host. Generate a Kerberos keytab file The steps below use a sample Apache user account name: apache, a sample server name: myserver, a sample full domain name: MYDOMAIN.COM and a sample Kerberos keytab file name: /etc/apache2/protected/krb5_myserver.keytab. Substitute your own names for these values. 1. Set the KRB5_KTNAME environment variable to point to the Kerberos keytab file to be generated. # export KRB5_KTNAME=FILE:/etc/apache2/protected/krb5_myserv er.keytab 2. Generate keytab entry for the default HTTP service principal. # /usr/centeris/bin/lwinet ads keytab add HTTP –P 3. Generate keytab entry for myserver service principal # /usr/centeris/bin/lwinet ads keytab add HTTP/myserver@MYDOMAIN.COM –P 4. Generate keytab entry for myserver.mydomain.com HTTP service principal # /usr/centeris/bin/lwinet ads keytab add HTTP/myserver.mydomain.com@MYDOMAIN.COM –P 5. Change the group ownership of the keytab file # chown root.www /etc/apache2/protected/krb5_myserver.keytab 6. Set appropriate file permissions of the keytab file # chmod 640 /etc/apache2/protected/krb5_myserver.keytab Set mod_auth_kerb_centeris.so and mod_auth_sys_group.so The only configuration that remains is to modify the Apache configuration file by adding appropriate directives in each <Directory> container that is to be protected. Copyright © 2008 Likewise Software. All rights reserved. 2.26.2008.
  • 13. Product Documentation Likewise: Configuring Apache Web Server for Single Sign-On To enable single sign-on authentication, add the following directives inside the protected <Directory> container: Note: Replace /etc/apache2/protected/krb5_myserver.keytab with your own keytab file name and replace MYDOMAIN with your short domain name. AuthType Kerberos Krb5Keytab /etc/apache2/protected/krb5_myserver.keytab KrbMethodK5Passwd on AuthName "Secure Server" require group "MYDOMAINdomain users" require user “MYDOMAINAdministrator” The following table explains the meaning of the commonly used directives for mod_auth_kerb_centeris.so and mod_auth_sys_group.so modules. Directive Name Values Explanation AuthType “Kerberos” This value should always be set to “Kerberos”. Krb5Keytab file path Points to the location of the Kerberos V5 keytab file readable by Apache. KrbMethodK5Passwd “on” or “off” Enables or disables Basic Authentication fallback mechanism. Should only be set to “on” if SSL is enabled. AuthName quoted The name of the authorization realm for string a directory. This realm is given to the client so that the user knows which username and password to send. require user space Only the named users can access the delimited resource. user list require group space Only users in the named groups can delimited access the resource. group list To complete the configuration, you must restart the Apache web server: Copyright © 2008 Likewise Software. All rights reserved. 2.26.2008.
  • 14. Product Documentation Likewise: Configuring Apache Web Server for Single Sign-On Red Hat Linux # /etc/init.d/httpd restart Novell SuSE # /etc/init.d/apache2 restart Linux Testing Authentication The first test is to determine if Integrated Windows Authentication is working for all domain users. The require group “MYDOMAINdomain users” directive will allow any user that is part of the “domain users” group to authenticate. Note: Use Internet Explorer because it supports Integrated Windows Authentication. Verify that the “Enable Integrated Windows Authentication” checkbox is selected in the Internet Explorer Internet Options dialog on the Advanced tab. Test Single-Sign-On authentication for a domain user 1. Logon to a Windows computer that is joined to the same domain you joined your Linux or Unix system to. Logon as a domain user. 2. Access the protected web site from Internet Explorer. NOTE: Do not access the site using the IP address of the server because doing so will not result in the Internet Explorer getting a Kerberos ticket for the server. Use the server name instead. Example: https://myserver The authentication should succeed without a need to provide a user name and password. Test the Basic Authentication Fallback The second test is to determine if the Basic Authentication fallback mechanism is working. This test will only work if the KrbMethodK5Passwd directive was set to “on” and for production environments should only be done over SSL. 1. Logon to a Windows computer using a local user account. Alternatively, you can logon to a computer that is joined to a different domain than the Linux or Unix Web server. Another possibility is to use another browser that does not support Copyright © 2008 Likewise Software. All rights reserved. 2.26.2008.
