Bug 1328437 - [Doc RFE] Document configuration steps for the LDAP integration with RGW
Summary: [Doc RFE] Document configuration steps for the LDAP integration with RGW
Keywords:
Status: CLOSED CURRENTRELEASE
Alias: None
Product: Red Hat Ceph Storage
Classification: Red Hat
Component: Documentation
Version: 2.0
Hardware: Unspecified
OS: Unspecified
unspecified
unspecified
Target Milestone: rc
: 2.0
Assignee: John Wilkins
QA Contact: shylesh
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2016-04-19 11:47 UTC by Anjana Suparna Sriram
Modified: 2016-09-30 17:19 UTC (History)
5 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2016-09-30 17:19:12 UTC
Target Upstream Version:


Attachments (Terms of Use)
Additional instructions for trusting LDAP CA (2.04 KB, text/plain)
2016-07-21 14:27 UTC, Ken Dreyer (Red Hat)
no flags Details

Description Anjana Suparna Sriram 2016-04-19 11:47:49 UTC
Description of problem:


Version-Release number of selected component (if applicable):


How reproducible:


Steps to Reproduce:
1.
2.
3.

Actual results:


Expected results:


Additional info:

Comment 3 Ken Dreyer (Red Hat) 2016-07-21 14:27:03 UTC
Created attachment 1182539 [details]
Additional instructions for trusting LDAP CA

Hi John, here are some additional instructions for trusting the LDAP Certificate Authority on the RGW nodes. Would you please add this information to the Asciidoc source at https://gitlab.cee.redhat.com/red-hat-ceph-storage-documentation/ceph-rgw-to-ldap-ad ?

Comment 4 shylesh 2016-07-21 17:42:00 UTC
Our LDAP doc directly talks about cert generation step when it comes to ldap config.

Can somebody point me to the right doc for Redhat-ds configuration. The one provided in the doc has information scattered across for configuring SSL for redhat-ds. I tried couple of times to bring up with SSL but no luck. If somebody already know the proper steps that would be really a great help for me to continue.

Even from customer's perspective there should be a proper flow of configuring redhat-ds , cert generation etc.

Comment 5 Ken Dreyer (Red Hat) 2016-07-25 21:51:48 UTC
We should probably also incorporate the following troubleshooting commands, somehow:

1. To examine a PEM-formatted x509 certificate file "cacert.asc" before adding it as trusted on the RGW LDAP client:

   openssl x509 -in cacert.asc -noout -text

For the certificate authority, the "Issuer" and "Subject" should be the same, there.


2. To examine the LDAPS certificate chain that the LDAP server sends to the RGW LDAP client: 

   openssl s_client -connect ldapserver.example.com:636 < /dev/null | perl -0777 -nle 'print for m/(Certificate chain.*?)---/s'

This command will show the full certificate chain that the sever sends as part of the SSL exchange, and you should see the Subject for the CA listed there. It should match the "openssl x509 ... -text" command above.


3. On RHEL, to examine the list of trusted CAs in the NSSDB trust store in /etc/openldap/certs:

   certutil -L -d /etc/openldap/certs


4. Similarly on RHEL, to examine a particular CA (example "My Org CA cert") in the NSSDB trust store:

   certutil -L -d /etc/openldap/certs -n "My Org CA cert"

Comment 6 Harish NV Rao 2016-07-26 10:26:50 UTC
Moving this to Assigned state. Need comment 4 and 5 to be addressed.

Comment 8 John Wilkins 2016-08-11 17:56:25 UTC
I left the link to the downstream LDAPs docs for v10. I've removed the certutil steps so that users can just follow the downstream docs and manpages. I've added the steps to make RGW trust the LDAPs CA and reviewed the changes with Ken Dreyer.

https://access.qa.redhat.com/documentation/en/red-hat-ceph-storage/2/single/ceph-object-gateway-with-ldap-ad-guide#configuring_ldaps

Comment 9 Tanay Ganguly 2016-08-12 10:24:20 UTC
Small Correction required:

[Section]
1.6. Adding a Gateway User

# ldapsearch -x -D "uid=ceph,ou=People,dc=example dc=com" -W -H ldaps://example.com -b "ou=People,dc=example,dc=com" -s sub 'uid=ceph'

A Comma should be required to separate "dc=example dc=com"

Correct Command should be:

# ldapsearch -x -D "uid=ceph,ou=People,dc=example,dc=com" -W -H ldaps://example.com -b "ou=People,dc=example,dc=com" -s sub 'uid=ceph'

Comment 11 shylesh 2016-08-12 16:48:31 UTC
All the changes are made hence marking this as verified.


Note You need to log in before you can comment on or make changes to this bug.