Latest AIX package is called: IBM Security Verify Directory and version is 10.x.x
Search on IBM Fix Central https://www-945.ibm.com/support/fixcentral/ the latest packages for “IBM Security Directory Server” Example packages
9 6.4.0.10-ISS-ISDS-AIX-IF0010.tar.gz 8.0.50.67-ISS-GSKIT-AIX-FP0067.tar.gz
Untar the packages, the go into the directories, first install
ISS-GSKIT-AIX
Then in the folder ISS-ISDS-AIX, accept the license
echo 1 | ./license/idsLicense cd images installp -agXY -d ./ idsldap.license64 idsldap.clt_max_crypto64bit64 idsldap.clt64bit64
Also required 32bits ldap packages:
installp -agXY -d ./ idsldap.clt32bit64 idsldap.clt_max_crypto32bit64
[root@ldapclt]/root# lslpp -Lc | egrep 'idsldap|GSK' GSKit8:GSKit8.gskcrypt64.ppc.rte:8.0.50.67: : :C: :IBM GSKit Cryptography Runtime: : : : : : :0:0:/: GSKit8:GSKit8.gskssl64.ppc.rte:8.0.50.67: : :C: :IBM GSKit SSL Runtime With Acme Toolkit: : : : : : :0:0:/: idsldap.clt32bit64:idsldap.clt32bit64.rte:6.4.0.10: : :C: :Directory Server - 32 bit Client: : : : : : :0:0:/: idsldap.clt64bit64:idsldap.clt64bit64.rte:6.4.0.10: : :C: :Directory Server - 64 bit Client: : : : : : :0:0:/: idsldap.clt_max_crypto32bit64:idsldap.clt_max_crypto32bit64.rte:6.4.0.10: : :C: :Directory Server - 32 bit Client (SSL): : : : : : :0:0:/: idsldap.clt_max_crypto64bit64:idsldap.clt_max_crypto64bit64.rte:6.4.0.10: : :C: :Directory Server - 64 bit Client (SSL): : : : : : :0:0:/: idsldap.cltbase64:idsldap.cltbase64.adt:6.4.0.10: : :C: :Directory Server - Base Client: : : : : : :0:0:/: idsldap.cltbase64:idsldap.cltbase64.rte:6.4.0.10: : :C: :Directory Server - Base Client: : : : : : :0:0:/: idsldap.license64:idsldap.license64.rte:6.4.0.10: : :C: :Directory Server - License: : : : : : :0:0:/:
List all users on LDAP, create users, groups. Up now don't forget to add in you commands: -R LDAP or -R files
As you can see in the following example if OpenLDAP if in order to use rfc2307aix, then it's validated in the AIX config: serverschematype=RFC2307AIX
[root@ldapclt]/root# mksecldap -c -h rhldaph1.mydom.lu -A ldap_auth -D ldap -d "dc=myldapdom,dc=tst" -a "cn=Manager,dc=myldapdom,dc=tst" -p ldapp@ssword -S rfc2307aix -u NONE [root@ldapclt]/root# ls-secldapclntd ldapservers=rhldaph1.mydom.lu current ldapserver=rhldaph1.mydom.lu ldapport=389 active connections=1 ldapversion=3 usercachesize=1000 usercacheused=1 groupcachesize=100 groupcacheused=0 usercachetimeout=300 groupcachetimeout=300 heartbeat interval=300 numberofthread=10 connectionsperserver=10 authtype=LDAP_AUTH searchmode=ALL defaultentrylocation=LDAP ldaptimeout=60 serverschematype=RFC2307AIX userbasedn=ou=people,dc=myldapdom,dc=tst groupbasedn=ou=groups,dc=myldapdom,dc=tst userobjectclass=posixaccount,account,shadowaccount,aixauxaccount,ibm-securityIdentities groupobjectclass=posixgroup,aixauxgroup [root@ldapclt]/root# ps -ef | grep ldap root 5767328 1 0 10:40:18 - 0:00 /usr/sbin/secldapclntd
List all users on LDAP, create users, groups. Up now don't forget to add in you commands: -R LDAP or -R files
