Applying Global User Authentication Policies


Now that you have an LDAP directory to store your users, you have a variety of options when choosing how those users authenticate to your server.

When you create users, you give them a long name, a short name, and a password. That's the minimum you need to create users on Mac OS X Server who can log in remotely and access folders and files needed for their work. Chapter 2, "Server Tools," examined how to quickly add users to a local directory. You probably haven't yet created a secondary directory, and it isn't necessary to do so if all you wish to do is let users log in remotely to access folders and files. You reduce the security and functionality by having the secondary directory, but it can be done.

When you create an Open Directory master, you then have the ability to set certain global authentication polices regarding user's password(s) (Figure 3.67). This is the case because user passwords are managed differently than those in the local directory. You've seen how to create that Open Directory master, but this chapter should help convince you that doing so is a wise decision. The global user authentication policies are listed in Table 3.1.

Figure 3.67. The Authentication tab of the Open Directory service shows password server policies.


Table 3.1. Global User Authentication Policies

DISABLE ACCOUNTS OPTION

USAGE

On date

Disables an account on a set date, such as when a contractor is set to leave a job site

After a set number of days

Disables an account after a set number of days, such as when a student has access for the number of days in a grading period

After a period of inactivity

Disables an account after the user doesn't log in for a set number of days, such as when a user stops using a particular file server

After a set number of failed login attempts

Disables an account after a user or hacker attempts to enter incorrect information a set number of times

PASSWORD POLICY OPTION

USAGE

Length policy

Dictates that a password must be at least a set number of characters long

Letter policy

Requires a password to contain at least one letter

Numeric character policy

Requires a password to contain at least one numeric character

Account name policy

Requires the password to be different from the account name

Reused passwords policy

Requires a password to be different from previous passwords

Password change policy

Requires a password to be changed after a set number of days, weeks, or months


These policies help ensure security on your server by maintaining a better level of complexity when dealing with passwords.

To set the minimum length for passwords:

1.

Open the Server Admin application, located in /Applications/Server/, and authenticate as the administrator of the server (Figure 3.68).

Figure 3.68. Launch the Server Admin tool, and authenticate as an administrator.


2.

Choose the Open Directory service from the Computers & Services frame, select the Settings tab, and then select the Authentication tab (Figure 3.69).

Figure 3.69. Set global password policies on the Authentication tab of the Open Directory service.


3.

Select the "Password must be at least ___ characters long" check box.

You can also set other criteria, such as those specifying the use of letters and numeric characters.

4.

Click the Save button to save the changes.

About authentication policies with Mac OS X Server

Mac OS X Server can authenticate users using several built-in methods. Depending on whether you upgraded your server or installed Mac OS X Server for the first time, you may need to change the type of password stored for each user.

Crypt passwords may have been used on a version of Mac OS X Server prior to 10.3. You can check this by opening Workgroup Manager, selecting a user, clicking the Advanced tab, and seeing whether the User Password Type pop-up window shows Crypt Password. Crypt passwords aren't as secure as other passwords and should generally be changed to a more secure methodin this case, Open Directory passwords. One reason to keep a user's password as a crypt password is if that user is connecting to your Mac OS X Server from an older Macintosh operating system, such as Mac OS 8.6. Users of Mac OS X Server who aren't promoting the server to a master (keeping it a stand-alone server) may wish to keep the crypt passwords as well, although this is a terrible security risk.

Open Directory passwords are more complex and are stored securely in a separate database. One of the advantages of using an Open Directory password is that the password database can be stored on another Mac OS X Server, thus allowing one server to be the file server and Web server and another server to be used solely for user authentication.

When you're using Open Directory passwords, there are several editable methods of authentication (editable means you can turn off these authentication methods to restrict access to your server via the methods):

SMB-NT is used for Windows clients.

SMB-LAN-MANAGER is used for Windows clients.

MS-CHAPv2 is used for VPN connections to the server.

CRAM-MD5 is used primarily for IMAP mail.

WEBDAV-DIGEST is used for Web-DAV connections.

APOP is used by the POP protocol when retrieving mail.

There are additional methods of authentication, but they aren't editable. You can't turn them off in the GUI; you must do so via the command line using NeST (a command-line utility that's used to manage Password Server and therefore has several functions). Not only can you turn off various authentication methods, but you can also disable Password Server and create a Password Server administrator, in case the administrator you have doesn't work.

Tip

  • You may wish to check Workgroup Manager for your LDAP administrator account after you promote your server to a master. If you fail to see an administrator, you may need to use NeST to create one.


NeST

NeST stands for NetInfo Setup Tooland yes, it's loaded with plenty of options for managing NetInfo directory connections. Although it may seem to be out of date with Mac OS X Server 10.3, you can use it in emergency situations to create a Password Server administrator with the NeST hostpasswordserver command.


