[pbs-devel] [PATCH proxmox/proxmox-backup/pwt v3 00/13] add Active Directory realm support

Lukas Wagner l.wagner at proxmox.com
Wed Jan 17 12:05:34 CET 2024



On 1/12/24 17:15, Christoph Heiss wrote:
> This series adds Active Directory realm support to PBS, much like it
> already exists in PVE. The logic matches it as closely as possible.
> 
> Patches #1 through #6 are purely preparatory.
> 
> The API, authenticator and realm sync job implementations are partly
> simply copied from LDAP, replacing structs and changing some things as
> needed. The realm sync job simply reuses the existing LDAP
> implementation for the most part, other than setting up some things
> differently.
> 
> As for the UI, the existing panel for LDAP realms was generic enough
> such that it only needed a few conditionals as what input boxes to show.
> 
> One thing to note is that - unlike PVE - you don't have to specify a
> domain name when creating an AD realm. This is due to `proxmox-ldap`
> already figuring out the correct, full DN of bind and login users
> itself. That is the only use of the domain name in PVE anyway, thus it
> is not present here.
> 
> The base DN is automatically determined from the `defaultNamingContext`
> attribute of the root DSE object. It can be set manually in the config
> if the need should arise. So that should be treated more like an
> implementation detail.
> 
> Testing
> -------
> I have tested this series using:
> 
>   * slapd 2.5.13+dfsg-5 as LDAP server to ensure no regressions
>   * Samba 4.18.5 as an Linux-based LDAP and AD server, with and without
>     (START)TLS.
>   * AD on Windows Server 2022 to make sure that works as well
> 
> For slapd and MS AD, I tested both anonymous binds and authenticated
> binds, with Samba only authenticated binds (since there seems to way to
> turn on anonymous binds in Samba, at least that I could find ..) as well
> as dry-running and actual syncing of users. Further, then also logging
> into PBS with a sync'd user.
> 

Gave these changes another (quick) test, testing against AD on Windows 
Server 2022. Also tested regular LDAP realms to make sure that these 
continue to work as expected.

Everything looks good, as far as I can tell:

Tested-by: Lukas Wagner <l.wagner at proxmox.com>
Reviewed-by: Lukas Wagner <l.wagner at proxmox.com>

-- 
- Lukas




More information about the pbs-devel mailing list