  • 15. Product Documentation Likewise: Configuring Apache Web Server for Single Sign-On Integrated Windows Authentication. 2. Access the protected web site from the browser. Example: https://myserver 3. You should be prompted for user name and password. The authentication should succeed after providing a domain user name and password. Be sure to prefix the user name with the short domain name. For example: MYDOMAINAdministrator. Troubleshooting In the case of authentication failure, there are some diagnostic tools that may help diagnose a problem. Apache Log File The Apache log file may contain helpful information as to the nature of the problem. Locate your Apache log file by examining the ErrorLog directives in the Apache configuration file. You can increase the logging detail by setting the LogLevel directive to “debug”. The Microsoft KERBTRAY utility The Microsoft KERBTRAY utility, part of Microsoft Windows 2000 Resource Kit, will help to determine if the Internet Explorer browser obtained a Kerberos ticket for your web server. Integrated Windows Authentication requires that the client obtains a Kerberos ticked from the Active Directory. To check if the web browser obtained a Kerberos ticket for your web server: 1. Logon to a Windows computer that is joined to the domain you joined you Linux or Unix system to. Logon as a domain user. 2. Install the Microsoft KERBTRAY utility. The setup should be available at the following URL http://download.microsoft.com/download/win2000platform/kerbtray/1.0 0.0.1/NT5/EN-US/kerbtray_setup.exe. 3. Launch KERBTRAY.EXE. This will install an icon in your taskbar tray. Copyright © 2008 Likewise Software. All rights reserved. 2.26.2008.
  • 16. Product Documentation Likewise: Configuring Apache Web Server for Single Sign-On 4. Access the protected web site from Internet Explorer using the server name in the URL rather than the IP address. Example: https://myserver 5. Double click on the KERBTRAY icon in the taskbar tray. This will show a dialog displaying all Kerberos tickets. 6. Look for the name of your domain in the list of the tickets. Under your domain look for service principal that will look like HTTP/myserver.mydomain.com. KLIST Linux or Unix Utility The klist Linux or Unix utility, part of the krb5-client package, may be used to check the Kerberos keytab file on the Linux or Unix system. The output of this command will display all service principal tickets that are contained in the keytab file. This command may be unavailable on some systems. To use klist to examine the contents of a Kerberos keytab file: NOTE: Replace myserver with your own server name and mydomain.com with your domain name. 1. Locate the Kerberos keytab file for the protected web site. You may need to find the Krb5Keytab directive in the Apache configuration file. 2. Execute the klist –k <keytab file name> command. # klist -k krb5_myserver.keytab 3. Verify that the correct service principal names are displayed. The names to look for are HTTP/myserver@MYDOMAIN.COM and HTTP/myserver.mydomain.com@MYDOMAIN.COM. It is normal to see multiple entries for the same name. Example output: # klist -k krb5_myserver.keytab Keytab name: FILE:krb5_myserver.keytab KVNO Principal ---- -------------------------------------------------------------------------- 6 HTTP/myserver@MYDOMAIN.COM 6 HTTP/myserver@MYDOMAIN.COM 6 HTTP/myserver@MYDOMAIN.COM 6 HTTP/myserver.mydomain.com@MYDOMAIN.COM Copyright © 2008 Likewise Software. All rights reserved. 2.26.2008.
