LDAP Configuration
LDAP Configuration
Preface
This document provides information to help system administrators with the LDAP Global Address Book and User Authentication features of the Multi-function peripheral (MFP). With this information, the administrator will ??Better understand how the LDAP Global Address Book and User Authentication features interact on the MFP. ??Have a foundation to conduct basic troubleshooting for issues surrounding the LDAP global address search and user authentication. This document assumes general knowledge of LDAP and its components, as well as basic understanding of directory concepts. The LDAP configuration and troubleshooting guide in this document are not exhaustive. The multitude of variables in supported environments means that problems encountered may require more time and expertise to implement and troubleshoot than simple network printing. As well, cooperation between different support personnel at the users installation site is often required.
Draft
ii
Table of Contents
PREFACE............................................................................................................................................................ II LIST OF FIGURES ..........................................................................................................................................IV LIST OF TABLES.............................................................................................................................................IV 1. OVERVIEW..................................................................................................................................................... 1 2. LDAP DIRECTORY BASICS ...................................................................................................................... 2 2.1. SEARCH ROOT FOR DIRECTORY ENTRIES .................................................................................................. 2 2.2. MICROSOFT EXCHANGE 5.5 ....................................................................................................................... 2 2.2.1. MS Exchange 5.5 Objects................................................................................................................... 2 2.3. ACTIVE DIRECTORY.................................................................................................................................... 3 2.3.1. Active Directory Objects .................................................................................................................... 3 2.3.2. Case 1: A Simple Case ....................................................................................................................... 3 2.3.3. Case 2: A More Complex Case......................................................................................................... 5 2.4. N OVELL E DIRECTORY 8.7 .......................................................................................................................... 7 2.4.1. Novell eDirectory 8.7 Objects............................................................................................................ 7 3. BASIC SERVER CONFIGURATION ........................................................................................................ 9 3.1. KERBEROS KDC ......................................................................................................................................... 9 3.2. DNS SERVER .............................................................................................................................................. 9 3.3. MICROSOFT EXCHANGE 5.5 ....................................................................................................................... 9 3.3.1. Maximum Number of Search Results Returned ................................................................................ 9 3.4. ACTIVE DIRECTORY / EXCHANGE 2000 CONFIGURATION ..................................................................... 10 3.4.1. Enable Anonymous LDAP Access.................................................................................................... 10 3.4.2. Maximum Number of Search Results Returned .............................................................................. 10 3.5. ACTIVE DIRECTORY / EXCHANGE 2003 CONFIGURATION ..................................................................... 11 3.5.1. Enable Anonymous LDAP Access.................................................................................................... 11 3.5.2. Maximum Number of Search Results Returned .............................................................................. 11 3.6. LINUX/OPEN LDAP................................................................................................................................... 11 3.7. N OVELL E DIRECTORY 8.7 ........................................................................................................................ 11 4. BASIC MFP CONFIGURATION .............................................................................................................. 13 4.1. DNS SETUP ............................................................................................................................................... 13 4.2. KERBEROS AUTHENTICATION SETUP ...................................................................................................... 13 4.3. CLOCK SETUP............................................................................................................................................ 15 4.4. GLOBAL ADDRESS BOOK SETUP .............................................................................................................. 16 4.4.1. Global Address Book Setup Example for Case 2............................................................................ 18 4.4.2. Global Address Book Setup Example for MS Exchange................................................................ 18 4.4.3. Global Address Book Setup Example for Novell eDirectory 8.7................................................... 19 4.4.4. User Name Entry .............................................................................................................................. 20 4.4.5. Additional Notes................................................................................................................................ 22 4.5. U SER AUTHENTICATION ........................................................................................................................... 22 5. BASIC TROUBLESHOOTING ................................................................................................................. 25 5.1. LDAP CONFIGURATION P ROBLEMS ........................................................................................................ 25 5.2. AUTHENTICATION PROBLEMS .................................................................................................................. 25 6. GLOSSARY ................................................................................................................................................... 27
