<div dir="ltr">Great! Thanks very much Simo.<br></div><div class="gmail_extra"><br><br><div class="gmail_quote">On Tue, May 27, 2014 at 3:02 PM, Simo Sorce <span dir="ltr"><<a href="mailto:simo@redhat.com" target="_blank">simo@redhat.com</a>></span> wrote:<br>
<blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div class="HOEnZb"><div class="h5">On Tue, 2014-05-27 at 14:24 -0300, tizo wrote:<br>
> On Mon, Jan 13, 2014 at 1:24 PM, Petr Spacek <<a href="mailto:pspacek@redhat.com">pspacek@redhat.com</a>> wrote:<br>
><br>
> > On 13.1.2014 15:50, Alexander Bokovoy wrote:<br>
> ><br>
> >> On Mon, 13 Jan 2014, tizo wrote:<br>
> >><br>
> >>> Hi there,<br>
> >>><br>
> >>> We have a working authentication system for GNU/Linux consisting in a Mit<br>
> >>> Kerberos Server, and an OpenLDAP directory with a particular structure. I<br>
> >>> was wondering if we could use Freeipa to administer those working<br>
> >>> components as they are, without having to deploy a new Freeipa server<br>
> >>> from<br>
> >>> scratch.<br>
> >>><br>
> >> In short, no, it is not possible.<br>
> >><br>
> ><br>
> > I would like to elaborate this a bit more:<br>
> > You really can't use FreeIPA WebUI with home-grown LDAP+Kerberos system,<br>
> > but FreeIPA provides migrate-ds scripts which ease the transition from<br>
> > OpenLDAP.<br>
> ><br>
> > Please see<br>
> > <a href="http://docs.fedoraproject.org/en-US/Fedora/18/html/FreeIPA_" target="_blank">http://docs.fedoraproject.org/en-US/Fedora/18/html/FreeIPA_</a><br>
> > Guide/Migrating_from_a_Directory_Server_to_IPA.html<br>
> ><br>
> > You need to migrate OpenLDAP data to one FreeIPA server and then you can<br>
> > simply create FreeIPA server replicas as need.<br>
> ><br>
> > In other words, the migrate-ds script is run only once even if you have<br>
> > multiple servers with replicated data.<br>
> ><br>
> > There are some limited capabilities for migration with user passwords, but<br>
> > I will let other people to elaborate - this is not area of my expertise.<br>
> ><br>
> > Let us know if you need any assistance during migration.<br>
> ><br>
> > --<br>
> > Petr^2 Spacek<br>
> ><br>
><br>
> I had discarded the Freeipa option, as we couldn't use our OpenLDAP server<br>
> and Kerberos as they were. Now, I am thinking that could be very useful for<br>
> us (because of another reason), but I have a question about it. In short:<br>
> can Freeipa internal LDAP server be used as any other LDAP server?.<br>
><br>
> In detail: we have some Java applications that use authentication against<br>
> our actual OpenLDAP server. The LDAP authentication is used in this case,<br>
> with an overlay for password policies (as in<br>
> <a href="http://www.openldap.org/doc/admin24/overlays.html#Password%20Policies" target="_blank">http://www.openldap.org/doc/admin24/overlays.html#Password%20Policies</a>). The<br>
> users that would use Freeipa are a subset from the users that use the Java<br>
> applications. So, I would like that, at least at first, users from Java<br>
> applications continue authenticating as they are doing now. I don't know if<br>
> that can be done, and I have never worked with 389 directory service, so<br>
> any help is appreciated.<br>
<br>
</div></div>FreeIPA uses a full LDAPv3 compliant LDAP server called 389ds:<br>
<a href="http://port389.org" target="_blank">http://port389.org</a><br>
<br>
It allows LDAP binds and extensions to schema just like any other fully<br>
featured LDAP server.<br>
<span class="HOEnZb"><font color="#888888"><br>
Simo.<br>
<br>
--<br>
Simo Sorce * Red Hat, Inc * New York<br>
<br>
</font></span></blockquote></div><br></div>