Manual Ldap
Manual Ldap
Manual Ldap
Table of Contents
Overview .................................................................................................................................... vii
Architecture ................................................................................................................................. ix
1. Installation ................................................................................................................................ 1
New installation .................................................................................................................... 1
Requirements ................................................................................................................ 1
Prepackaged releases ...................................................................................................... 1
Installing the tar.bz2 ...................................................................................................... 2
System configuration ...................................................................................................... 3
Upgrading LAM or migrate from LAM to LAM Pro ................................................................... 4
Upgrade LAM ............................................................................................................... 4
Version specific upgrade instructions ................................................................................ 5
Uninstallation of LAM (Pro) ................................................................................................... 7
2. Configuration ............................................................................................................................ 8
General settings ..................................................................................................................... 8
Security settings ............................................................................................................ 8
Password policy ............................................................................................................ 9
Logging ....................................................................................................................... 9
Additional options ........................................................................................................ 10
Change master password ............................................................................................... 10
Server profiles ..................................................................................................................... 10
Manage server profiles .................................................................................................. 10
Editing a server profile ................................................................................................. 11
Typical scenarios ......................................................................................................... 14
3. Managing entries in your LDAP directory .................................................................................... 16
Typical usage scenarios ........................................................................................................ 17
Users ................................................................................................................................. 18
Personal ..................................................................................................................... 20
Unix .......................................................................................................................... 22
Group of names (LAM Pro) .......................................................................................... 24
Organizational roles (LAM Pro) ..................................................................................... 24
Shadow ...................................................................................................................... 25
Password self reset (LAM Pro) ...................................................................................... 25
Hosts ......................................................................................................................... 26
Samba 3 ..................................................................................................................... 27
Windows (Samba 4) ..................................................................................................... 28
Filesystem quota (lamdaemon) ....................................................................................... 29
Filesystem quota (LDAP) .............................................................................................. 29
Kolab ......................................................................................................................... 30
Asterisk ...................................................................................................................... 30
EDU person ................................................................................................................ 31
PyKota ....................................................................................................................... 31
Password policy (LAM Pro) .......................................................................................... 32
FreeRadius .................................................................................................................. 32
Heimdal Kerberos (LAM Pro) ........................................................................................ 33
MIT Kerberos (LAM Pro) ............................................................................................. 34
Mail aliases ................................................................................................................. 34
Qmail (LAM Pro) ........................................................................................................ 35
Mail routing ................................................................................................................ 36
SSH keys ................................................................................................................... 36
Authorized services ...................................................................................................... 36
IMAP mailboxes .......................................................................................................... 37
Account ...................................................................................................................... 38
Groups ............................................................................................................................... 38
Unix .......................................................................................................................... 38
Unix groups with rfc2307bis schema (LAM Pro) ............................................................... 40
iii
Samba 3 .....................................................................................................................
Windows (Samba 4) .....................................................................................................
Kolab .........................................................................................................................
Quota .........................................................................................................................
PyKota .......................................................................................................................
Hosts .................................................................................................................................
Account ......................................................................................................................
Device (LAM Pro) .......................................................................................................
Samba 3 .....................................................................................................................
Windows (Samba 4) .....................................................................................................
IP addresses (LAM Pro) ...............................................................................................
MAC addresses ...........................................................................................................
Puppet ........................................................................................................................
Samba 3 domains .................................................................................................................
Group of (unique) names (LAM Pro) ......................................................................................
Organizational roles (LAM Pro) .............................................................................................
Asterisk ..............................................................................................................................
Zarafa (LAM Pro) ................................................................................................................
Configuration ..............................................................................................................
Kolab shared folders ............................................................................................................
DHCP ................................................................................................................................
Bind DLZ (LAM Pro) ..........................................................................................................
Aliases (LAM Pro) ...............................................................................................................
Mail aliases .........................................................................................................................
NIS net groups ....................................................................................................................
NIS objects (LAM Pro) ........................................................................................................
Automount objects (LAM Pro) ...............................................................................................
Oracle databases (LAM Pro) ..................................................................................................
Password policies (LAM Pro) ................................................................................................
PyKota printers ....................................................................................................................
PyKota billing codes ............................................................................................................
Custom fields (LAM Pro) .....................................................................................................
Custom scripts (LAM Pro) ....................................................................................................
Sudo roles (LAM Pro) ..........................................................................................................
General information .............................................................................................................
Tree view (LDAP browser) ...................................................................................................
4. Tools ......................................................................................................................................
Profile editor .......................................................................................................................
File upload .........................................................................................................................
Multi edit ...........................................................................................................................
OU editor ...........................................................................................................................
PDF editor ..........................................................................................................................
Schema browser ..................................................................................................................
Server information ...............................................................................................................
Tests ..................................................................................................................................
Lamdaemon test ..........................................................................................................
Schema test .................................................................................................................
5. Access levels and password reset page (LAM Pro) .........................................................................
Access levels .......................................................................................................................
Password reset page .............................................................................................................
6. Self service (LAM Pro) .............................................................................................................
Preparations ........................................................................................................................
OpenLDAP ACLs ........................................................................................................
Other LDAP servers .....................................................................................................
Creating a self service profile ................................................................................................
Edit your new profile ...........................................................................................................
Basic settings ..............................................................................................................
Page layout .................................................................................................................
iv
40
40
41
42
42
43
43
43
43
43
44
44
44
45
46
47
48
50
50
54
55
58
62
62
63
63
63
64
66
66
67
67
72
74
75
75
76
76
77
78
79
79
81
81
82
82
82
84
84
84
87
87
87
87
87
88
88
90
List of Tables
1.1. Locales .................................................................................................................................. 3
3.1. LDAP attribute mappings ........................................................................................................ 22
3.2. Zone file .............................................................................................................................. 61
3.3. Action types ......................................................................................................................... 72
6.1. General options ..................................................................................................................... 89
6.2. Self service fields .................................................................................................................. 90
6.3. ............................................................................................................................................ 96
A.1. LDAP schema files .............................................................................................................. 102
vi
Overview
LDAP Account Manager (LAM) manages user, group and host accounts in an LDAP directory. LAM runs on any
webserver with PHP5 support and connects to your LDAP server unencrypted or via SSL/TLS.
LAM supports Samba 3, Unix, Zarafa, Kolab 2/3, address book entries, NIS mail aliases, MAC addresses and
much more. There is a tree viewer included to allow access to the raw LDAP attributes. You can use templates
for account creation and use multiple configuration profiles.
https://www.ldap-account-manager.org/
Copyright (C) 2003 - 2014 Roland Gruber <post@rolandgruber.de>
Key features:
managing user/group/host/domain entries
account profiles
account creation via file upload
multiple configuration profiles
LDAP browser
schema browser
OU editor
PDF export for all accounts
manage user/group Quota and create home directories
Requirements:
PHP5 (>= 5.2.4)
Any standard LDAP server (e.g. OpenLDAP, Active Directory, Samba 4, OpenDJ, 389 Directory Server,
Apache DS, ...)
A recent web browser that supports CSS2 and JavaScript, at minimum:
Firefox 3
Internet Explorer 8 (compatibility mode turned off)
Opera 10
The default password to edit the configuration options is "lam".
License:
LAM is published under the GNU General Public License. The complete list of licenses can be found in the
copyright file.
Default password:
The default password for the LAM configuration is "lam".
Have fun!
vii
Overview
viii
Architecture
There are basically two groups of users for LAM:
LDAP administrators and support staff:
These people administer LDAP entries like user accounts, groups, ...
Users:
This includes all people who need to manage their own data inside the LDAP directory. E.g. these people edit
their contact information with LAM self service (LAM Pro).
Therefore, LAM is split into two separate parts, LAM for admins and for users. LAM for admins allows to manage
various types of LDAP entries (e.g. users, groups, hosts, ...). It also contains tools like batch upload, account
profiles, LDAP schema viewer and an LDAP browser. LAM for users focuses on end users. It provides a self
service for the users to edit their personal data (e.g. contact information). The LAM administrator is able to specify
what data may be changed by the users. The design is also adaptable to your corporate design.
LAM for admins/users is accessible via HTTP(S) by all major web browsers (Firefox, IE, Opera, ...).
LAM runtime environment:
LAM runs on PHP. Therefore, it is independant of CPU architecture and operating system (OS). You can run
LAM on any OS which supports Apache, Nginx or other PHP compatible web servers.
Home directory server:
You can manage user home directories and their quotas inside LAM. The home directories may reside on the
server where LAM is installed or any remote server. The commands for home directory management are secured
by SSH. LAM will use the user name and password of the logged in LAM administrator for authentication.
LDAP directory:
LAM connects to your LDAP server via standard LDAP protocol. It also supports encrypted connections with
SSL and TLS.
ix
Chapter 1. Installation
New installation
Requirements
LAM has the following requirements to run:
Apache/Nginx webserver (SSL recommended) with PHP module (PHP 5 (>= 5.2.4) with ldap, gettext, xml,
openssl and optional mcrypt)
Some LAM plugins may require additional PHP extensions (you will get a note on the login page if something
is missing)
Perl (optional, needed only for lamdaemon)
Any standard LDAP server (e.g. OpenLDAP, Active Directory, Samba 4, OpenDJ, 389 Directory Server,
Apache DS, ...)
A recent web browser that supports CSS2 and JavaScript, at minimum:
Firefox 3
Internet Explorer 8 (compatibility mode turned off)
Opera 10
MCrypt will be used to store your LDAP password encrypted in the session file.
Please note that LAM does not ship with a selinux policy. Please disable selinux or create your own policy.
See LDAP schema fles for information about used LDAP schema files.
Prepackaged releases
LAM is available as prepackaged version for various platforms.
Debian
LAM is part of the official Debian repository. New releases are uploaded to unstable and will be available automatically in testing and the stable releases. You can
run
apt-get install ldap-account-manager
to install LAM on your server. Additionally, you may download the latest LAM Debian packages from the LAM homepage [http://
www.ldap-account-manager.org/] or the Debian
package homepage [http://packages.debian.org/search?
keywords=ldap-account-manager].
Installation of the latest packages on Debian
1. Install the LAM package
dpkg -i ldap-account-manager_*.deb
Installation
Suse/Fedora
There are RPM packages available on the LAM homepage [http://www.ldap-account-manager.org/]. The
packages can be installed with these commands:
rpm -e ldap-account-manager ldap-account-manager-lamdaemon (if an older version is installed)
rpm -i <path to LAM package>
FreeBSD
LAM is part of the official FreeBSD ports tree. For more
details see these pages:
FreeBSD-SVN: http://svnweb.freebsd.org/ports/head/
sysutils/ldap-account-manager/
FreshPorts: http://www.freshports.org/sysutils/ldap-account-manager
Installation
Configuration files
Copy config/config.cfg.sample to config/config.cfg and config/lam.conf.sample to config/lam.conf. Open the
index.html in your web browser:
Follow the link "LAM configuration" from the start page to configure LAM.
Select "Edit general settings" to setup global settings and to change the master configuration password (default
is "lam").