Kerberos overview

Understanding that Password Server exists isn't the end of the authentication options when you're dealing with Mac OS X Server. Once a master has been created, a Kerberos Key Distribution Center (KDC) is also created.

Kerberos is an authentication method in which a ticket is granted to a user by a KDC for presentation to a service to utilize that service. The KDC knows the user's password, and both the user's computer and the KDC use a complex method to determine if the password entered by the user is correct. Once the password has been approved by the KDC, additional conversations take place between the user's computer and the KDC. Ultimately, the user receives a ticket for a service, such as Apple File Protocol (when done from a Mac OS X Server). The ticket is presented to the service, and the service then grants access to (in this case) the share points the user has permission to access.

Mac OS X Server has made Kerberos mostly invisible. You can ensure the KDC is running by clicking the Overview button in the Open Directory service and viewing the status.

Note that on both the Mac OS X Client and Server, an edu.mit.kerberos file must be present for Kerberos to function properly; it's located in /Library/Preferences. When a Mac OS X Client is properly bound to a Mac OS X Server, this file is sent down from the Server to the client automatically.

Literally all you need to do is choose the services on Mac OS X Server for which you wish to use Kerberos. The currently available services are Apple Filing Protocol, FTP, and the Mail server (there are others, but Kerberos is already built into them). Mac OS X clients (Mac OS X 10.2 and later) can obtain Kerberos tickets for these services automatically. Refer to Chapter 5, "File Sharing," for more information about setting up Apple File Service and FTP, and see Chapter 8 ("Mail Services") to learn about Mail server setup.

Administrators use Kerberos to help reduce problems associated with traditional authentication methods, such as lack of encryption for passwords, packet sniffing, and attacks against services to compromise the computer and harvest passwords. By keeping the KDC in a locked room with an excellent administrator password and no root user active, you reduce your risk.

Kerberos

Kerberos was developed at MIT as a way to secure passwords on a separate computer, locked in a room. The idea was that the user's computer could access a service on a third computer without the third computer knowing the password, thus keeping authentication centralized on one server.

Kerberos also uses single sign-on: When a user logs in to the computer, the user can automatically use any Kerberized services without further authentication. In Mac OS X, the Login Window is Kerberized, and if the user has a home folder, this window mounts using a ticket obtained automatically if the user's home directory is being mounted using the AFP protocol.

Kerberos has many configuration options. However, Mac OS X applies some preconfigured settings that are therefore somewhat easy to use.


Not everyone will use Kerberos, and not all services can be Kerberized. But it's important to understand that as more and more services utilize Kerberos, the cost of setting up and managing those services will drop, and the advantages of Kerberos will become greater. The bottom line for first-time Mac OS X Server users is that Kerberos is there, whether you use it or not. It may be a good idea to experiment with the service to see if it suits you.

Tips

  • Mac OS X Client and Server have a Kerberos tool located in /System/Library/CoreServices that you can use to obtain, view, and destroy tickets.

  • A Kerberos realm is a way of identifying the KDC's area of responsibility. For example, a realm name may be YOURXSERVER.YOURCOMPANY.COM.

  • A Kerberos principal is contained inside its realm. It can be a user or a service, such as amie@XSERVER.EXAMPLE.COM or mailservice/xserver.example.com@XSERVER.EXAMPLE.COM.


Kerberos on Mac OS X Client

In addition to using the Kerberos tool to obtain, view, and destroy tickets, you can do these things from the command line. Use the klist e command to view all your tickets, kinit to obtain a ticket, and kdestroy to remove and destroy a ticket.


To view the Kerberos tool:

1.

On Mac OS X Server, open a Finder window.

2.

Navigate to /System/Library/CoreServices.

3.

Locate and double-click the Kerberos tool.

4.

Click the Get Tickets button (Figure 3.70).

Figure 3.70. The Kerberos utility shows the realm that it sees.


Your realm name appears in the resulting dialog (Figure 3.71).

Figure 3.71. You can get a ticket using the Kerberos utility.


5.

Enter your administrator username and password, and click OK.

A Kerberos ticket appears in the window (Figure 3.72). This ticket is valid for a certain amount of time, after which it will be destroyed.

Figure 3.72. A Kerberos ticket appears in the window.


6.

Double-click the ticket to display information about it, such as encryption type, time stamp, IP address information, and more (Figure 3.73).

Figure 3.73. Double-clicking a ticket opens a dialog showing information associated with that ticket.




    Mac OS X 10. 3 Server Panther. Visual QuickPro Guide
    Mac OS X Server 10.3 Panther: Visual QuickPro Guide
    ISBN: 0321242521
    EAN: 2147483647
    Year: 2004
    Pages: 105

    flylib.com © 2008-2017.
    If you may any questions please contact us: flylib@qtcs.net