  • 17. Product Documentation Likewise: Configuring Apache Web Server for Single Sign-On 6 HTTP/myserver.mydomain.com@MYDOMAIN.COM 6 HTTP/myserver.mydomain.com@MYDOMAIN.COM If the service principal names are not correct, go back to the Generate Kerberos keytab file step above to generate a new Kerberos keytab file. Common Issues As Authentication problems may be difficult to diagnose, start with double checking all the configuration parameters including the validity of the generated Kerberos keytab file. If all the configuration parameters appear to be correct then examine the list of common problems below. Problem Explanation System clock out For Kerberos authentication to work the system clocks on of sync all involved systems must not be more than 5 minutes apart. Make sure that the time on the Active Directory server, Linux or Unix web server and the client are synchronized. User accessing If Kerberos ticket was obtained on the client or the user the web site is correctly entered his credentials during Basic not on the Authentication prompt it may be the case the authentication “require” list worked but the authorization failed. In this case the error_log Apache log file will contain a line similar to the one below. access to / failed, reason: user MYDOMAINuser not allowed access Add the user to the “require user” directive or add the user’s group to “require group” directive. User accessing If the client user is logged into a domain different than the the web site is domain of the web server then one of two things will logged to wrong happen. If the KrbMethodK5Passwd directive is set to “on” domain then the user will be prompted for credentials. If KrbMethodK5Passwd is set to “off” the authentication will fail and the “Authorization Required” page will be displayed. Internet Explorer This problem is common if the web site is accessed using a web browser URL that includes the full domain name such as does not https://myserver.mydomain.com. Internet Explorer will consider the only try to obtain Kerberos tickets for websites that are in URL as part of the Local Intranet zone. Try accessing the web site using the Local just the server name, for example https://myserver. Intranet zone. Alternatively, you can add the URL to a list of Local Intranet sites using the Sites/Advanced buttons in the Internet Options dialog on the Security tab. Copyright © 2008 Likewise Software. All rights reserved. 2.26.2008.
  • 18. Product Documentation Likewise: Configuring Apache Web Server for Single Sign-On Service Principal This is a rather rare problem, but very difficult to diagnose Name of the web because of lack of good error that is returned to the web site is mapped to server. This can happen if the ktpass Windows utility was more than one used on the Domain Controller to generate a Kerberos object in the keytab file. Active Directory To diagnose this problem log onto the Active Directory domain controller and open the Event Viewer. Look for event of type=Error, source=KDC, and event ID=11. The text of the event will be similar to the below message. There are multiple accounts with name HTTP/myserver.mydomain.com of type DS_SERVICE_PRINCIPAL_NAME. Fixing this problem will require locating the computer or user objects used to map the service principal name in the Active Directory. The Active Directory Users and Computers MMC snap-in allows running custom LDAP queries. Use a LDAP query similar to this one “(servicePrincipalName=HTTP/myserver.mydomain.com)” to locate the Active Directory objects. Once object have been located then the spurious User object may be deleted. If the object cannot be deleted then use the ADSI Edit MMC snap-in to manually remove the “HTTP/myserver.mydomain.com” string from the servicePrincipalName object property. Contact Technical Support For either post-sales technical support or for free technical support during an evaluation period, please visit the Likewise support web page at http://www.likewisesoftware.com/support/. You can use the support page to register for support, submit incidents, and receive direct technical assistance. Technical support may ask for your Likewise version, Linux version, and Microsoft Windows version. To find the Likewise product version, in the Likewise Console, on the menu bar, click Help, and then click About. Copyright © 2008 Likewise Software. All rights reserved. 2.26.2008.
  • 19. Product Documentation Likewise: Configuring Apache Web Server for Single Sign-On ABOUT LIKEWISE Likewise Software is an open source company that provides audit and authentication solutions designed to improve security, reduce operational costs and help demonstrate regulatory compliance in mixed network environments. Likewise Open allows large organizations to securely authenticate Linux, UNIX and Mac systems with a unified directory such as Microsoft Active Directory. Additionally, Likewise Enterprise includes world-class group policy, audit and reporting modules. Likewise Software is a Bellevue, WA-based software company funded by leading venture capital firms Ignition Partners, Intel Capital, and Trinity Ventures. Likewise has experienced management and engineering teams in place and is led by senior executives from leading technology companies such as Microsoft, F5 Networks, EMC and Mercury. Copyright © 2008 Likewise Software. All rights reserved. 2.26.2008.