<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: LDAP Authentication for SSH sessions in Active IQ Unified Manager Discussions</title>
    <link>https://community.netapp.com/t5/Active-IQ-Unified-Manager-Discussions/LDAP-Authentication-for-SSH-sessions/m-p/27913#M5851</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The TR gives you almost all the info needed to get ssh working. By following the TR I was able to get my ldap users, groups, and netgroups visible to the filer. I was also able to get the usermapping working. What did not work out of the box was multiple group membership and ssh logins.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Take the following ldiffs for example.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;# netappadmin, groups, example.com&lt;/P&gt;&lt;P&gt;dn: cn=netappadmin,ou=groups,dc=example,dc=com&lt;/P&gt;&lt;P&gt;objectClass: groupOfNames&lt;/P&gt;&lt;P&gt;objectClass: top&lt;/P&gt;&lt;P&gt;objectClass: posixGroup&lt;/P&gt;&lt;P&gt;member: uid=cliles,ou=people,dc=example,dc=com&lt;/P&gt;&lt;P&gt;cn: netappadmin&lt;/P&gt;&lt;P&gt;gidNumber: 10002&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;# sysadmin, groups, example.com&lt;/P&gt;&lt;P&gt;dn: cn=sysadmin,ou=groups,dc=example,dc=com&lt;/P&gt;&lt;P&gt;objectClass: top&lt;/P&gt;&lt;P&gt;objectClass: groupOfNames&lt;/P&gt;&lt;P&gt;objectClass: posixGroup&lt;/P&gt;&lt;P&gt;cn: sysadmin&lt;/P&gt;&lt;P&gt;gidNumber: 10001&lt;/P&gt;&lt;P&gt;member: uid=cliles,ou=people,dc=example,dc=com&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;# cliles, people, example.com&lt;/P&gt;&lt;P&gt;dn: uid=cliles,ou=people,dc=example,dc=com&lt;/P&gt;&lt;P&gt;objectClass: inetOrgPerson&lt;/P&gt;&lt;P&gt;objectClass: posixAccount&lt;/P&gt;&lt;P&gt;objectClass: shadowAccount&lt;/P&gt;&lt;P&gt;objectClass: top&lt;/P&gt;&lt;P&gt;uid: cliles&lt;/P&gt;&lt;P&gt;uidNumber: 99999&lt;/P&gt;&lt;P&gt;gidNumber: 10001&lt;/P&gt;&lt;P&gt;loginShell: /bin/bash&lt;/P&gt;&lt;P&gt;homeDirectory: /export/home/wheel/cliles&lt;/P&gt;&lt;P&gt;memberOf: cn=sysadmin,ou=groups,dc=example,dc=com&lt;/P&gt;&lt;P&gt;memberOf: cn=netappadmin,ou=groups,dc=example,dc=com&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The filer would only pickup my group membership to gidNumber 10001. It was not looking member attribute of groups, only following gidNumber. I found some more options that will help you specify the attribute for addition groups. For my group structure I'd set them as the following. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;options ldap.nssmap.attribute.uniqueMember Member&lt;/P&gt;&lt;P&gt;options ldap.nssmap.objectClass.groupOfUniqueNames groupOfNames&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After that, multiple group membership was working. For SSH access, I can only get it to work with key based auth, so you have to setup your ssh keys ahead of time. After keys are in place you should be able to verify a login, but once connected you'll have no permissions on the filer to run anything.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The next 2 options you'll need are:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;options security.admin.authentication internal,nsswitch&lt;/P&gt;&lt;P&gt;options security.admin.nsswitchgroup netappadmin&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Set like this you'll try internal users 1st, then fall back to your ldap group(s). Any user in the netappadmin group will be put in the admin role. security.admin.nsswitchgroup can take a string like "ldapgrp1:role1,ldapgrp2:role2". &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, whatever you have for your user's gidNumber, there must be a group that exist with that gidNumber in ldap. If not, the filer will stop looking for additional groups and not grant permissions on login.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sat, 07 Jan 2012 01:35:18 GMT</pubDate>
    <dc:creator>clilescapario</dc:creator>
    <dc:date>2012-01-07T01:35:18Z</dc:date>
    <item>
      <title>LDAP Authentication for SSH sessions</title>
      <link>https://community.netapp.com/t5/Active-IQ-Unified-Manager-Discussions/LDAP-Authentication-for-SSH-sessions/m-p/27902#M5844</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi I am looking for a way to enable LDAP authentication for when our admins access the systems via SSH for configuration. I was able to do this for the web sessions but I am still unable to access the system via SSH using LDAP/AD username and passwords. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can anyone point in the direction on what I need to do to acomplish this task. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Jun 2025 06:44:43 GMT</pubDate>
      <guid>https://community.netapp.com/t5/Active-IQ-Unified-Manager-Discussions/LDAP-Authentication-for-SSH-sessions/m-p/27902#M5844</guid>