Select "Edit server profiles" to setup your server profiles. There should be the lam profile which you just copied
from the sample file. The default password is "lam". Now change the settings to fit for your environment.
Webserver configuration
Please see the Apache or Nginx chapter.
System configuration
PHP
LAM runs with PHP5 (>= 5.2.4). Needed changes in your php.ini:
memory_limit = 64M
For large installations (>10000 LDAP entries) you may need to increase the memory limit to 256M.
If you run PHP with activated Suhosin [http://www.hardened-php.net/suhosin/index.html] extension
please check your logs for alerts. E.g. LAM requires that "suhosin.post.max_name_length" and
"suhosin.request.max_varname_length" are increased (e.g. to 256).
Locale
Catalan
ca_ES.utf8
Installation
Chinese (Simplified)
zh_CN.utf8
Chinese (Traditional)
zh_TW.utf8
Czech
cs_CZ.utf8
Dutch
nl_NL.utf8
English - USA
en_US.utf8
French
fr_FR.utf8
German
de_DE.utf8
Hungarian
hu_HU.utf8
Italian
it_IT.utf8
Japanese
ja_JP.utf8
Polish
pl_PL.utf8
Portuguese
pt_BR.utf8
Russian
ru_RU.utf8
Slovak
sk_SK.utf8
Spanish
es_ES.utf8
Turkish
tr_TR.utf8
Ukrainian
uk_UA.utf8
You can get a list of all installed locales on your system by executing:
locale -a
Debian users can add locales with "dpkg-reconfigure locales".
Upgrade LAM
Backup configuration files
Configuration files need only to be backed up for .tar.bz2 installations. DEB/RPM installations do not require
this step.
LAM stores all configuration files in the "config" folder. Please backup the following files and copy them after
the new version is installed.
config/*.conf
config/config.cfg
config/pdf/*.xml
config/profiles/*
LAM Pro only:
config/selfService/*.*
Uninstall current LAM (Pro) version
Installation
If you used the RPM installation packages then remove the ldap-account-manager and ldap-account-manager-lamdaemon packages by calling "rpm -e ldap-account-manager ldap-account-manager-lamdaemon".
Debian needs no removal of old packages.
For tar.bz2 please remove the folder where you installed LAM via configure or by copying the files.
Install new LAM (Pro) version
Please install the new LAM (Pro) release. Skip the part about setting up LAM configuration files.
Restore configuration files
RPM:
Please check if there are any files ending with ".rpmsave" in /var/lib/ldap-account-manager/config. In this case you
need to manually remove the .rpmsave extension by overwriting the package file. E.g. rename default.user.rpmsave
to default.user.
DEB:
Nothing needs to be restored.
tar.bz2:
Please restore your configuration files from the backup. Copy all files from the backup folder to the config folder
in your LAM Pro installation. Do not simply replace the folder because the new LAM (Pro) release might include
additional files in this folder. Overwrite any existing files with your backup files.
Final steps
Now open your webbrowser and point it to the LAM login page. All your settings should be migrated.
Please check also the version specific instructions. They might include additional actions.
Installation
Windows: sAMAccountName is no longer set by default. Enable it in server profile if needed. The possible domains for the user name can also be set in server profile.
Installation
Chapter 2. Configuration
After you installed LAM you can configure it to fit your needs. The complete configuration can be done inside
the application. There is no need to edit configuration files.
Please point you browser to the location where you installed LAM. E.g. for Debian/RPM this is http://yourServer/lam. If you installed LAM via the tar.bz2 then this may vary. You should see the following page:
If you see an error message then you might need to install an additional PHP extension. Please follow the instructions and reload the page afterwards.
Now you are ready to configure LAM. Click on the "LAM configuration" link to proceed.
Here you can change LAM's general settings, setup server profiles for your LDAP server(s) and configure the self
service (LAM Pro). You should start with the general settings and then setup a server profile.
General settings
After selecting "Edit general settings" you will need to enter the master configuration password. The default
password for new installations is "lam". Now you can edit the general settings.
Security settings
Here you can set a time period after which inactive sessions are automatically invalidated. The selected value
represents minutes of inactivity.
You may also set a list of IP addresses which are allowed to access LAM. The IPs can be specified as full IP (e.g.
123.123.123.123) or with the "*" wildcard (e.g. 123.123.123.*). Users which try to access LAM via an untrusted
IP only get blank pages. There is a separate field for LAM Pro self service.
Session encryption will encrypt sensitive data like passwords in your session files. This is only available when
PHP MCrypt [http://php.net/mcrypt] is active. This adds extra security but also costs performance. If you manage
a large directory you might want to disable this and take other actions to secure your LAM server.
Configuration
Password policy
This allows you to specify a central password policy for LAM. The policy is valid for all password fields inside
LAM admin (excluding tree view) and LAM self service. Configuration passwords do not need to follow this
policy.
You can set the minimum password length and also the complexity of the passwords.
Logging
LAM can log events (e.g. user logins). You can use system logging (syslog for Unix, event viewer for Windows)
or log to a separate file. Please note that LAM may log sensitive data (e.g. passwords) at log level "Debug".
Production systems should be set to "Warning" or "Error".
Configuration
The PHP error reporting is only for developers. By default LAM does not show PHP notice messages in the web
pages. You can select to use the php.ini setting here or printing all errors and notices.
Additional options
Email format
Some email servers are not standards compatible. If you receive mails that look broken you can change the line
endings for sent mails here. Default is to use "\r\n".
At the moment, this option is only available in LAM Pro as there is no mail sending in the free version. See here
for setting up your SMTP server.
Server profiles
The server profiles store information about your LDAP server (e.g. host name) and what kind of accounts (e.g.
users and groups) you would like to manage. There is no limit on the number of server profiles. See the typical
scenarios about how to structure your server profiles.
Here you can create, rename and delete server profiles. The passwords of your server profiles can also be reset.
You may also specify the default server profile. This is the server profile which is preselected at the login page.
It also specifies the language of the login and configuration pages.
10
Configuration
You can create a new server profile by simply entering its name and password. After you created a new profile
you can go back to the profile login and edit your new server profile.
All operations on the profile management page require that you authenticate yourself with the configuration master
password.
General settings
Here you can specify the LDAP server and some security settings.
The server address of your LDAP server can be a DNS name or an IP address. Use ldap:// for unencrypted
LDAP connections or TLS encrypted connections. LDAP+SSL (LDAPS) encrypted connections are specified
with ldaps://. The port value is optional. TLS cannot be combined with ldaps://.
LAM includes an LDAP browser which allows direct modification of LDAP entries. If you would like to use it
then enter the LDAP suffix at "Tree suffix".
The search limit is used to reduce the number of search results which are returned by your LDAP server.
The access level specifies if LAM should allow to modify LDAP entries. This feature is only available in LAM
Pro. LAM non-Pro releases use write access. See this page for details on the different access levels.
Advanced options
By default LAM will not follow LDAP referrals. This is ok for most installations. If you use LDAP referrals please
activate the referral option in advanced settings.
Paged results should be activated only if you encounter any problems regarding size limits on Active Directory.
LAM will then query LDAP to return results in chunks of 999 entries.
11
Configuration
LAM is translated to many different languages. Here you can select the default language for this server profile.
The language setting may be overriden at the LAM login page.
LAM can manage user home directories and quotas with an external script. You can specify the home directory
server and where the script is located. The default rights for new home directories can be set, too.
LAM Pro users can send out changed passwords to their users. Here you can specify the options for these mails.
If you select "Allow alternate address" then password mails can be sent to any address (e.g. a secondary address
if the user account is also bound to the mailbox).
LAM supports two methods for login. The first one is to specify a fixed list of LDAP DNs that are allowed to
login. Please enter one DN per line.
The second one is to let LAM search for the DN in your directory. E.g. if a user logs in with the user name
"joe" then LAM will do an LDAP search for this user name. When it finds a matching DN then it will use this
to authenticate the user. The wildcard "%USER%" will be replaced by "joe" in this example. This way you can
provide login by user name, email address or other LDAP attributes.
Additionally, you can enable HTTP authentication when using "LDAP search". This way the web server is responsible to authenticate your users. LAM will use the given user name + password for the LDAP login. You can
also configure this to setup advanced login restrictions (e.g. require group memberships for login). To setup HTTP
authentication in Apache please see this link [http://httpd.apache.org/docs/2.2/howto/auth.html] and an example
for LDAP authentication here.
Hint: LDAP search with group membership check can be done with either HTTP authentication
or LDAP overlays like "memberOf" [http://www.openldap.org/doc/admin24/overlays.html] or "Dynamic lists" [http://www.openldap.org/doc/admin24/overlays.html]. Dynamic lists allow to insert virtual attributes to your user entries. These can then be used for the LDAP filter (e.g. "(&(uid=%USER%)
(memberof=cn=admins,ou=groups,dc=company,dc=com))").
12
Configuration
You may also change the password of this server profile. Please just enter the new password in both password
fields.
Account types
LAM supports to manage various types of LDAP entries (e.g. users, groups, DHCP entries, ...). On this page you
can select which types of entries you want to manage with LAM.
The section at the top shows a list of possible types. You can activate them by simply clicking on the plus sign
next to it.
Each account type has the following options:
LDAP suffix: the LDAP suffix where entries of this type should be managed
List attributes: a list of attributes which are shown in the account lists
Additional LDAP filter: LAM will automatically detect the right LDAP entries for each account type. This
can be used to further limit the number of visible entries (e.g. if you want to manage only some specific groups).
You can use "@@LOGIN_DN@@" as wildcard (e.g. "(owner=@@LOGIN_DN@@)"). It will be replaced by
the DN of the user who is logged in.
Hidden: This is used to hide account types that should not be displayed but are required by other account types.
E.g. you can hide the Samba domains account type and still assign domains when you edit your users.
Read-only (LAM Pro only): This allows to set a single account type to read-only mode. Please note that this is
a restriction on functional level (e.g. group memberships can be changed on user page even if groups are readonly) and is no replacement for setting up proper ACLs on your LDAP server.
Custom label: Here you can set a custom label for the account types. Use this if the standard label does not
fit for you (e.g. enter "Servers" for hosts).
No new entries (LAM Pro only): Use this if you want to prevent that new accounts of this type are created by
your users. The GUI will hide buttons to create new entries and also disable file upload for this type.
Disallow delete (LAM Pro only): Use this if you want to prevent that accounts of this type are deleted by
your users.
13
Configuration
On the next page you can specify in detail what extensions should be enabled for each account type.
Modules
The modules specify the active extensions for each account type. E.g. here you can setup if your user entries should
be address book entries only or also support Unix or Samba.
Each account type needs a so called "base module". This is the basement for all LDAP entries of this type. Usually,
it provides the structural object class for the LDAP entries. There must be exactly one active base module for
each account type.
Furthermore, there may be any number of additional active account modules. E.g. you may select "Personal" as
base module and Unix + Samba as additional modules.
Module settings
Depending on the activated account modules there may be additional configuration options available. They can
be found on the "Module settings" tab. E.g. the Personal account module allows to hide several input fields and
the Unix module requires to specify ranges for UID numbers.