Draft
iii
1. List of Figures
FIGURE 1. GLOBAL ADDRESS S EARCH .................................................................................................................. 1 FIGURE 2. ACTIVE DIRECTORY USERS AND COMPUTERS FOR CASE 1 ................................................................ 4 FIGURE 3. USER PROPERTIES FOR MARY S MITH .................................................................................................. 5 FIGURE 4. ACTIVE DIRECTORY USERS AND COMPUTERS FOR CASE 2 ................................................................ 6 FIGURE 5. USER PROPERTIES FOR JOHN DOE........................................................................................................ 7 FIGURE 6. NOVELL EDIRECTORY CONFIGURATION USING NOVELL CONSOLE ONE ........................................... 8 FIGURE 7. DNS SETUP WEB PAGE ...................................................................................................................... 13 FIGURE 8. KERBEROS SETUP WEB P AGE ............................................................................................................ 14 FIGURE 9. ACTIVE DIRECTORY USERS AND COMPUTERS TOOL ........................................................................ 14 FIGURE 10. TIME ZONE SETUP ............................................................................................................................ 15 FIGURE 11. MFP CLOCK ADJUST ........................................................................................................................ 15 FIGURE 12. GLOBAL ADDRESS BOOK SETUP WEB P AGE FOR CASE 1............................................................... 16 FIGURE 13. GLOBAL ADDRESS BOOK SETUP WEB P AGE FOR CASE 2............................................................... 18 FIGURE 14. GLOBAL ADDRESS BOOK SETUP WEB P AGE FOR MS EXCHANGE 5.5........................................... 18 FIGURE 15. GLOBAL ADDRESS BOOK SETUP WEB P AGE FOR NOVELL EDIRECTORY 8.7 ................................ 19 FIGURE 16. NETWORK S CANNING S ETUP WEB PAGE ........................................................................................ 23 FIGURE 17. SENDER MANAGEMENT WEB PAGE ................................................................................................. 23
List of Tables
TABLE 1. CHANGE NOTIFICATION LIST .................................................... ERROR! BOOKMARK NOT DEFINED. TABLE 2. CHANGE HISTORY ...................................................................... ERROR! BOOKMARK NOT DEFINED. TABLE 3. REVIEW HISTORY ....................................................................... ERROR! BOOKMARK NOT DEFINED. TABLE 4. AUTHENTICATION TYPES ................................................................................................................... 17 TABLE 5. USER NAME ENTRY FORMATS ........................................................................................................... 20 TABLE 6. USER NAME ENTRY FOR MS EXCHANGE 5.5 .................................................................................... 20 TABLE 7. USER NAME ENTRY FOR ACTIVE DIRECTORY 2000.......................................................................... 21 TABLE 8. USER NAME ENTRY FOR ACTIVE DIRECTORY 2003.......................................................................... 21 TABLE 9. USER NAME ENTRY FOR OPENLDAP................................................................................................ 21 TABLE 10. USER N AME ENTRY FOR NOVELL EDIRECTORY 8.7 ....................................................................... 22
Draft
iv
2. Overview
The LDAP protocol is used for accessing the global address book for selecting e-mail recipients and for user authentication [1]. The User Authentication feature on the MFP requires users to log into the network at the MFP front panel before using the network scanning function. User authentication via LDAP provides great flexibility because the server handles verification of the user name and password. The Global Address Book and User Authentication features are configured using the MFP web interface. This document will describe basic operation setup with the following LDAP servers: ? Microsoft Exchange 5.5 ? ? Microsoft Active Directory 2000 ? ? Microsoft Active Directory 2003 ? ? OpenLDAP ? ? Novell eDirectory 8.7 ? To use the global address book, the MFP behaves as an LDAP client to an LDAP server as shown in Figure 1. The client performs a request for a service whereas the server carries out the task. A typical LDAP session between the MFP and the LDAP server is as follows: 1. The MFP sends a bind request to the server. The bind request is the first packet that flows during an LDAP session. The bind request can be an anonymous bind, a simple bind or one of the Simple Authentication and Security Layer (SASL) mechanisms [5]. Section 5.4 provides more details on the different authentication types. 2. The server receives the bind request and is willing to provide service to the MFP. Authentication of the device may be required. The server responds to the bind request with an acknowledgement called the bind response. 3. Upon receiving the bind response, the MFP sends the details of the desired service (i.e. search request) to the server. The MFP uses a search filter to define the search request. As part of the search request, the MFP specifies that the common name and e-mail address attributes be returned in the search results. 4. The server executes the required search and replies with the desired response. The retrieved common name attribute(s) is displayed on the global address search web page or the front panel. The e-mail address attribute of the selected entry is used as the recipients e-mail address. 5. At this point the MFP may continue with another search request or may terminate the session.
