Environment
Novell Open Enterprise Server (Linux based)
Novell eDirectory
FreeRADIUS
Novell eDirectory
FreeRADIUS
Situation
This document describes the configuration alterations neccesary to
enable FreeRADIUS to handle encrypted authentication requests, such
as 802.1x (EAP), and MS-CHAP-V2 protocols.
*** NOTE - This document assumes that FreeRADIUS has already been configured to authenticate against LDAP. If this is not the case, please consultTID 3003857on the steps to accomplish this task. ***
*** NOTE - This document assumes that FreeRADIUS has already been configured to authenticate against LDAP. If this is not the case, please consultTID 3003857on the steps to accomplish this task. ***
Resolution
- Ensure that Universal Password is installed - this can be identified by checking the
schema in ConsoleOne (Schema Manager -> Attributes) or DSBROWSE
(Schema Browse -> Attribute Definitions) for the existence of
nspmPassword and nspmPasswordKey attributes, or by the existence of
the "Password Policies" in the "Passwords" role for
iManager
- Using iManager, open the role for "Passwords"
- Select the password policy used by the RADIUS users
- Click "Edit"
- On the Password Policy web page, there will be a drop down with"Summary" listed - change this to "ConfigurationOptions"
- Under "Universal Password Retrieval", place a check mark in"Allow admin to retrieve passwords"
- Click "Apply"
- On the FreeRADIUS server, edit the /etc/raddb/clients.conf file, and add the 802.1X switch as a client
- Create the necessary dictionary files the switch/access point will require in the /etc/raddb/dictionary file
- Open the /etc/raddb/radiusd.conf file
- Locate the LDAP configuration (just search for the "ldap {" section)
- Set the server to an appropriate LDAP server for eDirectory (usually a master Directory Services server)
- Set the identity to an administrative account (e.g. cn=admin,o=novell) - this is a requirement for retrieval of the Universal Password
- Set the password for the above specified account
- Set the Base DN to the container from which FreeRADIUS will start looking for users
- Comment out the "start_tls = yes" and add a "tls_mode = yes"
- Add a "port = 636" setting. (This and the previous options are designed to force the entire connection over SSL/TLS, another requirement for retrieving the nspmPassword* attributes)
- Set the "password_attribute" option to "nspmPassword"
- Set the "edir_account_policy_check" option to "yes"
- Locate the "authorize {" section in the same file
- Uncomment the "ldap" option in there
- Locate the "authenticate {" section
- Uncomment the "Auth-Type LDAP" section (3 lines)
- Open the /etc/raddb/users file
- Add any VLAN/Tunnelling/Default attributes you wish returned to the radius client (configured in step 9)
- Restart radiusd (/etc/init.d/radiusd stop && /etc/init.d/radiusd start)
- Test the authentication
Additional Information
In order to handle 802.1x authentication, FreeRADIUSmustbe able to obtain access to
the plain-text password. This can only be done under the
following circumstances :
- The "identity" must be an admin user account.
- The flag for allowing admin user accounts to retrieve the universal password must be set (in the password policy).
- The connectionMUSTstart on port 636 with SSL
encrypted LDAP (also referred to as "ldaps"). Starting on the
clear-text port and switching to TLS mode doesnotsatisfy eDirectories
requiremends on obtaining the universal password.
Change Log
Wed Feb 12 13:55:50 MST 2014 - Rance Burker updated Link 7014552