<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Enable administrative access through LDAP in Network and Storage Protocols</title>
    <link>https://community.netapp.com/t5/Network-and-Storage-Protocols/Enable-administrative-access-through-LDAP/m-p/40209#M3717</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi, i know this is an old thread but did you happen to get this to work?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can ssh using 'DOMAIN\username'@netappfiler with just cifs setup and adding domain users to the local admin group.&amp;nbsp; Trying to get this to work with just username@netapp though.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Oddly, with just cifs setup, i can add the option "options ldap.ADdomain &amp;lt;domainname&amp;gt;" and successfully use "getXXbyYY getpwbyname_r username" WITHOUT adding ldap.name, ldap.servers or ldap.base.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 26 Nov 2012 21:25:19 GMT</pubDate>
    <dc:creator>mjschneider</dc:creator>
    <dc:date>2012-11-26T21:25:19Z</dc:date>
    <item>
      <title>Enable administrative access through LDAP</title>
      <link>https://community.netapp.com/t5/Network-and-Storage-Protocols/Enable-administrative-access-through-LDAP/m-p/40204#M3715</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey everyone,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm a little bit stuck trying to enable our LDAP users with administrative access to the filer.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I got LDAP queries working, and both the user and the group are available:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;netappfiler01*&amp;gt; getXXbyYY getpwbyname_r sjoerd&lt;BR /&gt;pw_name = sjoerd&lt;BR /&gt;pw_passwd = {{******}}&lt;BR /&gt;pw_uid = 10000, pw_gid = 10000&lt;BR /&gt;pw_gecos = Sjoerd Hooft&lt;BR /&gt;pw_dir = /home/nibshf&lt;BR /&gt;pw_shell = /bin/bash&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;netappfiler01*&amp;gt; getXXbyYY getgrlist sjoerd&lt;BR /&gt;pw_name = sjoerd&lt;BR /&gt;Groups: 10000 10001 10003&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;netappfiler01*&amp;gt; getXXbyYY getgrbyname INFRA&lt;BR /&gt;name = INFRA&lt;BR /&gt;gid = 10001&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've also setup the security options:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;netappfiler01*&amp;gt;&amp;nbsp; options security.admin.nsswitchgroup&lt;BR /&gt;security.admin.nsswitchgroup INFRA&lt;BR /&gt;netappfiler01*&amp;gt;&amp;nbsp; options security.admin.authentication&lt;BR /&gt;security.admin.authentication nsswitch,internal&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And changed the nsswitch.conf file:&lt;/P&gt;&lt;P&gt;/etc/nsswitch.conf&lt;BR /&gt;hosts: files&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; nis&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dns&lt;BR /&gt;passwd: ldap&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; nis&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; files&lt;BR /&gt;netgroup: ldap&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; nis&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; files&lt;BR /&gt;group: ldap&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; nis&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; files&lt;BR /&gt;shadow: files&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; nis&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But I'm not allowed to log on using that account. I tried changing the nsswitchgroup to the gid, and also to the primary gid but that didn't help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I tried on FilerView:&lt;/P&gt;&lt;P&gt;[netappfiler01: HTTPPool04:warning]: HTTP Authentication from 10.10.10.10 to realm Administration failed&lt;/P&gt;&lt;P&gt;I tried also on SSH:&lt;/P&gt;&lt;PRE&gt;netappfiler01: sshd_1:info]: Failed password for sjoerd from 10.10.10.10 port 64287ssh2&lt;BR /&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ONTAP version is 7.3.4.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can somebody help me? Thanx&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Jun 2025 06:55:01 GMT</pubDate>
      <guid>https://community.netapp.com/t5/Network-and-Storage-Protocols/Enable-administrative-access-through-LDAP/m-p/40204#M3715</guid>
      <dc:creator>SJOERDHOOFT</dc:creator>
      <dc:date>2025-06-05T06:55:01Z</dc:date>
    </item>
    <item>
      <title>Re: Enable administrative access through LDAP</title>
      <link>https://community.netapp.com/t5/Network-and-Storage-Protocols/Enable-administrative-access-through-LDAP/m-p/40209#M3717</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi, i know this is an old thread but did you happen to get this to work?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can ssh using 'DOMAIN\username'@netappfiler with just cifs setup and adding domain users to the local admin group.&amp;nbsp; Trying to get this to work with just username@netapp though.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Oddly, with just cifs setup, i can add the option "options ldap.ADdomain &amp;lt;domainname&amp;gt;" and successfully use "getXXbyYY getpwbyname_r username" WITHOUT adding ldap.name, ldap.servers or ldap.base.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 26 Nov 2012 21:25:19 GMT</pubDate>
