cancel
Showing results for 
Search instead for 
Did you mean: 

Alfresco LDAP-AD Questions

sab
Champ in-the-making
Champ in-the-making
Hi,

I have some questions i hope someone can answer.

First, i have 2 Microsoft Active Servers running 2008 on my main network.

I also have a separate network with 1 test server: Microsoft Active Server 2008 DC and 1 test server running Ubuntu 14, joined to the test domain using Centrify software and Alfresco 5 installed.
http://www.centrify.com/express/free-active-directory-authentication-for-unix-linux.asp#agents

All is OK
I then followed these instructions to get Alfresco to use users in Active Directory: (i used these instructions as it looked easy)
http://andoylang.wordpress.com/2010/07/18/alfresco-with-active-directory/

Surprisingly, it worked first time!

Now my question is:

ldap.authentication.java.naming.security.authentication=simple
Does this mean all users passwords are being sent over the network in plain text?? Could a user vacuum it using wire-shark?

ldap.authentication.java.naming.provider.url=ldap://<Your.AD.Server.IP.Address>:389
Again, port 389, for plain text passwords?

So, i could setup the following Alfresco server on my main network, but i am concerned having passwords sent in plain text. I don't think that's a good idea. Is the only way to stop this is to try Kerberos instead of LDAP-AD?

I have more questions, but should deal with this first.

Thanks
4 REPLIES 4

sab
Champ in-the-making
Champ in-the-making
I have found Some answers myself:

On encryption:

http://wiki.alfresco.com/wiki/Alfresco_Authentication_Subsystems
(about 1/3 the way down)
ldap.authentication.java.naming.security.authentication
    The mechanism used to validate passwords with the LDAP server. Should be one of the standard values documented here or one of the values supported by the LDAP provider. Sun's LDAP provider supports the SASL mechanisms documented here. Recommended values are:

    simple
        the basic LDAP authentication mechanism requiring the username and password to be passed over the wire unencrypted. You may be able to add SSL for secure access; otherwise, only use this for testing.

    DIGEST-MD5
        More secure RFC 2831 Digest Authentication. Note that with Active Directory, this requires your user accounts to be set up with reversible encryption, not the default setting.

Ports 389 is non-SSL, and 636 is SSL

sab
Champ in-the-making
Champ in-the-making
I am still stuck on this issue, but have found some more useful info:

Here:
http://docs.alfresco.com/community/concepts/auth-passthru-intro.html
This method of authentication is much more secure than simple LDAP-based authentication or form-based authentication.

Why is passthru more secure than Active Directory ?

For LDAP-AD:
http://docs.alfresco.com/community/concepts/auth-ldap-props.html
To change to secure logins, do you just change the word: simple to DIGEST-MD5 ? and ports 389 to 636?  Is that it???

Now, my question is, what is the best method to use to have secure logins from Active Directory?

sab
Champ in-the-making
Champ in-the-making
I have been doing more testing and found some results:

1) Using Pure LDAP-AD (only), the username + password is sent in PLAIN TEXT

2) Using passthru + LDAP-AD mixed, only the username is sent in PLAIN TEXT. Passwords are encrypted, but use Weak encryption: NTLM v1

Back to number 1, if i change the port number from 389 > 636, and change simple passwords to DIGEST-MD5, and tick reversible encryption in a user in AD, It does Not work.

Both 1 and 2 can be proven using Wireshark.

packets that have LDAP will have the password inside and smb packets for the second one will have the password encrypted in the 3rd SMB packet (210 session setup andx request)

By pure LDAP-AD, i mean following instructions here:
http://docs.alfresco.com/community/tasks/auth-example-oneldap-ad.html
http://wiki.alfresco.com/wiki/Alfresco_Authentication_Subsystems#LDAP

inside global properties file only.

So, does anyone have info on using number 1 with encryption??? or is the only real way is using Kerberos?
Thanks

sab
Champ in-the-making
Champ in-the-making