      <dc:creator>WICKEDSHARK</dc:creator>
      <dc:date>2025-06-05T06:44:43Z</dc:date>
    </item>
    <item>
      <title>LDAP Authentication for SSH sessions</title>
      <link>https://community.netapp.com/t5/Active-IQ-Unified-Manager-Discussions/LDAP-Authentication-for-SSH-sessions/m-p/27907#M5847</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Just looked at this last night, go search for TR-3464 it will answer all your ldap questions.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Oct 2011 20:16:29 GMT</pubDate>
      <guid>https://community.netapp.com/t5/Active-IQ-Unified-Manager-Discussions/LDAP-Authentication-for-SSH-sessions/m-p/27907#M5847</guid>
      <dc:creator>clilescapario</dc:creator>
      <dc:date>2011-10-19T20:16:29Z</dc:date>
    </item>
    <item>
      <title>Re: LDAP Authentication for SSH sessions</title>
      <link>https://community.netapp.com/t5/Active-IQ-Unified-Manager-Discussions/LDAP-Authentication-for-SSH-sessions/m-p/27913#M5851</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The TR gives you almost all the info needed to get ssh working. By following the TR I was able to get my ldap users, groups, and netgroups visible to the filer. I was also able to get the usermapping working. What did not work out of the box was multiple group membership and ssh logins.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Take the following ldiffs for example.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;# netappadmin, groups, example.com&lt;/P&gt;&lt;P&gt;dn: cn=netappadmin,ou=groups,dc=example,dc=com&lt;/P&gt;&lt;P&gt;objectClass: groupOfNames&lt;/P&gt;&lt;P&gt;objectClass: top&lt;/P&gt;&lt;P&gt;objectClass: posixGroup&lt;/P&gt;&lt;P&gt;member: uid=cliles,ou=people,dc=example,dc=com&lt;/P&gt;&lt;P&gt;cn: netappadmin&lt;/P&gt;&lt;P&gt;gidNumber: 10002&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;# sysadmin, groups, example.com&lt;/P&gt;&lt;P&gt;dn: cn=sysadmin,ou=groups,dc=example,dc=com&lt;/P&gt;&lt;P&gt;objectClass: top&lt;/P&gt;&lt;P&gt;objectClass: groupOfNames&lt;/P&gt;&lt;P&gt;objectClass: posixGroup&lt;/P&gt;&lt;P&gt;cn: sysadmin&lt;/P&gt;&lt;P&gt;gidNumber: 10001&lt;/P&gt;&lt;P&gt;member: uid=cliles,ou=people,dc=example,dc=com&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;# cliles, people, example.com&lt;/P&gt;&lt;P&gt;dn: uid=cliles,ou=people,dc=example,dc=com&lt;/P&gt;&lt;P&gt;objectClass: inetOrgPerson&lt;/P&gt;&lt;P&gt;objectClass: posixAccount&lt;/P&gt;&lt;P&gt;objectClass: shadowAccount&lt;/P&gt;&lt;P&gt;objectClass: top&lt;/P&gt;&lt;P&gt;uid: cliles&lt;/P&gt;&lt;P&gt;uidNumber: 99999&lt;/P&gt;&lt;P&gt;gidNumber: 10001&lt;/P&gt;&lt;P&gt;loginShell: /bin/bash&lt;/P&gt;&lt;P&gt;homeDirectory: /export/home/wheel/cliles&lt;/P&gt;&lt;P&gt;memberOf: cn=sysadmin,ou=groups,dc=example,dc=com&lt;/P&gt;&lt;P&gt;memberOf: cn=netappadmin,ou=groups,dc=example,dc=com&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The filer would only pickup my group membership to gidNumber 10001. It was not looking member attribute of groups, only following gidNumber. I found some more options that will help you specify the attribute for addition groups. For my group structure I'd set them as the following. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;options ldap.nssmap.attribute.uniqueMember Member&lt;/P&gt;&lt;P&gt;options ldap.nssmap.objectClass.groupOfUniqueNames groupOfNames&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After that, multiple group membership was working. For SSH access, I can only get it to work with key based auth, so you have to setup your ssh keys ahead of time. After keys are in place you should be able to verify a login, but once connected you'll have no permissions on the filer to run anything.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The next 2 options you'll need are:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;options security.admin.authentication internal,nsswitch&lt;/P&gt;&lt;P&gt;options security.admin.nsswitchgroup netappadmin&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Set like this you'll try internal users 1st, then fall back to your ldap group(s). Any user in the netappadmin group will be put in the admin role. security.admin.nsswitchgroup can take a string like "ldapgrp1:role1,ldapgrp2:role2". &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, whatever you have for your user's gidNumber, there must be a group that exist with that gidNumber in ldap. If not, the filer will stop looking for additional groups and not grant permissions on login.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 07 Jan 2012 01:35:18 GMT</pubDate>
      <guid>https://community.netapp.com/t5/Active-IQ-Unified-Manager-Discussions/LDAP-Authentication-for-SSH-sessions/m-p/27913#M5851</guid>
      <dc:creator>clilescapario</dc:creator>
      <dc:date>2012-01-07T01:35:18Z</dc:date>
    </item>
  </channel>
</rss>