Typical scenarios
This is a list of typical scenarios how your LDAP environment may look like and how to structure the server
profiles for it.
14
Configuration
In this situation it is recommended to create one server profile for each admin group (e.g. department).
Setup the LDAP suffixes in the server profiles to point to the needed organisational units. E.g. use
ou=people,ou=department1,dc=company,dc=com or ou=department1,ou=people,dc=company,dc=com as LDAP
suffix for users. Do the same for groups, hosts, ... This way each admin group will only see its own users. You
may want to use LDAP search for the LAM login in this scenario. This will prevent that you need to update a
server profile if the number of admins changes.
Attention: LAM's feature to automatically find free UIDs/GIDs for new users/groups will not work in this case.
LAM uses the user/group suffix to search for already assigned UIDs/GIDs. As an alternative you can specify
different UID/GID ranges for each department. Then the UIDs/GIDs will stay unique for the whole directory.
15
Here you can create, delete and modify accounts. Use the action buttons at the left or double click on an entry
to edit it.
The suffix selection box allows you to list only the accounts which are located in a subtree of your LDAP directory.
You can change the number of shown entries per page with "Change settings". Depending on the account type
there may be additional settings. E.g. the user list can convert group numbers to group names.
When you select to edit an entry then LAM will show all its data on a tabbed view. There is one tab for each
functional part of the account. You can set default values by loading an account profile.
16
Managing entries in
your LDAP directory
17
Managing entries in
your LDAP directory
Users (Windows)
Groups (Windows)
Hosts (Windows)
Please note that must change the attributes that are shown in the account lists. Otherwise, the account tables will
show empty lines. See the documentation for the Windows user/group/host modules.
For Samba 4 with Zarafa use the following modules:
Users (Windows + Zarafa (+ Zarafa contact))
Groups (Windows + Zarafa)
Hosts (Windows + Zarafa)
Zarafa dynamic groups (Zarafa dynamic group)
Zarafa address lists (Zarafa address list)
See also the Zarafa section for additional settings (e.g. using Zarafa AD schema).
Asterisk:
Account types:
Users (Personal + Asterisk)
Asterisk extensions (Asterisk extension)
Zarafa:
Account types:
Users (Personal + Unix + Zarafa (+ Zarafa contact))
Groups (Unix + Zarafa)
Zarafa dynamic groups (Zarafa dynamic group)
Zarafa address lists (Zarafa address list)
Hosts (Device + Zarafa + IP Address)
PyKota:
Account types:
Users (Personal + Unix + PyKota)
Groups (Unix + PyKota)
Printers (PyKota)
Billing codes (PyKota)
Users
LAM manages various types of user accounts. This includes address book entries, Unix, Samba, Zarafa and much
more.
18
Managing entries in
your LDAP directory
Translate GID number to group name: By default the user list can show the primary group IDs (GIDs) of your
users. There are often cases where it is more suitable to show the group name instead. This can be done by activating
this option. Please note that LAM will execute more LDAP queries which may result in decreased performance.
Show account status: If you activate this option then there will be an additional column displayed that shows if
the account is locked. You can see more details when moving the mouse cursor over the lock icon. This function
supports Unix, Samba and PPolicy.
Password:
Click the "Set password" button to change the user's password(s). Depending on the active account modules LAM
will offer to change multiple passwords at the same time.
If a module supports to enforce a password change then you will see the appropriate checkbox. LAM Pro also
offers to send the password via email after the account is saved. Email options are specified in your LAM server
profile [12].
19
Managing entries in
your LDAP directory
You will see the current status of all account parts in the title area of the account.
If you click on the lock icon then a dialog will be opened to change these values. Depending on which parts are
locked LAM will provide options to lock/unlock account parts.
Personal
This module is the most common basis for user accounts in LAM. You can use it stand-alone to manage address
book entries or in combination with Unix, Samba or other modules.
The Personal module provides support for managing various personal data of your users including mail addresses
and telephone numbers. You can also add photos of your users (please install PHP Imagick/ImageMagick [http://
www.php.net/manual/en/book.imagick.php] for full file format support). If you do not need to manage all attributes
then you can deactivate them in your server profile.
Configuration
Please activate the module "Personal (inetOrgPerson)" for users.
The module manages lots of fields. Probably, you will not need all of them. You can hide fields in module settings.
In advanced options you may also set fields to read-only (for existing accounts) and define limits for photo files.
20
Managing entries in
your LDAP directory
User management
User certificates can be uploaded and downloaded. LAM will automatically convert PEM to DER format.
21
Managing entries in
your LDAP directory
businessCategory
Business category
carLicense
Car license
cn/commonName
Common name
departmentNumber
Department(s)
description
Description
employeeNumber
Employee number
employeeType
Employee type
facsimileTelephoneNumber/fax
Fax number
givenName/gn
First name
homePhone
initials
Initials
jpegPhoto
Photo
Location
mail/rfc822Mailbox
Email address
manager
Manager
mobile/mobileTelephoneNumber
Mobile number
organizationName/o
Organisation
pager
Pager number
physicalDeliveryOfficeName
Office name
postalAddress
Postal address
postalCode
Postal code
postOfficeBox
registeredAddress
Registered address
roomNumber
Room number
sn/surname
Last name
st
State
street/streetAddress
Street
telephoneNumber
Telephone number
title
Job title
userCertificate
User certificates
uid/userid
User name
userPassword
Password
Unix
The Unix module manages Unix user accounts including group memberships.
There are several configuration options for this module:
UID generator: LAM will suggest UID numbers for your accounts. Please note that it may happen that there
are duplicate IDs assigned if users create accounts at the same time. Use an overlay [http://www.openldap.org/
doc/admin24/overlays.html] like "Attribute Uniqueness" (example) if you have lots of LAM admins creating
accounts.
22
Managing entries in
your LDAP directory
Fixed range: LAM searches for free numbers within the given limits. LAM always tries to use a free UID
that is greater than the existing UIDs to prevent collisions with deleted accounts.
Samba ID pool: This uses a special LDAP entry that includes attributes that store a counter for the last used
UID/GID. Please note that this requires that you install the Samba schema and create an LDAP entry of object
class "sambaUnixIdPool".
Password hash type: If possible use CRYPT-SHA512 or SSHA to protect your user's passwords.
Login shells: List of valid login shells that can be selected when editing an account.
Hidden options: Some input fields can be hidden to simplify the GUI if you do not need them.
The user name is automatically filled as specified in the configuration (default smiller for Steve Miller). Of course,
the suggested value can be changed any time. Common name is also filled with first/last name by default.
Group memberships can be changed when clicking on "Edit groups". Here you can select the Unix groups and
group of names memberships.
To enable "Group of names" please either add the groups module "groupOfNames"/"groupOfUniqueNames" or
add the account type "Group of names".
23
Managing entries in
your LDAP directory
You can also create home directories for your users if you setup lamdaemon. This allows you to create the directories on the local or remote servers.
It is also possible to check the status of the user's home directories. If needed the directories can be created or
removed at any time.
The module automatically detects if groups are based on "groupOfNames" or "groupOfUniqueNames" and sets
the correct attribute.
24
Managing entries in
your LDAP directory
Now, there will be a new tab "Roles" when you edit your user accounts. Here you can select the role memberships.
Shadow
LAM supports the management of the LDAP substitution of /etc/shadow. Here you can setup password policies
for your Unix accounts and also view the last password change of a user.
25
Managing entries in
your LDAP directory
Now select the tab "Module settings" and specify the list of possible security questions. Only these questions will
be selectable when you later edit accounts.
Edit users
After everything is setup please login to LAM Pro and edit your users. You will see a new tab called "Password
self reset". Here you can activate/remove the password self reset function for each user. You can also change the
security question and answer.
If you set a backup email address then confirmation emails will also be sent to this address. This is useful if the
user password grants access to the user's primary mailbox. So passwords can be unlocked with an external email
address.
Hint: You can add the passwordSelfReset object class to all your users with the multi edit tool.
Samba 4 note: Due to a bug [https://bugzilla.samba.org/show_bug.cgi?id=10094] in Samba 4 you need to add
the extension, save, and then select a question and set the answer. If you add the extension, set question/answer
and then save all together this will cause an LDAP error and no changes will be saved.
Hosts
You can specify a list of valid host names where the user may login. If you add the value "*" then the user may
login to any host. This can be further restricted by adding explicit deny entries which are prefixed with "!" (e.g.
"!hr_server").
Please note that your PAM settings need to support host restrictions. This feature is enabled by setting
pam_check_host_attr yes in your /etc/pam_ldap.conf. When it is enabled then the account facility of pam_ldap
will perform the checks and return an error when no proper host attribute is present. Please note that users without
host attribute cannot login to such a configured server.
26
Managing entries in
your LDAP directory
Samba 3
LAM supports full Samba 3 user management including logon hours and terminal server options.
27
Managing entries in
your LDAP directory
Windows (Samba 4)
Please activate the account type "Users" in your LAM server profile and then add the user module "Windows
(windowsUser)(*)".
The default list attributes are for Unix and not suitable for Windows (blank lines in account table). Please use
"#cn;#givenName;#sn;#mail" or select your own attributes to display in the account list.
On tab "Module settings" you can specify the possible Windows domain names and if pre-Windows 2000 user
names should be managed.
NIS support is deactivated by default. Enable it if needed.
Now you can manage your Windows users and e.g. assign groups. You might want to set the default domain name
in the profile editor.
Attention: Password changes require a secure connection via ldaps://. Check your LAM server profile if password
changes are refused by the server.
28
Managing entries in
your LDAP directory
29
Managing entries in
your LDAP directory
Kolab
This module supports to manage Kolab accounts with LAM. E.g. you can set the user's mail quota and define
invitation policies.
Please add the Kolab user module in your LAM server profile to activate Kolab support.
Attention: LAM will add the object class "mailrecipient" by default. This object class is available on 389 directory
server but may not be present on e.g. OpenLDAP. Please deactivate the following setting (LAM server profile,
module settings) if you do not use this object class.
Please enter an email address at the Personal page and set a Unix password first. Both are required that Kolab
accepts the accounts. The email address ("Personal" page) must match your Kolab domain, otherwise the account
will not work.
Attention: The mailbox server cannot be changed after the account has been saved. Please make sure that the
value is correct.
Kolab users should not be directly deleted with LAM. You can mark an account for deletion which then is done
by the Kolab server itself. This makes sure that the mailbox etc. is also deleted.
If you upgrade existing non-Kolab accounts please make sure that the account has an Unix password.
Asterisk
LAM supports Asterisk accounts, too. See the Asterisk section for details.
30
Managing entries in
your LDAP directory
EDU person
EDU person accounts are mainly used in university networks. You can specify the principal name, nick names
and much more.
PyKota
There are two LAM user modules depending if your user entries should be built on object class "pykotaObject"
or a different structural object class (e.g. "inetOrgPerson"). For "pykotaObject" please select "PyKota (pykotaUserStructural(*))" and "PyKota (pykotaUser)" in all other cases.