      <guid>https://community.netapp.com/t5/Network-and-Storage-Protocols/Enable-administrative-access-through-LDAP/m-p/40209#M3717</guid>
      <dc:creator>mjschneider</dc:creator>
      <dc:date>2012-11-26T21:25:19Z</dc:date>
    </item>
    <item>
      <title>Re: Enable administrative access through LDAP</title>
      <link>https://community.netapp.com/t5/Network-and-Storage-Protocols/Enable-administrative-access-through-LDAP/m-p/40212#M3719</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I've been trying to get the same thing working, using a 7.3 filer and Identity Services for Unix on a 2K8R2 DC, and as far as I can see the problem is that the filer expects there to be a hashed password in the LDAP search result, and there isn't. Hence the "pw_passwd = {{******}}" in the getpwbyname_r result - the ****** doesn't seem to mean it's hidden, rather that it's missing. I've used Wireshark on the DC to verify the results.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Doesn't matter whether I map options ldap.nssmap.attribute.userPassword to userPassword, unixUserPassword or msSFU30Password, if the field isn't populated or present in the AD schema it will fail. TR-3458 doesn't seem to go that far, and the equivalent TR for authenticating against a Unix LDAP server assumes a password field will be populated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;All quite vexing.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 20 Feb 2013 10:48:10 GMT</pubDate>
      <guid>https://community.netapp.com/t5/Network-and-Storage-Protocols/Enable-administrative-access-through-LDAP/m-p/40212#M3719</guid>
      <dc:creator>pevansverio</dc:creator>
      <dc:date>2013-02-20T10:48:10Z</dc:date>
    </item>
    <item>
      <title>Re: Enable administrative access through LDAP</title>
      <link>https://community.netapp.com/t5/Network-and-Storage-Protocols/Enable-administrative-access-through-LDAP/m-p/40216#M3721</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This took a bit of poking and prodding, but I managed to get it working. Your webpage showed me that I was on the right track, so thanks for that.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It looks like you're not logging in with an account with enough privileges to get the hashed password back from the LDAP server. Before I added an account with root access, I'd get a result like you did above with the password concealed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;pw_passwd = {{******}}&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the packet trace I'd clearly see the filer requesting 7 fields, and the LDAP server only returning 6. After I added an account with privs, I'd see 7 out, 7 back, and could see my hashed password.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;filer9&amp;gt;&amp;nbsp; options ldap.name cn=root,dc=company,dc=co,dc=nz &lt;BR /&gt;filer9&amp;gt;&amp;nbsp; options ldap.passwd [password] &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;filer9*&amp;gt;&amp;nbsp; getXXbyYY getpwbyname_r gunn &lt;BR /&gt;pw_name = gunn &lt;BR /&gt;pw_passwd = saltsaltABCDEF&lt;BR /&gt;pw_uid = 1000, pw_gid = 1000 &lt;BR /&gt;pw_gecos = Paul gunn &lt;BR /&gt;pw_dir = /home/gunn &lt;BR /&gt;pw_shell = /bin/bash&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I already had the /etc/nsswitch.conf changes in place, and an LDAP server serving out a SYSADMIN group, so surely all I have to do is make the security changes. Or so I thought.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This works on an 8.0.4 and 7.3.6 filer. &lt;/P&gt;&lt;P&gt;filer9*&amp;gt; options security.admin.authentication internal,nsswitch &lt;BR /&gt;filer9*&amp;gt; options security.admin.nsswitchgroup SYSADMIN &lt;/P&gt;&lt;P&gt;If you have an 8.1+ filer, you can bind the roles for each group.Or it will default to giving admin access to any group you specify without a defined role like it does with the old versions.&lt;/P&gt;&lt;P&gt; filer9*&amp;gt; options security.admin.nsswitchgroup SYSADMIN:root&lt;/P&gt;&lt;P&gt; NB : If you try that syntax on an old version, it fails *silently*. Which chewed up a good block of time finding that out. Use the syntax without any roles defined first to test, then add the roles later.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 26 Jul 2013 05:57:36 GMT</pubDate>
      <guid>https://community.netapp.com/t5/Network-and-Storage-Protocols/Enable-administrative-access-through-LDAP/m-p/40216#M3721</guid>
      <dc:creator>SMALLPAUL</dc:creator>
      <dc:date>2013-07-26T05:57:36Z</dc:date>
    </item>
  </channel>
</rss>

