Digi CM User's Guide Page 86

  • Download
  • Add to my manuals
  • Print
  • Page
    / 202
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 85
Configuring Authentication for the Web Server
86 Chapter 8
When your password is approved by the authentication server, the Digi CM
unit uses the local permission rights to provide access privileges for you to
ports and the configuration.
LDAP Authentication
The Digi CM unit supports authenticating against an LDAP-based database,
including LDAP systems running on Linux servers as well as Microsoft Active
Directory together with the LDAP gateway ADAM (Active Directory Application
Mode).
If the Digi CM unit authenticates against an LDAP directory, all users must be
configured in one container. The Digi CM unit will extend the username using
the LDAP search base and authenticate the user.
In the next example, the domain is called dilbert.com, the LDAP server is at
10.1.1.1, and all users with access to the Digi CM unit are located in the
container: USA Users
Configure the LDAP authentication as shown here:
Authentication method: LDAP server
First LDAP Server 10.1.1.1
Second LDAP Server
LDAP search base: ou=users,ou=usa,dc=dilbert,dc=com
Domain name for active directory:
If your LDAP database resides on a Microsoft system you also have to
configure the Domain name for the active directory (dilbert.com in the above
example).
Do not use this setting if you are using a non-Microsoft system as it changes
the LDAP to comply with Microsoft syntax.
Custom PAM Module
The Digi CM unit supports custom PAM modules for remote authentication.
This allows you to create your own authentication schema or use any other
third party PAM module. The module must o be compiled for the Digi CM unit’s
environment.
Digi offers an SDK for the Digi CM family.
To download the SDK, contact technical support at
1. Place the custom PAM modules onto: /usr/2 on the Digi CM unit.
2. Use an scp client (like WinSCP) to copy data to the /usr2 directory, or
download the ftp client for the Digi CM unit from support.digi.com.
3. Make sure the module is flagged to be executable (chmod 755 ...)
Note: To activate the custom PAM module it has to be configured in the custom file
located in /etc/pam.d
4. Create a file called: /etc/pam.d/custom and add these lines:
auth required /usr2/my_pam _auth.so
session required /usr2/my_pam_ auth.so
(with the my_pam_auth.so being the "custom pam" module’s name)
Page view 85
1 2 ... 81 82 83 84 85 86 87 88 89 90 91 ... 201 202

Comments to this Manuals

No comments