Figure 1. MFP Global Address Search
Draft
Exchange 5.5 will usually have a search root beginning with cn=Recipients. The root of the tree can be determined by reading the registry using regedit on the server where Exchange is installed. Browse to the following key:
HKEY_LOCAL_MACHINE/System/CurrentControlSet/Services/MSExchangeCCMC/Parameters/SiteDN
Take the value in the above key and create the search root. For example, if you see the following /o=sec/ou=slacamas you would create as the search root: cn=Recipients,ou=slacamas,o=sec
Draft
LDAP Admin Setup Guide Note that the parameters for the search root are listed in reverse order from what is displayed in Exchange, and that commas separate the records rather than forward slashes. See Exchange administrator if there is any difficulty.
These keywords can be used more than once in a distinguished name, if necessary, to accurately name the path to the object. For instance, the user John Doe in the West department of Sales in the domain Surfnet.local might have a DN like this: CN=John Doe,OU=West,OU=Sales,DC=Surfnet,DC=local In this example, there are two OU components and two DC components. The Relative Distinguished Name is simply the portion of the Distinguished Name that uniquely identifies an object within the objects parent container. For instance, Johns RDN from the above example, would be: CN=John Doe A RDN does not have to be unique. User John Doe in the East department might also have the exact same RDN, though his DN would, of course, indicate that his account was in a different OU.
Draft
DC=Surfnet, DC=local
CN=Users
CN=Mary Smith
CN=John Smith
The user, Mary Smith, in this directory has the following DN: CN=Mary Smith,CN=Users,DC=Surfnet,DC=local The user, John Smith, in this directory has the following DN: CN=John Smith,CN=Users,DC=Surfnet,DC=local A tool such as Microsofts Active Directory Users and Computers MMC snap-in can be used to view directory objects. Figure 2 shows the Active Directory Users and Computers tools view of the above directory structure. Figure 3 details the user properties for Mary Smith.
Draft
This case will be referred to through out this document as an example for setting up the LDAP global address book feature.
Draft
DC=Surfnet, DC=local
OU=Sales
OU=Imaging
OU=Administration
OU=East
OU=West
CN=John Doe
CN=Cathy Jones
Figure 4 shows the Active Directory Users and Computers tools view of the directory structure for Case 2. Figure 5 details the user properties for John Doe.
Draft
This case will also be referenced through out this document as an example for setting up the LDAP global address book feature. To create an address book for the West department, the following search root would be used: OU=West,OU=Sales,DC=Surfnet,DC=local Address books can be created to look for recipients anywhere in the directory from the top of the tree (DC=Surfnet, DC=local) down to a specific container (OU=West, OU=Sales, DC=Surfnet, DC=local).
A Novell eDirectory tree should be organized according to the following rules: ? Use a pyramid design. ? ? Create a single Organization object. ?
Draft
LDAP Admin Setup Guide ? Create first-level Organizational Units that represent the physical network infrastructure. ? A sample directory is shown below:
O=slahb
OU=Users
CN=tjones
CN=cjenkins
The corresponding Novell ConsoleOne view of the above directory is shown in Figure 6.
Figure 6. Novell eDirectory Configuration Using Novell ConsoleOne
Draft
Draft
Draft
10
ldap policy: set maxpagesize to #### (for example, 2000) ldap policy: commit changes ldap policy: q ntdsutil: q Disconnecting from SERVERNAME C:>
4.6. Linux/OpenLDAP
The uid or user ID attribute may need to be added to the LDAP schema for the User Authentication feature. uid is an attribute for uniquely identifying computer system login names. To determine the existence of the uid attribute on your LDAP server, you may need to refer to an LDAP administrator or product documentation for that server.
Draft
11
LDAP Admin Setup Guide Properties page. In addition, using ConsoleOne, the Require TLS for All Operations option must be deselected in the SSL/TLS Configuration tab in the LDAP Server Properties page.
