iBMC Configuring the Directory Server
The LDAP supports Windows AD, Linux OpenLDAP, and FreeIPA. Kerberos supports interconnection with Windows AD.
This section uses Windows Server 2012 R2 Enterprise as an example to describe how to configure a directory server. If a directory server is already available, skip this section.
Prerequisites
- The device (for example, a Huawei server) for deploying the directory server is available.
- The Windows Server 2012 R2 Enterprise installation CD-ROM or ISO image file is available.
Procedure
- Install the OS.
- On the iBMC web user interface (WebUI) of the server, set the CD-ROM drive as the next boot device of the server.
- Insert the OS installation CD-ROM into the CD-ROM drive or mount the OS image file through the iBMC virtual CD-ROM drive.
- Restart the server to access the OS installation wizard.
- On the OS selection page, select Windows Server 2012 R2 Datacenter.
- Click Next.
Complete the OS installation by following the instructions.
- Install the DNS service.
- Select Server Manager in the Start menu.
- Select Local Server in the navigation tree.
The PROPERTIES For FusionServer window is displayed, as shown in Figure 6-3.
- Select Manage at the top right corner and choose Add Roles and Features.
The Add Roles and Features Wizard window is displayed, as shown in Figure 6-4.
- Click Next.
The Select installation type window is displayed.
- Select Role-based or feature-based installation and click Next.
The Select destination server window is displayed, as shown in Figure 6-5.
- Choose Select a server from the server pool, select the server in the Server Pool box and click Next.
The Select server roles page is displayed, as shown in Figure 6-6.
- Select DNS Server in the Roles box.
The confirmation window is displayed.
- Click Add Features.
The Select server roles window is displayed.
- Click Next.
The Select features window is displayed, as shown in Figure 6-7.
- Select .NET Framework 4.5 Features and click Next.
The DNS Server window is displayed.
- Click Next.
The confirmation window is displayed.
- Click Install.
The DNS server installation process is displayed.
- When the installation is complete, click Close.
The Local Server window is displayed.
- Install the AD service.
Add new services by referring to 2.
- Select Active Directory Domain Services in the Roles box shown in Figure 6-7.
The confirmation window is displayed.
- Click Add Features.
The Select server roles window is displayed.
- Click Next.
The Select features window is displayed.
- Select .NET Framework 4.5 Features and click Next.
The Active Directory Domain Services window is displayed.
- Click Next.
The confirmation window is displayed.
- Click Install.
The installation progress of the Active Directory Domain Services is displayed.
- When the installation is complete, click Close.
The Local Server window is displayed.
- Select Active Directory Domain Services in the Roles box shown in Figure 6-7.
- Configure the AD service.
- Select AD DS in the navigation tree in the Server Manager window.
The AD DS properties are displayed in the right pane, as shown in Figure 6-8.
- Click More... in the alarm information.
The All Servers Task Details window is displayed, as shown in Figure 6-9.
- Click Promote this server to a domain controller.
The Active Directory Domain Services Configuration Wizard window is displayed, as shown in Figure 6-10.
- Select Add a new forest, enter the AD domain name, for example iBMC.com, in Root domain name, and click Next.
The Domain Controller Options window is displayed, as shown in Figure 6-11.
The domain name is case-sensitive. Set the domain name based on the planned domain name.
- Set the AD domain controller password and click Next.
- Click Next until the window in Figure 6-12 is displayed.
- Set the AD domain services paths and click Next.
You can also retain the default configuration.
- Click Next in the following windows displayed.
- When the Prerequisites Check window is displayed, click Install.
The OS automatically restarts after the configuration is complete.
- Select AD DS in the navigation tree in the Server Manager window.
- (Optional for the LDAP function) Configure the AD host name.
- On the toolbar in the upper right corner of Server Manager, click Tools and choose Active Directory Users and Computers from the drop-down list.
- In Active Directory Users and Computers, choose Computers from the navigation tree.
The list of host names is displayed, as shown in Figure 6-13.
- Right-click the blank area in the host name list to create a host name, for example, host.