[root@ldapclt]/root# lsuser -R LDAP ALL ldapuser1 id=6001 pgrp=grouptest1 groups=grouptest1 home=/home/ldapuser1 shell=/usr/bin/ksh login=true su=true rlogin=true daemon=true admin=false sugroups=ALL admgroups= tpath=nosak ttys=ALL expires=0 auth1=SYSTEM auth2=NONE umask=22 registry=files SYSTEM=compat logintimes= loginretries=5 pwdwarntime=5 account_locked=false minage=1 maxage=6 maxexpired=13 minalpha=2 minloweralpha=1 minupperalpha=1 minother=2 mindigit=0 minspecialchar=0 mindiff=2 maxrepeats=4 minlen=12 histexpire=13 histsize=24 pwdchecks= dictionlist= core_compress=on core_path=on core_pathname=/var/core core_naming=on default_roles= fsize=2097151 cpu=-1 data=262144 stack=65536 core=2097151 rss=65536 nofiles=2000 roles= [root@ldapclt]/root# mkgroup -R LDAP id=1 staff [root@ldapclt]/root# mkuser -R LDAP id=6002 pgrp=staff ldapuser2 [root@ldapclt]/root# lsuser -R LDAP ALL ldapuser1 id=6001 pgrp=grouptest1 groups=grouptest1 home=/home/ldapuser1 shell=/usr/bin/ksh login=true su=true rlogin=true daemon=true admin=false sugroups=ALL admgroups= tpath=nosak ttys=ALL expires=0 auth1=SYSTEM auth2=NONE umask=22 registry=files SYSTEM=compat logintimes= loginretries=5 pwdwarntime=5 account_locked=false minage=1 maxage=6 maxexpired=13 minalpha=2 minloweralpha=1 minupperalpha=1 minother=2 mindigit=0 minspecialchar=0 mindiff=2 maxrepeats=4 minlen=12 histexpire=13 histsize=24 pwdchecks= dictionlist= core_compress=on core_path=on core_pathname=/var/core core_naming=on default_roles= fsize=2097151 cpu=-1 data=262144 stack=65536 core=2097151 rss=65536 nofiles=2000 roles= ldapuser2 id=6002 pgrp=staff groups=staff home=/home/ldapuser2 shell=/usr/bin/ksh93 auditclasses=general,SRC,cron,tcpip login=true su=true rlogin=true daemon=true admin=false sugroups=ALL admgroups= tpath=nosak ttys=ALL expires=0 auth1=SYSTEM auth2=NONE umask=22 registry=files SYSTEM=compat logintimes= loginretries=5 pwdwarntime=5 account_locked=false minage=1 maxage=6 maxexpired=13 minalpha=2 minloweralpha=1 minupperalpha=1 minother=2 mindigit=0 minspecialchar=0 mindiff=2 maxrepeats=4 minlen=12 histexpire=13 histsize=24 pwdchecks= dictionlist= core_compress=on core_path=on core_pathname=/var/core core_naming=on default_roles= fsize=2097151 cpu=-1 data=262144 stack=65536 core=2097151 rss=65536 nofiles=2000 roles=
Change AIX default behaviour, to user LDAP authentification by default except for root, make home dir at first login…
[root@ldapclt]/root# chsec -f /etc/security/user -s default -a registry=LDAP [root@ldapclt]/root# chsec -f /etc/security/user -s default -a SYSTEM=LDAP [root@ldapclt]/root# chsec -f /etc/security/login.cfg -s usw -a mkhomeatlogin=true [root@ldapclt]/root# chdev -l sys0 -a max_logname=256 [root@ldapclt]/root# chdev -l sys0 -a ngroups_allowed=2048
AIX LDAP config files and schema are stored in /etc/security/ldap/, /etc/security/login.cfg , and /etc/security/user
[root@ldapclt]/etc/security/ldap# cat ldap.cfg | grep -v '^#' | sed '/^$/d' ldapservers:rhldaph1.mydom.lu binddn:cn=Manager,dc=myldapdom,dc=tst bindpwd:{DESv2}DA483A108C643477D2B2F192 7C07C1AAE512FB8325B81B6 authtype:ldap_auth useSSL:no userattrmappath:/etc/security/ldap/2307aixuser.map groupattrmappath:/etc/security/ldap/2307aixgroup.map userbasedn:ou=people,dc=myldapdom,dc=tst groupbasedn:ou=groups,dc=myldapdom,dc=tst userclasses:posixaccount,account,shadowaccount,aixauxaccount,ibm-securityIdentities groupclasses:posixgroup,aixauxgroup ldapport:389 searchmode:ALL defaultentrylocation:LDAP serverschematype:rfc2307aix [root@ldapclt]/etc/security/ldap# ll total 396 4 drwxr-xr-x 2 root security 4096 Oct 20 10:58 . 