Draft
12
Name Primary DNS Server Secondary DNS Server Timeout Domain Name
Definition IP address of primary Domain Name Service (DNS) server. IP address of secondary Domain Name Service (DNS) server. DNS server timeout Full name of the domain
Type / Input Limitations IP address format IP address format 0 to 60 seconds 64 characters text
Draft
13
Definition An IP address or resolvable host name for the Key Distribution Center (KDC). LDAP server port number. The logical network served by the Kerberos database. Kerberos realm names are casesensitive. By convention, realm names are generally all uppercase letters. However, the user should refer to the Kerberos administrator for the correct realm name. Typically for Active Directory, the Kerberos realm name is the full DNS name of the domain in uppercase letters. From our example, the domain, surfnet.local, maps to a Kerberos realm name of SURFNET.LOCAL. The Active Directory domain name can be obtained from the Active Directory Users and Computers administrative tool (see Figure 9).
Type / Input Limitations IP address format or 127 characters text 5 digit 127 characters text
Draft
14
Set the date and time to current local date and time via the Custom Settings Mode. Select Daylight Saving Time Setting if applicable (see Figure 11).
Figure 11. MFP Clock Adjust
Draft
15
Definition Name of the address book. Users will select which address book to search by the name. The base or root of the directory where the LDAP server will start the search for names. Allows user(s) to limit the LDAP search. The form of the search root is server and installation specific. Check with LDAP system administrator for specific information. Using the examples in Section 3, a typical search root for MS Exchange 5.5: cn=Recipients,ou=slacamas,o=sec. Active Directory Case 1: cn=Users,dc=surfnet,dc=local Active Directory Case 2: ou=west,ou=sales,dc=surfnet,dc=local. An IP address or resolvable host name for the LDAP server LDAP server port number. Some LDAP implementations require a different port number
LDAP Server
Port Number
Blank
389
Draft
16
LDAP Admin Setup Guide other than the default port number. LDAP server connection and search request timeout. The name of a user authorized to search entries in the user directory. Format may be user logon name or distinguished name. Section 5.4.4 provides more details on the format for this entry. Note: It is recommended that the LDAP administrator create a user name for the MFP itself. The password for the user specified by the User Name. Authentication type for address book. See Table 1 for more information. Note: Microsoft Active Directory does not support the standard Anonymous authentication type. To use anonymous access with Active Directory, select Simple authentication, enter anonymous as the username, and leave password blank. Sets the current address book as the default. The default address book is used for user authentication and is pre-selected as the address book for searches (user can select an alternative address book at search time).
Table 1. Authentication Types
5 Blank
32 characters text Drop down list (Anonymous, Simple, NTLM, Digest-MD5, Kerberos)
Blank Anonymous
Checkbox
Unchecked
Description No user name or password is provided. The User Name and Password fields are not passed to the LDAP server in the bind request operation. A NULL user name and password are used in place of these values. User name and password are provided, but are sent over the network in clear-text. A challenge/response authentication method using MD5 algorithm. The mandatory-to-implement default authentication mechanism for LDAPv3. NTLM is a authentication protocol used in Windows NT environments. The password is hashed and then encrypted with a challenge from the server before being sent over the network. In NT environments, user information is stored in and verified by the SAM database (Security Accounts Manager) on the domain controller. Kerberos is a trusted-third party authentication system developed by MIT. Kerberos is the default authentication protocol for Windows 2000 environments. Kerberos utilizes a Key Distribution Center (KDC) that authenticates users and grants tickets to use services on a network.
Kerberos
Draft
17
Draft
18
5.4.3. Global Address Book Setup Example for Novell eDirectory 8.7
Figure 15. Global Address Book Setup Web Page for Novell eDirectory 8.7
Draft
19
Description A unique identifier of an entry in an LDAP directory. In effect, it is the path to the object in a directory information tree (DIT). Components are comma-separated. The individual components of a distinguished name. The users logon name. The users display name
Case 1: cn=Mary Smith Case 2: cn=John Doe Case 1: msmith Case 2: jdoe Case 1: Mary Smith Case 2: John Doe
User Name Entry No entry in User Name is required. Distinguished name (DN) or distinguished name (RDN) User logon name Not supported. Not supported. relative cn=jdoe jdoe
Examples
Draft
20
User Name Entry Not supported. Note: If anonymous access is enabled, use Simple Authentication type with User Name of Anonymous and no password. Active Directory Display name Active Directory User logon name Not supported. Active Directory User logon name
Examples
Case 1: Mary Smith Case 2: John Doe Case 1: msmith Case 2: jdoe Case 1: msmith Case 2: jdoe
User Name Entry Not supported. Note: If anonymous access is enabled, use Simple Authentication type with User Name of Anonymous and no password. Active Directory Display name Active Directory User logon name Active Directory User logon name Active Directory User logon name
Examples
Case 1: Mary Smith Case 2: John Doe Case 1: msmith Case 2: jdoe Case 1: msmith Case 2: jdoe Case 1: msmith Case 2: jdoe
User Name Entry No entry in User Name is required. Distinguished name (DN) Not supported.
