Authenticate through Fedora Directory Server

Version 1 by Robin Shen
on Dec 04, 2014 05:20.


 
compared with
Current by Robin Shen
on Dec 04, 2014 06:07.


 
Key
These lines were removed. This word was removed.
These lines were added. This word was added.

View page history


There are 2 changes. View first change.

 h1. Scenario
 Authenticate users through Fedora directory server and retrieve associated groups to determine user permission. We assume that:
 # This directory server can be accessed through address _ldaps://ds.example.com:636_
 # Users are managed under LDAP entry _ou=people,dc=example,dc=com_.
 # Groups are managed under LDAP entry _ou=groups,dc=example,dc=com_.
  
 h1. Resolution
 # For each LDAP group you want to assign QuickBuild permissions, create a group with the same name in QuickBuild, and set proper permissions.
 # Login as Administrator, switch to menu _Authentication->Authenticators_, and add an authenticator of LDAP type like below:
  # Login as Administrator, switch to menu _Authentication->Security Settings_, and add an authenticator of LDAP type like below:
 !fds.png!
 # Your users should now be able to login to QuickBuild and access to QuickBuild functionalities will be controlled using the group information from the fedora directory server.
  
 {info}To browse directory server user and group information in a LDAP friendly way (that is, be able to browse DN and various attribute names/values), you may need to install a LDAP client (such as [JXplorer|http://www.jxplorer.org]), and connect it to your directory server using LDAP url, user and password information listed above.{info}
  {info}To browse directory server user and group information in a LDAP friendly way (that is, be able to browse DN and various attribute names/values), you may need to install a LDAP client (such as [Apache Directory Studio|http://directory.apache.org/studio/]), and connect it to your directory server using LDAP url, user and password information listed above.{info}