To display the job history please setup the job DN on tab "Module settings":
Now you can add the PyKota extension to your user accounts. Here you can setup the printing options and add
payments for this user.
For LAM Pro there are also self service fields to allow users e.g. to view their current balance and job history.
31
Managing entries in
your LDAP directory
You can assign any password policy which is found in the LDAP suffix of the "Password policies" type. When
you set the policy to "default" then OpenLDAP will use the default policy as defined in your slapd.conf file.
Attention: Locking and unlocking requires that you also activate the option "Lockout users" in the assigned
password policy. Otherwise, it will have no effect.
FreeRadius
FreeRadius is a software that implements the RADIUS authentication protocol. LAM allows you to mange several
of the FreeRadius attributes.
To activate the FreeRadius plugin please activate the FreeRadius user module in your server profile:
You can disable unneeded fields on the tab "Module settings". Here you can also set the DN where your Radius
profile templates are stored if you use the option "Profile".
32
Managing entries in
your LDAP directory
Now you will see the tab "FreeRadius" when editing users. The extension can be (de)activated for each user. You
can setup e.g. realm, IP and expiration date.
User management
You can specify the principal/user name, ticket lifetimes and expiration dates. Additionally, you can set various
account options.
33
Managing entries in
your LDAP directory
User management
You can specify the principal/user name, ticket lifetimes and expiration dates. Additionally, you can set various
account options.
Mail aliases
This module allows to add/remove the user in mail alias entries.
Note: You need to activate the mail alias type for this module.
To activate mail aliases for users please select the module "Mail aliases (nisMailAliasUser)":
34
Managing entries in
your LDAP directory
On tab Module settings you can select if you want to set the user name or email as recipient in alias entries.
Now you will see the mail aliases tab when editing an user.
The red cross will only remove the user from the alias entry. If you click the trash can button then the whole alias
entry (which may contain other users) will be deleted.
You can add the user to existing alias entries or create completly new ones.
35
Managing entries in
your LDAP directory
Please note that the main mail address is managed on tab "Personal" if this module is active. Otherwise, it will
be on the qmail tab.
You can hide several qmail options if you do not want to manage them with LAM. This can be done on the module
settings tab of your LAM server profile.
Mail routing
LAM supports to manage mail routing for user accounts. You can specify a routing address, the mail server and
a number of local addresses to route. This feature can be activated by adding the "Mail routing" module to the
user account type in your server profile.
SSH keys
You can manage your public keys for SSH in LAM if you installed the LPK patch for SSH [http://code.google.com/
p/openssh-lpk/]. Activate the "SSH public key" module for users in the server profile and you can add keys to
your user entries.
Authorized services
You can setup PAM to check if a user is allowed to run a specific service (e.g. sshd) by reading the LDAP attribute
"authorizedService". This way you can manage all allowed services via LAM.
36
Managing entries in
your LDAP directory
To activate this PAM feature please setup your /etc/libnss-ldap.conf and set "pam_check_service_attr" to "yes".
Inside LAM you can now set the allowed services. You may also setup default services in your account profiles.
You can define a list of services in your LAM server profile that is used for autocompletion.
The autocompletion will show all values that contains the entered text. To display the whole list you can press
backspace in the empty input field. Of course, you can also insert a service name that is not in the list.
IMAP mailboxes
LAM may create and delete mailboxes on an IMAP server for your user accounts. You will need an IMAP server
that supports either SSL or TLS for this feature.
To activate the mailbox management module please add the "Mailbox (imapAccess)" module for the type user
in your LAM server profile:
Now configure the module on the tab "Module settings". Here you can specify the IMAP server name, encryption
options, the authentication for the IMAP connection and the valid mail domains. LAM can use either your LAM
login password for the IMAP connection or display a dialog where you need to enter the password. It is also
possible to store the admin password in your server profile. This is not recommended for security reasons.
The user name can either be a fixed name (e.g. "admin") or it can be generated with LDAP attributes of the LAM admn user. E.g. $uid$ will be transformed to "myUser" if you login with
"uid=myUser,ou=people,dc=example,dc=com".
The mail domains specify for which accounts mailboxes may be created/deleted. E.g. if you enter "lam-demo.org"
then mailboxes can be managed for "user@lam-demo.org" but not for "user@example.com". Use "*" for any
domain.
37
Managing entries in
your LDAP directory
You need to install the SSL certificate of the CA that signed your server certificate. This is usually done by
installing the certificate in /etc/ssl/certs. Different Linux distributions may offer different ways to do this. For
Debian please copy the certificate in "/usr/local/share/ca-certificates" and run "update-ca-certificates" as root.
It is not recommended to disable the validation of IMAP server certificates.
The prefix, user name attribute and path separator specifies how your mailboxes are named (e.g.
"user.myUser@localhost" or "user/myUser"). Select the values depending on your IMAP server settings.
When you edit an user account then you will now see the tab "Mailbox". Here you can create/delete the mailbox
for this user.
Account
This is a very simple module to manage accounts based on the object class "account". Usually, this is used for host
accounts only. Please pay attention that users based on the "account" object class cannot have contact information
(e.g. telephone number) as with "inetOrgPerson".
You can enter a user/host name and a description for your accounts.
Groups
Unix
This module is used to manage Unix group entries. This is the default module to manage Unix groups and uses
the nis.schema. Suse users who use the rfc2307bis.schema need to use LAM Pro.
Configuration
Please add the account type "Groups" and then select account module "Unix (posixGroup)".
38
Managing entries in
your LDAP directory
GID generator: LAM will suggest GID numbers for your accounts. Please note that it may happen that there are
duplicate IDs assigned if users create groups at the same time. Use an overlay [http://www.openldap.org/doc/
admin24/overlays.html] like "Attribute Uniqueness" (example) if you have lots of LAM admins creating groups.
Fixed range: LAM searches for free numbers within the given limits. LAM always tries to use a free GID that
is greater than the existing GIDs to prevent collisions with deleted groups.
Samba ID pool: This uses a special LDAP entry that includes attributes that store a counter for the last used
UID/GID. Please note that this requires that you install the Samba schema and create an LDAP entry of object
class "sambaUnixIdPool".
Disable membership management: Disables group membership management. This is useful if memberships are
e.g. managed via group of names.
Group management:
39
Managing entries in
your LDAP directory
Samba 3
LAM supports managing Samba 3 groups. You can set special group types and also create Windows predefined
groups like "Domain admins".
Windows (Samba 4)
LAM can manage your Windows groups. Please enable the account type "Groups" in your LAM server profile
and then add the group module "Windows (windowsGroup)(*)".
The default list attributes are for Unix and not suitable for Windows (blank lines in account table). Please use
"#cn;#member;#description" or select your own attributes to display in the account list.
40
Managing entries in
your LDAP directory
Now you can edit your groups inside LAM. You can manage the group name, description and its type. Of course,
you can also set the group members.
Group scopes:
Global: Use this for groups with frequent changes. Global groups are not replicated to other domains.
Universal: Groups with universal scope are used to consolidate groups that span domains. They are globally
replicated.
Domain local: Groups with domain local scope can be used to set permissions inside one domain. They are not
replicated to other domains.
Group type:
Security: Use this group type to control permissions.
Distribution: These groups are only used for email applications. They cannot be used to control permissions.
Kolab
Please activate the Kolab group module in your LAM server profile to activate Kolab support.
41
Managing entries in
your LDAP directory
You can specify the email address and also set allowed sender and recipient addresses.
Quota
You can manage file system quotas with LAM. This requires to setup lamdaemon. File system quotas are not
stored inside LAM but managed directly on the specified servers.
PyKota
There are two LAM group modules depending if your group entries should be built on object class "pykotaObject" or a different structural object class (e.g. "posixGroup"). For "pykotaObject" please select "PyKota (pykotaGroupStructural(*))" and "PyKota (pykotaGroup)" in all other cases.
42
Managing entries in
your LDAP directory
Hosts
Account
Please see the description here.
Samba 3
You can manage Samba 3 host entries by adding the Unix and Samba 3 account modules.
Windows (Samba 4)
LAM can manage your Windows servers and workstations. Please enable the account type "Hosts" in your LAM
server profile and then add the host module "Windows (windowsHost)(*)".
The default list attributes are for Unix and not suitable for Windows (blank lines in account table). Please use
"#cn;#description;#location" or select your own attributes to display in the account list.
43
Managing entries in
your LDAP directory
Now you will see you computer accounts inside LAM. You can set e.g. the server's description and location
information.
MAC addresses
Hosts can have an unlimited number of MAC addresses. To enable this feature just add the "MAC address" module
to the host account type.
Puppet
LAM supports to manage your Puppet [http://puppetlabs.com/] configuration. You can edit all attributes like environment, classes, variables and parent node.
Configuration
44
Managing entries in
your LDAP directory
To activate this feature please edit your LAM server profile and add the host module "Puppet (puppetClient)" on
tab "Modules". This will add the Puppet tab to your host pages.
On tab "Module settings" in your LAM server profile you may also setup some common environment names.
LAM will use them to provide autocompletion hints when editing the environment for a node.
Editing nodes
When you edit a host entry then you will see the tab "Puppet". Here you can add/remove the Puppet extension
and edit all attributes.
Samba 3 domains
Samba 3 stores information about its domain settings inside LDAP. This includes the domain name, its SID and
some policies. You can manage all these attributes with LAM.
Please activate the account type "Samba domains" in your LAM server profile. Please notice that Samba by default
uses the LDAP root for domain objects (e.g. dc=example,dc=com).
This will add a new tab to LAM where you can manage domain information.
45
Managing entries in
your LDAP directory
The domain name, SID and RID base can only be specified for new domains and are not changeable via LAM at
a later time. You may setup several password policies for your Samba domains and also some RID options that
influence the creation of SIDs for users/groups/hosts.
Then add the module "Group of names (groupOfNames)" or "Group of unique names (groupOfUniqueNames)".
On the module settings tab you set some options like the display format for members/owners and if fields like
description should not be displayed.
46
Managing entries in
your LDAP directory
Group management:
Group of (unique) names have four basic attributes:
Name: a unique name for the group
Description: optional description
Owner: the account which owns this group (optional)
Members: the members of the group (at least one is required)
You can add any accounts as members. This includes other groups which leads to nested groups.
47
Managing entries in
your LDAP directory
On the module settings tab you set some options like the display format for members and if description should
not be displayed.
Role management:
You can add any accounts as members. This includes other roles which leads to nested roles (needs to be supported
by LDAP client applications).
Asterisk
LAM includes large support for Asterisk. You can add Asterisk extensions (including voicemail) to your users
and also manage Asterisk extensions.
The Asterisk support for users can be added by selecting the Asterisk and Asterisk voicemail modules for users
in your LAM server profile. This will add the following tabs to your user accounts.
48
Managing entries in
your LDAP directory
The Asterisk module allows to edit a large amount of attributes. Therefore, you can hide unused fields. Please edit
you server profile (Module settings) to do so.
If you also want to manage Asterisk extensions then simply add the account type "Asterisk extensions" and its
module to your server profile.