The host name will be used when you configure the host name on the iBMC WebUI. Record the host name. For details about how to configure the host name on the iBMC WebUI, see 1 in Configuring the Kerberos Parameters on the iBMC.
- (Optional for the LDAP function) Configure the encryption algorithms supported by the AD domain.
- On the toolbar in the upper right corner of Server Manager, click Tools and choose Local Security Policy from the drop-down list.
- In the Local Security Policy window, choose from the navigation tree.The security options are displayed in the right pane, as shown in Figure 6-14.
- Right-click Network security: Configure encryption types allowed for Kerberos, and choose Priorities.
- Select the following algorithms in Local Security Setting:
- AES128_HMAC_SHA1
- AES256_HMAC_SHA1
For cross-domain logins, you need to configure the trust relationships between domains to ensure successful authentication of secure encryption algorithms.
- (Optional for the LDAP function) Configure the encryption algorithms supported by the server in the AD domain.
- On the toolbar in the upper right corner of Server Manager, click Tools and choose ADSI Edit from the drop-down list.
- In the navigation tree on the left of ADSI Edit, choose Computers.
The host name list is displayed in the right pane.
- Right-click the target host name and choose Properties from the shortcut menu.
The property list is displayed.
- Select msDS-SupportedEncryptiontypes.
- Click Edit, and enter the values of the encryption algorithms supported by the server in the text box in Integer Attribute Editor.
The client supports only the AES128-CTS-HMAC-SHA1-96 and AES256-CTS-HMAC-SHA1-96 encryption algorithms, the values of which are 8 and 16, respectively as listed in Table 6-1. To ensure successful negotiation between the server and the client, the encryption algorithms configured for the server must be the same as that supported by the client. Therefore, the encryption algorithm values must be 8 and 16, or 24.
- Click OK.
- (Optional for the LDAP function) Generate a key table.
- On the AD domain server, run the cmd command.
- Run the ktpass command to generate a key table.
When generating a key table using the ktpass command, use the AES128-CTS-HMAC-SHA1-96 or AES256-CTS-HMAC-SHA1-96 encryption algorithm. In addition, use the same encryption algorithm on the server and the client.
- If the server encryption algorithm is set to 8, use AES128-CTS-HMAC-SHA1-96 to generate a key table.
- If the server encryption algorithm is set to 16 or 24, use AES256-CTS-HMAC-SHA1-96 to generate a key table.
Example:
C:\Users\Administrator>ktpass -out c:\kerberos\admin.keytab +rndPass -ptype KRB5_NT_SRV_HST -mapuser admin$@it.software.com -princ HTTP/admin.it.software.com@IT.SOFTWARE.COM -crypto AES128-SHA1 Targeting domain controller: WIN-D0VNHFBODLC.it.software.com Successfully mapped HTTP/admin.it.software.com to ADMIN$. WARNING: Account ADMIN$ is not a user account (uacflags=0x1021). WARNING: Resetting ADMIN$'s password may cause authentication problems if ADMIN$ is being used as a server. Reset ADMIN$'s password [y/n]? y Password successfully set!8 Key created.Output keytab to c:\kerberos\admin.keytab: Keytab version: 0x502 keysize 86 HTTP/admin.it.software.com@IT.SOFTWARE.COM ptype 3 (KRB5_NT_SRV_HST) vno 3 etype 0x11 (AES128-SHA1) keylength 16 (0xd517c317bf1a6f333a45f3282d0b69a9)
- Install the CS services.
Add new services by referring to 2.
- Select Active Directory Certificate Services in the Roles box shown in Figure 6-7.
The confirmation window is displayed.
- Click Add Features.
The Select server roles window is displayed.
- Click Next.
The Select features window is displayed.
- Select .NET Framework 4.5 Features and click Next.
The Active Directory Certificate Services window is displayed.
- Click Next.
The Select role services window is displayed.
- Select Certification Authority and Certification Authority Web Enrollment, and click Next.
The confirmation window is displayed.
- Click Add Features.
The Select server roles window is displayed.
- Click Next.