4 drwxr-x--- 12 root security 4096 Oct 19 00:17 .. 4 -rw-r----- 1 root security 2973 May 19 16:41 2307aixgroup.map 8 -rw-r----- 1 root security 7863 May 19 16:41 2307aixuser.map 4 -rw-r----- 1 root security 2598 Apr 18 2010 2307group.map 4 -rw-r----- 1 root security 3429 Aug 23 2010 2307user.map 120 -rw-r----- 1 root security 122375 Jun 07 12:10 aixSchemaForAD.ldif 52 -rw-r----- 1 root security 50385 Jun 07 12:10 aixSchemaForNS5.ldif 4 -rw-r----- 1 root security 2852 May 19 16:41 aixgroup.map 4 -rw-r----- 1 root security 2837 May 25 2010 aixid.map 8 -rw-r----- 1 root security 7515 May 19 16:41 aixuser.map 12 -rw------- 1 root security 12102 Oct 20 10:58 ldap.cfg 4 -rw-r--r-- 1 root system 1 Jun 21 2011 ldap.cfg.SS 12 -rw------- 1 root system 11573 Oct 20 10:58 ldap.cfg.save 12 -rw------- 1 root system 11573 Oct 20 10:58 ldap.cfg.save.orig 4 -rw-r----- 1 root security 1567 Sep 21 2009 ldapid.ldif.template 28 -rw-r----- 1 root security 25523 Feb 19 2008 nisSchema.ldif 4 -rw------- 1 root security 3893 Sep 21 2009 proxy.ldif.template 52 -rw-r----- 1 root security 52063 Jun 07 12:10 sec.ldif 4 -rw-r----- 1 root security 2294 Apr 23 2009 sectoldif.cfg 4 -rw-r----- 1 root security 2495 May 25 2010 sfu20group.map 4 -rw-r----- 1 root security 2933 May 25 2010 sfu20user.map 4 -rw-r----- 1 root security 2781 May 25 2010 sfu30aixgroup.map 8 -rw-r----- 1 root security 7634 May 17 2011 sfu30aixuser.map 4 -rw-r----- 1 root security 2503 Aug 23 2010 sfu30group.map 4 -rw-r----- 1 root security 3005 Aug 23 2010 sfu30user.map 4 -rw-r----- 1 root security 2739 May 25 2010 sfur2aixgroup.map 8 -rw-r----- 1 root security 7611 May 17 2011 sfur2aixuser.map 4 -rw-r----- 1 root security 2390 May 25 2010 sfur2group.map 4 -rw-r----- 1 root security 2853 May 25 2010 sfur2user.map
The password algorithm user to encrypt the USER's password in LDAP is defined in the LDAP client configuration. If you change the the the password algorithm (parameter: ibm-slapdPwEncryption in ibmslapd.conf), it has no effect on encryption!
On the client, edit the file /etc/security/ldap/ldap.cfg and change the parameter pwdalgorithm
pwdalgorithm:system
Then change the password algorithm used to encrypt password with the command (file: /etc/security/login.cfg)
chsec -f /etc/security/login.cfg -s usw -a pwd_algorithm=ssha512
Algorithm supported on AIX are: crypt (default), smd5, ssha1, ssha258, ssha512, sblowfish
Now restart the ldap client, and try to change the password:
/usr/sbin/restart-secldapclntd
[root@ldapclt]/root# ps -ef | grep sec root 12386516 1 0 10:58:40 - 0:00 /usr/sbin/secldapclntd
Before the change:
root@tstbcp - /etc/security > /usr/sbin/lsldap -a passwd testuser uid: testuser ... userpassword: {crypt}3pqRiHBWWjDNU
After:
root@tstbcp - /etc/security > echo "testuser:testuser" | chpasswd -R LDAP -c root@tstbcp - /etc/security > /usr/sbin/lsldap -a passwd testuser uid: testuser ... {ssha512}06$hedp1Ro5Rcmx.Sbi$X5qt.m0f6vsztKA2HBS3q9e2K98fceb92gEiuuzh7TCYoAQMFbo6mPZHk/AwGNsh8RRQWmVhPXjoO1CLseZi..