LAM groups your Asterisk extension entries by extension name and account context. If you edit an extension then
you will see the Asterisk entries as rules. LAM manages that all rule entries have the same owners and assigns
the priorities.
49
Managing entries in
your LDAP directory
Configuration
To enable Zarafa support in LAM Pro please activate the Zarafa modules for the Users, Groups and Hosts account
types in you server profile:
50
Managing entries in
your LDAP directory
Attention: LAM Pro uses the Zarafa OpenLDAP schema as default. This schema fits for OpenLDAP, OpenDJ,
Apache Directory server and other common LDAP servers. If you run Samba 4 or Active Directory then you need
to switch the schema to "Active Directory" on the module settings tab:
You can configure which parts of the Zarafa user options should be enabled. E.g. if you do not want to manage
quotas per user then you can hide these options on the tab "Module settings".
"Send as" attribute: Here you can specify how "Send as" privileges should be managed. LAM supports "uid"
and "dn".
If you select "uid" the LAM will store user names in the zarafaSendAsPrivilege attribute. This way you are restricted to specify user accounts as "Send as" allowed.
You can also set this option to "dn" and LAM will store DNs in the zarafaSendAsPrivilege attribute. In this case
you may specify users and groups as "Send as" allowed.
51
Managing entries in
your LDAP directory
Attention: If the Active Directory schema is used then LAM will always use dn and ignore this setting.
Features: Zarafa 7 allows to enable IMAP/POP3 for each user. Please hide the option "Features" if you use Zarafa
6.x.
Users
This is an example of the user edit page with all possible settings. This includes email settings, quotas and some
options (e.g. hide from address book). You can also set the resource type and capacity for meeting rooms and
equipment. The Zarafa extension can be added and removed at any time for every user.
Please note that the option "Features" requires Zarafa 7. Please hide this option in the LAM server profile if you
run Zarafa 6.x.
Contacts
LAM Pro can manage your Zarafa contact entries. You can set the email aliases and "send as" privileges. Additionally, accounts may be hidden in the address book or disabled.
Please note that you can either use the Zarafa user module or Zarafa contact. LAM Pro will disable the other tab
when enabling one of them.
52
Managing entries in
your LDAP directory
Groups
This is the edit page for groups. You can enter an email address and additional aliases for your groups. It is also
possible to specify options (e.g. hide from address book). The extension can be added/removed dynamically.
Please note that the option "Send-as privileges" requires the Zarafa 7.0.3 schema. Please hide this option in the
LAM server profile if you run Zarafa < 7.0.3.
Servers
The Zarafa extension for host accounts allows to set the connection ports and file path. You can add/remove the
extension at any time.
Setting the public store option is only possible for new host entries.
Please note that the proxy URL option requires the Zarafa 7.1 schema. Please hide this option in your LAM server
profile if you use an older version.
Address lists
Zarafa allows to store address lists in LDAP. You need to define a search base and LDAP filter for each address
list. E.g. entering "ou=people,dc=company,dc=com" as base and "uid=*" will select all users that are stored in
"ou=people,dc=company,dc=com".
You can also hide your lists from the address book or temporarily disable them.
53
Managing entries in
your LDAP directory
Dynamic groups
Zarafa allows to define dynamic groups in LDAP. You need to define a search base and LDAP filter for each
group. E.g. entering "ou=people,dc=company,dc=com" as base and "uid=*" will select all users that are stored in
"ou=people,dc=company,dc=com".
Dynamic groups may have an email address and multiple email alias addresses.
You can also hide your dynamic groups from the address book or temporarily disable them.
54
Managing entries in
your LDAP directory
DHCP
You can mange your DHCP server with LAM. It supports to manage subnets, fixed IP entries, IP ranges and DDNS.
Configuration
The DHCP management can be activated by adding the account type DHCP to your server profile. Please also
add the DHCP modules.
LAM requires that you use an LDAP entry with the object class "dhcpService" or "dhcpServer" as suffix for this
account type. If the "dhcpServer" entry points to a "dhcpService" entry via "dhcpServiceDN" then you need to
use the DN of the "dhcpService" entry as LDAP suffix for DHCP.
Set suffix:
Add modules:
55
Managing entries in
your LDAP directory
objectclass: dhcpServer
objectclass: dhcpOptions
objectclass: top
cn: server
dhcpcomments: My DHCP server
dhcpoption: domain-name "ldap-account-manager.org"
dhcpoption: domain-name-servers 192.168.1.1
dhcpoption: routers 192.168.1.1
dhcpoption: netbios-name-servers 192.168.1.1
dhcpoption: subnet-mask 255.255.255.0
dhcpoption: netbios-node-type 8
dhcpstatements: default-lease-time 3600
dhcpstatements: max-lease-time 7200
dhcpstatements: include "mykey"
dhcpstatements: ddns-update-style interim
dhcpstatements: update-static-leases true
dhcpstatements: ignore client-updates
slapd.conf changes:
include /etc/ldap/schema/dhcp.schema
index dhcpHWAddress eq
56
Managing entries in
your LDAP directory
index dhcpClassData eq
57
Managing entries in
your LDAP directory
If you activated DDNS in the server entry then you may also specify the DDNS settings for this subnet.
Please set the LDAP suffix either to an existing DNS zone (dlzZone) or an organizational unit that should include
your DNS zones.
Zone management
If you do not yet have a DNS zone then LAM can create one for you. In list view switch the suffix to an organizational unit DN. Now you will see a button "New zone".
58
Managing entries in
your LDAP directory
This will create the zone container entry and a default DNS entry "@" for authoritative information. Now switch
the suffix to your new zone and start adding DNS entries.
DNS entries
LAM supports the following DNS record types:
SOA: authoritative information
NS: name servers
A/AAAA: IP addresses
PTR: reverse DNS entries
CNAME: alias names
MX: mail servers
TXT: text records
SRV: service entries
IP addresses (A/AAAA)
LAM will automatically set the correct type (A/AAAA) depending if you enter an IPv4 or IPv6 address.
59
Managing entries in
your LDAP directory
60
Managing entries in
your LDAP directory
Services (SRV)
Service records can be used to specify which servers provide common services such as LDAP. Please note that
the host name must be _SERVICE._PROTOCOL (e.g. _ldap._tcp).
Priority: The priority of the target host, lower value means more preferred.
Weight: A relative weight for records with the same priority. E.g. weights 20 and 80 for a service will result in
20% queries to the one server and 80% to the other.
Port: The port number that is used for your service.
Server: DNS name where service can be reached (with dot at the end).
File upload
You can upload complete DNS zones via LAM's file upload. Here is an example for a zone file and the corresponding CSV file.
IN
SOA
ns1.example.com
admin.ns1.example.com (1
360000 3600 3600000
370000)
IN
NS
ns1.example.com.
IN
NS
ns2.example.com.
IN
MX
10 mail1.example.com
IN
MX
20 mail2.example.com
foo
IN
123.123.123.100
foo2
IN
CNAME
foo.example.com
bar
IN
123.123.123.101
IN
AAAA
1:2:3:4:5
Please check that you have an existing zone entry that can be used for the file upload. See above to create a new
zone.
61
Managing entries in
your LDAP directory
Hint: If you use the function above to create a new zone then please skip the "@" entry in the CSV file below.
LAM creates this entry with sample data.
In this example we assume that the following zone extry exists:
dn: dlzZoneName=example.com,ou=bind,dc=example,dc=com
dlzzonename: example.com
objectclass: dlzZone
objectclass: top
Mail aliases
You can manage mail aliases (e.g. for NIS) inside LAM. This can be used to replace local /etc/aliases files with
LDAP.
Note: Use the mail alias user module to manage mail aliases on user pages.
All accounts of this type are based on the "nisMailAlias" object class and may have "cn" and "rfc822MailMember"
attributes. To activate this type please add "Mail aliases" in your LAM server profile:
You need to select the Mail aliases module on the next tab.
62
Managing entries in
your LDAP directory
The mail aliases will then appear as separate tab inside LAM. You may then manage the aliases with their names
and recipient addresses.
There are mail/user icons that allow to select a mail address/user name from the existing users.
63
Managing entries in
your LDAP directory
Then add the correct automount module. Usually, this is "Automount entry (automount)". If you use Suse Linux
with RFC2307bis schema please select "Automount entry (rfc2307bisAutomount)".
This will add a new tab to LAM Pro's main screen which includes a list of all automount entries. Here you can
easily create new entries.
Please see the following external HowTos for more information on automounting and LDAP:
AutofsLDAP [https://help.ubuntu.com/community/AutofsLDAP]
Automount ber LDAP (German) [http://www.pro-linux.de/artikel/2/760/automount-ueber-ldap.html]
LAM setup:
Edit your LAM server profile and add the Oracle account type:
64
Managing entries in
your LDAP directory
In case you manage a single Oracle context just enter the cn=OracleContext entry as LDAP suffix. If you manage
multiple Oracle context entries then set the LDAP suffix to a parent entry of them.
Now you can login to LAM and start to add database entries.
65
Managing entries in
your LDAP directory
You will need to add the ppolicy schema to your OpenLDAP configuration and activate the ppolicy [http://
linux.die.net/man/5/slapo-ppolicy] overlay module in slapd.conf to use this feature.
PyKota printers
Please add the account type "Printers (PyKota printers)" on tab "Account types" in your server profile and setup
the LDAP suffix where printers are stored.
Next you can start managing printers inside LAM. Here you can setup the costs for a print job. LAM will also
show if the printer is member of any printer groups.
You can also setup printer groups. Just add some members to your new group.
66
Managing entries in
your LDAP directory
Then add the PyKota billing code module on tab "Account modules".
Now login to LAM and you will see the billing code tab where you can manage your entries. If jobs were printed
with a billing code then you will also see the balance and page count.
67
Managing entries in
your LDAP directory
Error message if validation fails
Limitations:
Custom fields cannot manage
structural object classes
attributes that require validation rules across multiple attributes or cannot be described by a simple regular
expression
Activating the custom fields module:
You may specify custom fields for all of your account types. Please enter tab "Modules" in your server profile.
Now activate the "Custom fields (customFields)" module for all needed account types.
Defining groups:
All input fields are devided into groups. A group may contain one or more object classes and allows you to add/
remove a certain set of input fields.
E.g. you may define two groups - "My application A" and "My application B" - that manage different LDAP
attributes and object classes. This way you will be able to control both attribute sets independently.
68
Managing entries in
your LDAP directory
To create a group please edit your server profile and switch to tab "Module settings". You will see the section
"Custom fields" which allows you to add new groups. Now select your account type (e.g. Users) and specify an
alias for your group. This alias will be printed as group header when you later edit an account in the admin interface.
After you created your new group you can setup the managed object classes. If you specify any object classes then
you will later be able to add/remove a complete set of attributes including their object classes.
Skipping the object classes field is only useful if you want to manage some attributes that are not yet supported
by LAM but there is already a LAM module that manages the object class.
Adding fields:
Now you can add a new field that manages an LDAP attribute. Simply fill the fields and press on "Add".
Please note that the field name cannot be changed later. It is the unique ID for this field.
69
Managing entries in
your LDAP directory
Text fields allow to specify a validation expression [71] and error message.