- Click Install in the Confirm installation selections window.
The installation progress is displayed.
- Click Close when the installation is complete.
- Select Active Directory Certificate Services in the Roles box shown in Figure 6-7.
- Configure the CS services.
- Open the Server Manager window.
- Select AD CS in the navigation tree.
The AD CS properties are displayed in the right pane, as shown in Figure 6-15.
- Click More... in the alarm information.
The All Servers Task Details window is displayed, as shown in Figure 6-16.
- Click Configure Active Directory Certificate Services on the Destination Server.
The AD CS Configuration window is displayed.
- Click Next.
The Role Services window is displayed, as shown in Figure 6-17.
- Select Certification Authority and Certification Authority Web Enrollment, and click Next.
The Setup Type window is displayed.
- Select Enterprise CA and click Next.
The CA Type window is displayed.
- Select Root CA and click Next.
The Private Key window is displayed.
- Select Create a new private key and click Next.
The Cryptography for CA window is displayed, as shown in Figure 6-18.
- Select RSA#Microsoft Software Key Storage Provider as the cryptographic provider, 2048 in Key length, and SHA1 as the hash algorithm, and click Next.
The CA Name window is displayed, as shown in Figure 6-19.
- Set the common name for this CA and click Next.
The Validity Period window is displayed.
- Set the validity period and click Next.
The CA Database window is displayed.
- Specify the CA database path and click Next.
The Confirmation window is displayed.
- Click Configure.
The configuration process of AD certificate services is displayed.
- Click Close when the configuration is complete.
- Restart the server to make the configuration take effect.
- Create an organizational unit.
You can create an organizational unit in any node of the server. The following describes how to create a first-level node and its sub-nodes.
- Log in to the server OS.
- Open Server Manager, and select Local Server in the navigation tree.
- Select Active Directory Users and Computers from the TASKS drop-down list at the top right corner of the window.
The window shown in Figure 6-20 is displayed.
- Right-click the first-level node (for example, iBMC.com) of the server, and choose New > Organizational Unit.
The window shown in Figure 6-21 is displayed.
- Enter the organization name, for example company, and click OK.
The organizational unit company is displayed in the server organization.
- Right-click the newly created organizational unit (for example, company), and choose New > Organizational Unit to create a sub-organizational unit (for example, department).
The sub-node department is displayed under company.
- Repeat 12.d to 12.f to create organizational units based on actual needs.
- Create a group.
Create a group in any node based on actual needs.
- Right-click the node (for example, department), and choose New > Group.
The New Object-Group window is displayed, as shown in Figure 6-22.
- In the Group name box, enter the LADP group name, for example info_group1, select the group scope and the group type, and click OK.
You are advised to set the same value for Group name and Group name (pre-Windows 2000).
The newly created group (for example, info_group1) is displayed in the specified organization.
- Right-click the node (for example, department), and choose New > Group.
- Create a user.
You can add users in any directory, but you are advised to add users in the Users directory.
- Right-click the node (for example, Users) and choose New > User.
- In the New Object-User window as shown in Figure 6-23, enter the user information and click Next.
User login name is the domain name used to log in to the iBMC WebUI. Record the user login name.
- Click Next.
The window shown in Figure 6-24 is displayed.
- Enter the password (for example, Admin@9000) in the Password and Confirm password boxes, select the password policy, and click Next.
Do not select User must change password at next logon as the password policy.
The user information confirmation window is displayed.
- Click Finish.
The user HWinfo is displayed in the Users list.
- Create other users in the same way.
- Add the user to a group.
You can add a user to a group by managing the user or group. The following uses the operations on the user as an example.
- Right-click the user created in 14 (for example, HWinfo) and choose Add to a group.
The Select Groups window is displayed, as shown in Figure 6-25.
- In Enter the object names to select, enter the group name (for example, info_group1) to which the user is to be added, and click OK.
A message is displayed indicating the operation is successful.
- Repeat the steps to add users to the related groups based on actual needs.
- Right-click the user created in 14 (for example, HWinfo) and choose Add to a group.