Examples cn=jlum,dc=sharplabs,dc=com
Draft
21
LDAP Admin Setup Guide Digest-MD5 Kerberos OpenLDAP user name in sasldb or other database User principal name jlum jlum
User Name Entry No entry in User Name is required. Distinguished name (DN) Not supported. Distinguished name (DN) must be preceded by dn:. Not supported.
Draft
22
Items used for authentication may be login name, password, and e-mail address or login name and password only. If e-mail address is included, authentication will only succeed if the e-mail address setup for the sender matches the one in the LDAP server. User authentication is performed using the LDAP server configured for the default address book. Each user that will be authenticated needs to be setup as a sender on the device using the Sender Management web page. See Figure 17.
When users access the scan function at the MFP front panel they will be prompted to select a sender name and enter their password. The login name configured for that sender and the entered password will be sent to the LDAP server for authentication. Upon successful authentication, the e-mail address configured for the sender will be placed in the e-mail From field. Authentication of login name, password, and email address can be used to ensure that the e-mail address configured for the sender matches the one on the LDAP server. The login name for the sender can have different formats based on the authentication type of the default Global Address Book. It may be necessary to enter the distinguished name, relative distinguished name, or user login name. See Table 2 in Section 5.4.4 for details.
Draft
23
LDAP Admin Setup Guide The uid and samaccountname attributes are used for user authentication. Therefore, in order for the user authentication to be successful, the LDAP server must contain either the uid or samaccountname attribute. The uid is typically used in Unix/Linux systems. The samaccountname is used in Windows 2000 / 2003 Active Directory.
Draft
24
6. Basic Troubleshooting
This section provides basic troubleshooting to help the user diagnose problems with the configuration of the Global Address Book and User Authentication features. Due to the large number of possible network environments, an exhaustive troubleshooting guide is beyond the scope of this document.
Error message on web page: NIC is not ready. Error message on web page: To resolve the name of LDAP Server failed. Error message on web page: Timeouted. Error message on web page: Authentication of LDAP Server failed. Front panel user authentication failed.
Increase the LDAP server timeout value setting using the MFP web interface. See Section 6.2.
Ensure uid or samaccountname attributes are accessible in directory. MFP searches for a user name using the uid or samaccountname attribute in the directory. If either of these attributes is not accessible for LDAP queries, the search fails even if a valid user name and password are provided.
Draft
25
LDAP Admin Setup Guide Kerberos authentication fails. Verify user name is user principal name. Verify entered user name and password are correct. Create a test user principal and password to use with the MFP. Test with a desktop system on the same network as the MFP and KDC. Check time synchronization between MFP and KDC is within limits specified by the KDC. Make sure KDC is running. Ensure Kerberos realm name is correct. Kerberos realm name is casesensitive. Verify the KDC is resolvable using DNS.
Draft
26
7. Glossary
This glossary defines terms used in the LDAP Users Guide. LDAP The Lightweight Directory Access Protocol used by clients to locate entries in a directory. Commonly used by e-mail servers to make global address books available to clients. LDAP is used in Sharp MFPs to search the global address e-mail address book at the front panel and for completing e-mail fields on the device web pages. A message digest algorithm [4]. Refers to NT LAN Manager security. Also referred to as Windows NT challenge/response in Microsofts Exchange Server Administrator tool. Simple Authentication and Security Layer is a protocol used in LDAP to provide authentication, data integrity and data confidentiality
MD5 NTLM
SASL
Draft
27