You can also enable auto-completion. In this case LAM will search all accounts for the given attribute and provide
auto-completion hints when the user edits this field. This should only be used if there is a limited number of
different values for this attribute.
Presentation:
Password field:
You can also manage custom password fields. LAM Pro will display two fields where the user must enter the
same password. You can hash the password if needed.
Presentation:
Text area:
This adds a multi-line field. The options are similar to text fields. Additionally, you can set the size with the
number of columns and rows.
Please note that the validation expression [71] should be set to multi-line. This is done by adding "m" at the end.
Presentation:
Checkbox:
Sometimes you may want to allow only yes/no values for your LDAP attributes. This can be represented by a
checkbox. You can specify the values for checked and unchecked. The default value is set if the LDAP attribute
has no value.
Presentation:
70
Managing entries in
your LDAP directory
Radio buttons:
This displays a list of radio buttons where the user can select one value.
You can specify a mapping of LDAP attribute values and their display (label) on the Self Service page. To add
more mapping fields please press "Add more mapping fields".
Presentation:
Select list:
Select lists allow the user to select a value in a large list of options. The definition of the possible values and their
display is similar to radio buttons.
You can also allow multiple values.
Presentation:
Validation expressions:
The validation expressions follow the standard of Perl regular expressions [http://perldoc.perl.org/perlre.html].
They start and end with a "/". The beginning of a line is specified by "^" and the end by "$".
Examples:
/^[a-z0-9]+$/ allows small letters and numbers. The value must not be empty ("+").
/^[a-z0-9]+$/i allows small and capital letters ("i" at the end means ignore case) and numbers. The value must
not be empty ("+").
Special characters that must be escaped with "\": "\", ".", "(", ")"
71
Managing entries in
your LDAP directory
E.g. /^[a-z0-9\.]$/i
File upload:
This is used for binary data. You can restrict uploaded data to a given file extension and set the maximum file size.
Presentation:
The uploaded data may also be downloaded via LAM.
Syntax:
Please enter one script per line. Each line has the following format: <account type> <action> <script>
E.g.: user preModify /usr/bin/myCustomScript -u $uid$
Account types:
You can setup scripts for all available account types (e.g. user, group, host, ...). Please see the help on the configuration page about your current active account types.
Actions:
Description
72
Managing entries in
your LDAP directory
preCreate
executed before creating a new account (cancels operation if a script returns an exit code > 0, not available for
file upload)
postCreate
preModify
executed before an account is modified (cancels operation if a script returns an exit code > 0)
postModify
preDelete
executed before an account is modified (cancels operation if a script returns an exit code > 0)
postDelete
manual
Script:
You can execute any script which is located on the filesystem of your webserver. The path may be absolute or
relative to the PATH-variable of the environment of your webserver process. It is also possible to add commandline
arguments to your scripts. Additionally, LAM will resolve wildcards to LDAP attributes. If your script includes
an wildcard in the format $ATTRIBUTE$ then LAM will replace it with the attribute value of the current LDAP
entry. The values of multi-value attributes are separated by commas. E.g. if you create an account with the attribute
"uid" and value "steve" then LAM will resolve "$uid$" to "steve".
Please note that manual scripts can only use the current LDAP attribute values of the account. Any modifications
done that are not saved will not be available. Manual scripts are also not available for new accounts that are not
yet saved to LDAP.
You can switch LAM's logging to debug mode if you are unsure which attributes with which values are available.
The following special wildcards are available for automatical scripts:
$INFO.userPasswordClearText$: cleartext password when Unix/Windows password is changed (e.g. useful
for external password synchronisation) for new/modified accounts
$INFO.userPasswordStatusChange$: provides additional information if the Unix password locking status
was changed, possible values: locked, unlocked, unchanged
$INFO.passwordSelfResetAnswerClearText$: cleartext answer to security question
$NEW.<attribute>$: the value of a new attribute (e.g. $NEW.telephoneNumber$) for modified accounts
$DEL.<attribute>$: the value of a deleted attribute (e.g. $DEL.telephoneNumber$) for modified accounts
$MOD.<attribute>$: the new value of a modified attribute (e.g. $MOD.telephoneNumber$) for modified accounts
$ORIG.<attribute>$: the original value of an attribute (e.g. $ORIG.telephoneNumber$) for modified accounts
Output may contain HTML: If your scripts generate HTML output then activate this option.
Hide command in messages: You may want to prevent that your users see the executed commands. In this case
activating this option will only show the command output but not the command itself.
You can see a preview of the commands which will be automatically executed on the "Custom scripts" tab. Here
you can also run the manual scripts.
73
Managing entries in
your LDAP directory
The sudo roles in LDAP work similar to those in /etc/sudoers. You can specify who may run which commands as
which user. It is also possible to specify options like NOPASSWD.
74
Managing entries in
your LDAP directory
General information
This module is available for all account types. It shows some internal information about the LDAP entries like
the creation time and who modified the entry.
If you use the "memberOf" overlay in OpenLDAP then this will also show group memberships done by the overlay.
75
Chapter 4. Tools
Profile editor
The account profiles are templates for your accounts. Here you can specify default values which can then be
loaded when you create accounts. You may also load a template for an existing account to reset it to default values.
When you create a new account then LAM will always load the profile named "default". This account profile
can include default values for all your accounts.
You can enter the LDAP suffix, RDN identifier and various other attributes depending on account type and activated modules.
Import/export:
Profiles can be exported to and imported from other server profiles.
76
Tools
There is a special export target called "*Global templates". All profiles exported here will be copied to all other
server profiles (incl. new ones). But existing profiles with the same name are not overwritten. So a profile in global
templates is treated as default profile for all server profiles.
Use this if you would like to setup default profiles that are valid for all server profiles.
File upload
When you need to create lots of accounts then you can use LAM's file upload to create them. LAM will read a
CSV formatted file and create the related LDAP entries. Please check the data in you CSV file carefully. LAM
will do less checks for the file upload than for single account creation.
At the first page please select the account type and what extensions should be activated.
The next page shows all available options for the file upload. You will also find a sample CSV file which can
be used as template for your CSV file. All red options are required columns in the file. You need to specify a
value for each account.
When you upload the CSV file then LAM first does some checks on this file. This includes syntax checks and if
all required data was entered. No changes in the LDAP directory are done at this time.
77
Tools
If the checks were successful then LAM will ask again if you want to create the accounts. You will also have the
chance to check the upload by viewing the changes in LDIF format.
Multi edit
This tool allows you to modify a large list of LDAP entries in batch mode. You can add new attributes/object
classes, remove attributes and set attributes to a specific value.
At the beginning, you need to specify where the entries are stored that should be changed. You can select an
account suffix, the tree suffix or enter your own DN by selecting "Other".
Next, enter an additional LDAP filter to limit the entries that should be changed. E.g. use
"(objectclass=inetOrgPerson)" to filter for users. You may also enter e.g. "(!(objectClass=passwordSelfReset))"
to match all accounts that do not yet have the password self reset feature.
Now, it is time to define the changes that should be done. The following operations are possible:
Add: Adds an attribute value if not yet existing. Please do not use for single-value attributes that already have
a value.
Modify: Sets an attribute to the given value. If the attribute does not yet exist then it is added. If the attribute
has multiple values then all other values are removed.
Delete: Deletes the specified value from this attribute. If you leave the value field blank then all attribute values
are removed.
Please note that all actions are run as separate LDAP commands. You cannot add an object class and a required
attribute at the same time.
78
Tools
Dry run
You should always start with a dry run. It will not do any changes to your LDAP directory but print out all modifications that will be done. You will also be able to download the changes in LDIF format to use with ldapmodify.
This is useful if you want to adjust some actions manually.
Apply changes
This will run the actions against your LDAP directory. You will see which accounts are edited in the progress
area and also if any errors occured.
OU editor
This is a simple editor to add/delete organisational units in your LDAP tree. This way you can structure the
accounts.
PDF editor
All accounts in LAM may be exported as PDF files. You can specify the page structure and displayed information
by editing the PDF profiles.
79
Tools
When you export accounts to PDF then each account will get its own page inside the PDF. There is a headline
on each page where you can show a page title. You may also add a logo to each page. To add more logos please
use the logo management on the PDF editor main page.
The main part is structured into sections of information. Each section has a title. This can either be static text or
the value of an attribute. You may also insert a static text block as section. Sections can be moved by using the
arrows next to the section title.
Each section can contain multiple fields which usually represent LDAP attributes. You can simply add new fields
by selecting the field name and its position. Then use the arrows to move the field inside the section.
Import/export:
PDF structures can be exported to and imported from other server profiles.
There is a special export target called "*Global templates". All PDF structures exported here will be copied to all
other server profiles (incl. new ones). But existing PDF structures with the same name are not overwritten. So a
PDF structure in global templates is treated as default structure for all server profiles.
80
Tools
Use this if you would like to setup default PDF structures that are valid for all server profiles.
Logo management:
You can upload image files to put a custom logo on the PDF files. The image file name must end with .png or .jpg
and the size must not exceed 2000x300px.
Schema browser
Here you browse the schema of your LDAP server. You can view what object classes, attributes, syntaxes and
matching rules are available. This is useful if you need to check if a certain object class is available.
Server information
This shows information and statistics about your LDAP server. This includes the suffixes, used overlays, connection data and operation statistics. You will need "cn=monitor" setup to see all details. Some data may not be
available depending on your LDAP server software.
Please see the following links how to setup "cn=monitor":
OpenLDAP [http://www.openldap.org/doc/admin24/monitoringslapd.html]
389 server [http://directory.fedoraproject.org/wiki/Howto:CN%3DMonitor_LDAP_Monitoring]
81
Tools
Tests
This allows you to check if your LDAP schema is compatible with LAM and to find possible problems.
Lamdaemon test
LAM provides an external script to manage home directories and quotas. You can test here if everything is setup
correctly.
If you get an error like "no tty present and no askpass program specified" then the path to the lamdaemon.pl may
be wrong. Please see the lamdaemon installation instructions for setup details.
Schema test
This will test if your LDAP schema supports all object classes and attributes of the active LAM modules. If you
get a message that something is missing please check that you installed all required schemas.
If you get error messages about object class violations then this test can tell you what is missing.
82
Tools
83
Access levels
There are three access levels:
Write access (default)
There are no restrictions. LAM admin users can manage account, create profiles and set passwords.
Change passwords
Similar to "Read only" except that the password reset page is available.
Read only
No write access to the LDAP database is allowed. It is also impossible to manage account and PDF profiles.
Accounts may be viewed but no changes can be saved.
The access level can be set on the server configuration page:
84
LAM will display contact information about the user like the user's name, email address and telephone number.
This will help your deskside support to easily contact your users.
Options:
Depending on the account there may be additional options available.
Sync Samba NT/LM password with Unix password: If a user account has Samba passwords set then LAM
will offer to synchronize the passwords.
Unlock Samba account: Locked Samba accounts can be unlocked with the password change.
85
Account (un)locking:
Depending if the account includes a Unix/Samba extension and PPolicy is activated the page will show options to
(un)lock the account. E.g. if the account is fully unlocked then there will be no unlocking options printed.
86
access to
attrs=mail,sn,givenName,telephoneNumber,mobile,facsimileTelephoneNumber,street,postalAddress,postOfficeBox,postalC
by self write
by * read
If you do not want them to change all attributes then reduce the list to fit your needs. Some modules may require
additional LDAP attributes. You can use the tree view to get the technical attribute names e.g. by selecting an
user account.
Usually, the slapd.conf file is located in /etc/ldap or /etc/openldap.
87
Now we need to create a new self service profile. Click on the link to manage the self service profiles.
Specify a name for the new profile and enter your master configuration password (default is "lam") to save the
profile.
Now go back to the profile login and enter your master configuration password to edit your new profile.
88
Activate TLS
LDAP suffix
Here you can specify if your users can login with user
name + password, email + password or other attributes.
Follow referrals
HTTP authentication
89
Login caption
Page header
Page layout
Here you can specify what input fields your users can see. It is also possible to group several input fields.
Please use the arrow signs to change the order of the fields/groups.
You may also set some fields as read-only for your users. This can be done by clicking on the lock symbol. Readonly fields can be used to show your users additional data on the self service page that must not be changed by
themselves (e.g. first/last name).
Sometimes, you may want to set a custom label for an input field. Click on the edit icon to set your own label text
(Personal: Department is relabeled as "Business unit" here).
Option
Description
Sync Asterisk password with Unix This is a hidden field. It will update
password
the Asterisk password each time the
Unix password is changed.
90
Kerberos
Sync Kerberos password with Unix This is a hidden field. It will update
password
the Kerberos password each time the
Unix password is changed.
Delegates
Invitation policy
read-only
Question
Answer
Security answer
Backup email
Kolab
Password policy
Password self reset
Business category
Personal
Car license
Department
Description
Email address
Fax number
First name
Home telephone number
Initials
Job title
Last name
Location
Mobile number
Office name
Organisational unit
Photo
Postal address
Postal code
Post office box
Registered address
Room number
State
Street
Telephone number
User certificates
User name
Web site
Password
Samba 3
91
Password
Shadow
Windows
Location
Office name
Postal code
Post office box
State
Street
Telephone number
Web site
Common name
Unix
Zarafa
PyKota
Login shell
Password
Email aliases
Email aliases
Balance (read-only)
Payment history
Job history
Module settings
This allows to configure some module specific options (e.g. custom scripts or password hash type).
92
You can now configure the minimum answer length for password reset answers. This is checked when you allow
you users to specify their answers via the self service. Additionally, you can specify the text of the password reset
link (default: "Forgot password?"). The link is displayed below the password field on the self service login page.
93
Next, please enter the DN and password of an LDAP entry that is allowed to reset the passwords. This entry needs
write access to the attributes shadowLastChange, pwdAccountLockedTime and userPassword. It also needs read
access to uid, mail, passwordSelfResetQuestion and passwordSelfResetAnswer. Please note that LAM Pro saves
the password on your server file system. Therefore, it is required to protect your server against unauthorised access.
Please also specify the list of password reset questions that the user can choose.
Please note that self service and LAM admin interface are separated functionalities. You need to specify the list
of possible security questions in both self service profile(s) and server profile(s).
You can inform your users via mail about their password change. The mail can include the new password by
using the special wildcard "@@newPassword@@". Additionally, you may want to insert other wildcards that are
replaced by the corresponding LDAP attributes. E.g. "@@uid@@" will be replaced by the user name. Please see
email format option [10] in case of broken mails. See here for setting up your SMTP server.
LAM Pro can send your users an email with a confirmation link to validate their email address. Of course, this
should only be used if the email account is independent from the user password (e.g. at external provider) or you use
the backup email address feature. The mail body must include the confirmation link by using the special wildcard
"@@resetLink@@". Additionally, you may want to insert other wildcards that are replaced by the corresponding
LDAP attributes. E.g. "@@uid@@" will be replaced by the user name.
There is also an option to skip the security question at all if email verification is enabled. In this case the password
can be reset directly after clicking on the confirmation link. Please handle with care since anybody with access
to the user's mail account can reset the password.
Troubleshooting:
If you get messages like "Unable to find user account." this can have multiple reasons:
security questions enabled but no security question and/or answer set for this user
user name + email combination does not exist
no connection to LDAP server
Turn on logging in LAM's main configuration settings. The exact reason is logged on notice level.
New fields for self service page
There are special fields that you may put on the self service page for your users. These fields allow them to change
the reset question and its answer. It is also possible to set a backup email address to reset passwords with an
external email address.
This is an example how can be presented to your users on the self service page:
94
When a user clicks on the link then he will be asked for identification with his user name and email address.
LAM Pro will use this information to find the correct LDAP entry of this user. It then displays the user's security
question and input fields for his new password. If the answer is correct then the new password will be set. Additionally, pwdAccountLockedTime will be removed and shadowLastChange updated to the current time if existing.
95
Options:
Link text: This is the label for the link to the self registration. If empty "Register new account" will be used.
Admin DN and password: Please enter the LDAP DN and its password that should be used to create new users.
This DN also needs to be able to do LDAP searches by uid in the self service part of your LDAP tree.
Object classes: This is a list of object classes that are used to build the new user accounts. Please enter one object
class in each line.
Attributes: This is a list of additional attributes that the user can enter. Please note that user name, password and
email address are mandatory anyway and need not be specified.
Each line represents one LDAP attribute. The settings are separated by "::". The first setting specifies the field
type. The second setting is the LDAP attribute name. Depending on the field type you can enter additional options:
Table 6.3.
Description
Type
Second option
Third option
e.g. "sn"
96
value,
wirld-
cards to insert
other
attribute
values
(e.g.
"@@uid@@")
For a syntax description of validation expressions see here [http://perldoc.perl.org/perlre.html]. Validation is optional, you can leave these options blank.
Example:
optional::givenName::First name::/^[[:alnum:] ]+$/u::Please enter a valid first name.
required::sn::Last name::/^[[:alnum:] ]+$/u::Please enter a valid last name.
constant::homeDirectory::/home/@@uid@@
If you use the object class "inetOrgPerson" and do not provide the "cn" attribute then LAM will set it to the user
name value.
Please note that only simple input boxes are supported for account registration. The user may log in to self service
when his account was created to manage all his attributes.
User view:
The user can register by clicking on a link on the self service login page:
Here he can insert the data that you specified in the self service profile:
LAM will then send him an email with a validation link that is valid for 24 hours. When he clicks on this link then
the account will be created in the self service user suffix. The DN will look like this: uid=<user name>,...
Please see email format option [10] in case of broken mails.
97
Label
LDAP attribute name
Unique name for field
Help text
Read-only display
Field type: text, password, text area, checkbox, radio buttons, select list, file upload
Validation via regular expression
Error message if validation fails
To create custom fields for the Self Service please edit your Self Service profile and switch to tab "Module settings". Here you can add a new field. Simply fill the fields and press on "Add".
Please note that the field name cannot be changed later. It is the unique ID for this field.
After you created your fields please press on "Sync fields with page layout". Now you can switch to tab "Page
layout" and add your new fields like any other standard field.
Password field:
You can also manage custom password fields. LAM Pro will display two fields where the user must enter the
same password. You can hash the password if needed.
98
Text area:
This adds a multi-line field. The options are similar to text fields. Additionally, you can set the size with the
number of columns and rows.
Please note that the validation expression [100] should be set to multi-line. This is done by adding "m" at the end.
Checkbox:
Sometimes you may want to allow only yes/no values for your LDAP attributes. This can be represented by a
checkbox. You can specify the values for checked and unchecked. The default value is set if the LDAP attribute
has no value.
Radio buttons:
This displays a list of radio buttons where the user can select one value.
You can specify a mapping of LDAP attribute values and their display (label) on the Self Service page. To add
more mapping fields please press "Add more mapping fields".
Select list:
Select lists allow the user to select a value in a large list of options. The definition of the possible values and their
display is similar to radio buttons.
99
Validation expressions:
The validation expressions follow the standard of Perl regular expressions [http://perldoc.perl.org/perlre.html].
They start and end with a "/". The beginning of a line is specified by "^" and the end by "$".
Examples:
/^[a-z0-9]+$/ allows small letters and numbers. The value must not be empty ("+").
/^[a-z0-9]+$/i allows small and capital letters ("i" at the end means ignore case) and numbers. The value must
not be empty ("+").
Special characters that must be escaped with "\": "\", ".", "(", ")"
E.g. /^[a-z0-9\.]$/i
File upload:
This is used for binary data. You can restrict uploaded data to a given file extension and set the maximum file size.
Presentation:
The uploaded data may also be downloaded via LAM.
100
Custom header
The default LAM Pro header includes a logo and a horizontal line. You can enter any HTML code here. It will
be included in the self services pages after the body tag.
CSS files
Usually, companies have regulations about their corporate design and use common CSS files. This assures a
common appearance of all intranet pages (e.g. colors and fonts). To include additional CSS files just use the
following setting for this task. The additional CSS links will be added after LAM Pro's default CSS link. This way
you can overwrite LAM Pro's style.
101
Unix accounts
posixAccount,
shadowAccount,
hostObject,
posixGroup
Source
nis.schema,
Part of OpenLrfc2307bis.schema,DAP installation,
ldapns.schema
part
of
lib(hostObject)
pam-ldap
(ldapns.schema)
Windows
(Samba 4)
Samba 4 built-in
Part of Asterisk
installation
PyKota
users, pykotaObject,
pykota.schema
groups, printers pykotaAccount,
and billing codes pykotaAccountBalance, pykotaGroup, pykotaPrinter, pykotaBilling
Mail routing
inetLocalMailRecipient
Hosts
hostObject,
vice
Authorized
vices
The
rfc2307bis.schema
is only supported
by LAM Pro. Use
the nis.schema if
you do not want
to upgrade to
LAM Pro.
inetorgperson.schema
Part of OpenLDAP installation
Notes
misc.schema
de- ldapns.schema
ser- authorizedServiceObject
Part
of
lib- The device obpam-ldap instal- ject class is only
lation
available in LAM
Pro.
ldapns.schema
Part
of
libpam-ldap installation
Mail aliases
nisMailAlias
misc.schema
Qmail user
qmailUser
qmail.schema
Part
of LAM Pro only
qmail_ldap
[http://
www.nrg4u.com/
]
102
Account type
Source
MAC addresses
ieee802device
nis.schema
IP addresses
ipHost
nis.schema
Puppet
puppetClient
puppet.schema
Puppet
on
GitHub [https://
github.com/
puppetlabs/puppet/blob/
master/ext/ldap/
puppet.schema]
EDU person
eduPerson
eduperson.schema http://
middleware.internet2.edu
[http://
middleware.internet2.edu/
eduperson/]
cosine.schema
opensshlpk.schema
Included in patch
from
http://
code.google.com/
p/openssh-lpk/
quota.schema
Linux DiskQuota
[http://
sourceforge.net/
projects/
linuxquota/]
Notes
Group
of groupOfNames, core.schema
(unique) names groupOfUniqueNames
Groups
organizationalRole
core.schema
DHCP
dhcpOptions,
dhcpSubnet,
dhcpServer
dhcp.schema
docs/schema/
dhcp.schema
Aliases
alias, uidObject
core.schema
NIS netgroups
nisNetgroup
nis.schema
NIS objects
nisObject
nis.schema
103
Account type
Automount
jects
autofs.schema,
Autofs LDAP
rfc2307bis.schema
Password
cies
poli- pwdPolicy,
vice
Source
de- ppolicy.schema,
core.schema
Heimdal
beros
hdb.schema
Ker- krb5KDCEntry
Notes
MIT Kerberos
krbPrincipal,
kerberos.schema Part of MIT Ker- LAM Pro only
krbPrincipalAux,
beros installation
krbTicketPolicyAux
Sudo roles
sudoRole
sudo.schema
Zarafa
zarafa-user,
zarafa-group,
zarafa-server
zarafa.schema
IMAP mailboxes -
104
Appendix B. Security
LAM configuration passwords
LAM supports a two level authorization system for its configuration. Therefore, there are two types of configuration passwords:
master configuration password: needed to change general settings, create/delete server profiles and self service profiles
server profile password: used to change the settings of a server profile (e.g. LDAP server and account types
to manage)
The master configuration password can be used to reset a server profile password. Each server profile has its own
profile password.
Both password types are stored as hash values in the configuration files for enhanced security.
Use of SSL
The data which is transfered between you and LAM is very sensitive. Please always use SSL encrypted connections
between LAM and your browser to protect yourself against network sniffers.
You may also need to specify the CA certificate in your Apache configuration by using the option "LDAPTrustedGlobalCert":
105
Security
Chrooted servers
If your server is chrooted and you have no access to /dev/random or /dev/urandom this can be a security risk.
LAM stores your LDAP password encrypted in the session. LAM uses rand() to generate the key if /dev/random
and /dev/urandom are not accessible. Therefore the key can be easily guessed. An attaker needs read access to the
session file (e.g. by another Apache instance) to exploit this.
Apache configuration
Sensitive directories
LAM includes several .htaccess files to protect your configuration files and temporary data. Apache is often configured to not use .htaccess files by default. Therefore, please check your Apache configuration and change the
override setting to:
AllowOverride All
If you are experienced in configuring Apache then you can also copy the security settings from the .htaccess files
to your main Apache configuration.
If possible, you should not rely on .htaccess files but also move the config and sess directory to a place outside of
your WWW root. You can put a symbolic link in the LAM directory so that LAM finds the configuration/session
files.
Security sensitive directories:
config: Contains your LAM configuration and account profiles
LAM configuration passwords (SSHA hashed)
default values for new accounts
directory must be accessibly by Apache but needs not to be accessible by the browser
sess: PHP session files
LAM admin password in clear text or MCrypt encrypted
cached LDAP entries in clear text or MCrypt encrypted
directory must be accessibly by Apache but needs not to be accessible by the browser
tmp: temporary files
106
Security
107
Security
This configuration allows your users to open https://lamproxy.company.com which will then proxy the self service
on the internal server.
<VirtualHost lamproxy.company.com:443>
ServerName lamproxy.company.com
ErrorLog /var/log/apache2/lam-proxy-error.log
CustomLog /var/log/apache2/lam-proxy-access.log combined
DocumentRoot /var/www/lam-proxy
<Proxy *>
Order deny,allow
Allow from all
</Proxy>
SSLProxyEngine on
SSLEngine on
SSLCertificateFile /etc/apache2/ssl/apache.pem
ProxyPreserveHost On
ProxyRequests off
loglevel info
/tmp https://lam.company.com/lam/tmp
/sess https://lam.company.com/lam/sess
/templates/lib https://lam.company.com/lam/templates/lib
/templates/selfService https://lam.company.com/lam/templates/se
/style https://lam.company.com/lam/style
/graphics https://lam.company.com/lam/graphics
108
Security
Nginx configuration
There is no fully automatic setup of Nginx but LAM provides a ready-to-use configuration file.
109
Unique attributes:
There are cases where you do not want that same attribute values exist multiple times in your database. A good
example are UID/GID numbers.
OpenLDAP provides the attribute uniqueness overlay [http://www.openldap.org/doc/admin24/overlays.html] for
this task.
Example to force unique UID numbers:
In /etc/ldap/slapd.d/cn=config/cn=module{0}.ldif add "olcModuleLoad: {3}unique" (replace "3" with the highest
existing number plus one).
Now in /etc/ldap/slapd.d/cn=config/olcDatabase={1}bdb.ldif add e.g. "olcUniqueURI: ldap:///?uidNumber?sub"
Indices:
Indices will improve the performance when searching for entries in the LDAP directory. The following indices
are recommended:
index objectClass eq
index default sub
index uidNumber eq
index gidNumber eq
index memberUid eq
index cn,sn,uid,displayName pres,sub,eq
# Samba 3.x
index sambaSID eq
index sambaPrimaryGroupSID eq
index sambaDomainName eq
110
111
Installation
First of all, you need to install lamdaemon.pl on your remote server where LAM should manage homedirs and/
or quota. This is usually a different server than the one where LAM is installed. But there is no problem if it is
the same.
Note that the builtin admin/manager entries do not work for lamdaemon. You need to login with a Unix account.
112
Setup sudo
The perl script has to run as root. Therefore we need a wrapper, sudo. Edit /etc/sudoers on host where homedirs
or quotas should be used and add the following line:
$admin All= NOPASSWD: $path_to_lamdaemon *
$admin is the admin user from LAM (must be a valid Unix account) and $path_to_lamdaemon is the path to
lamdaemon.pl.
Example:
myAdmin ALL= NOPASSWD: /srv/www/htdocs/lam/lib/lamdaemon.pl *
You might need to run the sudo command once manually to init sudo. The command "sudo -l" will show all
possible sudo commands of the current user.
Attention: Please do not use the options "Defaults requiretty" and "Defaults env_reset" in /etc/sudoers. Otherwise
you might get errors like "you must have a tty to run sudo" or "no tty present and no askpass program specified".
Setup Perl
We need an extra Perl module - Quota. To install it, run:
perl -MCPAN -e shell
install Quota
If your Perl executable is not located in /usr/bin/perl you will have to edit the path in the first line of lamdaemon.pl.
If you have problems compiling the Perl modules try installing a newer release of your GCC compiler and the
"make" application.
Several Linux distributions already include a quota package for Perl.
Set up SSH
Your SSH daemon must offer the password authentication method. To activate it just use this configuration option
in /etc/ssh/sshd_config:
PasswordAuthentication yes
Troubleshooting
If you have problems managing quotas and home directories then these points might help:
There is a test page for lamdaemon: Login to LAM and open Tools -> Tests -> Lamdaemon test
113
114
/etc/ldap/schema/passwordSelfReset.schema
Samba 4
The schema files are passwordSelfReset-Samba4-attributes.ldif and passwordSelfReset-Samba4-objectClass.ldif.
First, you need to edit them and replace "DOMAIN_TOP_DN" with your LDAP suffix (e.g. dc=samba4,dc=test).
Then install the attribute and afterwards the object class schema file:
115
Schema update
The schema files are located in:
tar.bz2: docs/schema/updates
DEB: /usr/share/doc/ldap-account-manager/docs/schema/updates
RPM: /usr/share/doc/ldap-account-manager-{VERSION}/schema/updates
Schema versions:
1. Initial version (LAM Pro 3.6)
2. Added passwordSelfResetBackupMail (LAM Pro 4.5)
Samba 4
Install the these update files by following the install instructions in the file:
samba4_version_1_to_2_attributes.ldif
samba4_version_1_to_2_objectClass.ldif
Please note that attributes file needs to be installed first.
Windows
Install the file "windows_version_1_to_2.ldif" by following the install instructions in the file.
116
117
DEB/RPM: /usr/share/ldap-account-manager/graphics
tar.bz2: graphics
Please note that if you replace images then you need to reapply your changes every time you upgrade LAM.
Special changes with custom JavaScript
In rare cases it might not be sufficient to write custom CSS or replace some image files. E.g. you might want to
add custom content to all pages.
For these cases you can add a custom JavaScript file that contains your code.
The JavaScript files are located in
DEB/RPM: /usr/share/ldap-account-manager/templates/lib
tar.bz2: templates/lib
LAM will automatically integrate all .js files in alphabetical order. E.g. you can create a file called
"900_myCompany.js" which will be added as last file.
Self service
See here for self service customisations.
118
119
Appendix I. Troubleshooting
Functional issues
Size limit
You will get a message like "LDAP sizelimit exceeded, not all entries are shown." when you hit the LDAP search
limit. See the OpenLDAP settings to fix this.
Schema test:
This can be done by running "Tools" -> "Tests" -> "Schema test" inside LAM.
If there are any object classes or attributes missing you will get a notice. See LDAP schema files for a list of used
schemas. You may also want to deactive unused modules in your LAM server profile (tab "Modules").
LDAP Logging:
If your schema is correct you can turn on LDAP logging to get more detailed error messages from your LDAP
server.
OpenLDAP logging:
slapd.conf: In /etc/ldap/slapd.conf turn logging on with the line "loglevel 256".
slapd.d: In /etc/ldap/slapd.d/cn=config.ldif please change the attribute "olcLogLevel" to "Stats". Please add a
line "olcLogLevel: Stats" if the attribute is missing.
After changing the configuration please restart OpenLDAP. It usually uses /var/log/syslog for log output.
PHP logging
120
Troubleshooting
Sometimes it can help to enable PHP logging inside LAM. You can do this in the logging area of LAM's main
configuration. Set the logging option to "all" and check if there are any messages printed in your browser window.
Please note that not every notice message is an error but it may help to find the problem.
Performance issues
LAM is tested to work with 10000 users with acceptable performance. If you have a larger directory or slow
hardware then here are some points to increase performance.
The first step is to check if performance problems are caused by the LAM web server or the LDAP server. Please
check which machine suffers from high system load (CPU/memory consumption).
High network latency may also be a problem. For large installations please make sure that LAM web server and
LDAP server are located in the same building/server room.
If you run LAM on multiple nodes (DNS load balancing/hardware load balancer) then also check the clustering
section.
LDAP server
Use indices
Depending on the queries it may help to add some more indices on the LDAP server. Depending on your LDAP
software it may already suggest indices in its log files. See here [110] for typical OpenLDAP indices.
Reduce query results by splitting LDAP management into multiple server profiles
If you manage a very large directory then it might already be separated into multiple subtrees (e.g. by country,
subsidiary, ...). Do not use a single LAM server profile to manage your whole directory. Use different server
profiles for each separated LDAP subtree where possible (e.g. one for German users and one for French ones).
121
Troubleshooting
This is a simply way to enhance performance since APC is part of most Linux distributions.
If you use APC then make sure that it uses enough memory (e.g. "apc.shm_size=128M"). You can check the
memory usage with the file apc.php that is shipped with APC.
122