Previous     Contents     Index     Next     
iPlanet Portal Server Administration Guide



Chapter 11   Maintaining iPlanet Portal Server


This chapter describes:

  • LDAP backup and restore

  • Setting up encrypted communications between the server and the gateway

  • Fixing known problems

  • Troubleshooting authentication problems



LDAP Backup and Restore

To save and/or restore the current LDAP database before or after re-installing the iPlanet Portal Server product, perform the following steps for both procedures as specified.



Note Use absolute path names to specify directory and file names.




LDAP Backup - Procedure 1

  1. From the command line, change the directory to the server installation directory:

    cd /opt/netscape/directory4/slapd-<host name>

  2. Run the following command to backup the LDAP database:

       db2bak <backup directory>


LDAP Restore - Procedure 1

  1. From the command line, change to directory to the server installation directory as shown in step 1 of "LDAP Backup - Procedure 1" on page 193.

  2. Run the following command to restore the backed up LDAP database:

       bak2db <backup directory>


LDAP Backup - Procedure 2

  1. From the command line, change directory as follows:

       cd /opt/netscape/directory4/slapd-<host name>

  1. Run the following command to back up the LDAP database:

       db2ldif <ldif file>


LDAP Restore - Procedure 2

  1. From the command line, change directory as follows:

       cd /opt/netscape/directory4/slapd-<host name>

  1. Run the following command to restore the backed up LDAP database:

       ldif2db -i <ldif file>



Setting Up Encrypted Communications Between Server and Gateway

SSL service is used for encrypted communication between the end user and the iPlanet Portal Server gateway, providing greater security for the flow of information between them.

SSL service requires an SSL certificate, which authenticates the user or server. You can use the self-signed certificate created during installation, or you can request and obtain a signed certificate from a Certificate Authority. You then add this certificate to the rp.keystore file (the certificate database) on the iPlanet Portal Server gateway.

When you installed the iPlanet Portal Server software, the system created and installed a self-signed SSL server certificate with a default validity of 365 days. At some point after installation, you might want to generate a new self-signed certificate; for example, you might want to change the information for the certificate you entered during the original installation.


To Generate a Self-Signed SSL Certificate on the Gateway

  1. Log in to the iPlanet Portal Server gateway as root.

  2. Run the certadmin script on the iPlanet Portal Server gateway:


    /opt/SUNWwt/bin/certadmin

    The Certificate Administration menu appears.

    :

    1) Generate Self-Signed Certificate
    2) Generate Certificate Signing Request (CSR)
    3) Add Root CA Certificate
    4) Install Certificate from Certificate Authority (CA)
    5) List Root CA Certificates
    6) Quit
    choice: [6]

  3. Type 1 to generate a self-signed certificate.

    The Certificate Administration script prompts for specific information about your organization and a pass phrase for the self-signed certificate:


    What is the fully qualified DNS name of this host? [hostname.domainname]
    What is the name of your organization? []
    What is the name of your organizational unit? []
    What is the name of your City or Locality? []
    What is the name of your State or Province? []
    What is the two-letter country code for this unit? []
    ...
    Enter passphrase []

  4. Type the information for your organization and a pass phrase for the self-signed certificate.

    The script generates a self-signed certificate with a validity of 365 days and adds it to the file /etc/opt/SUNWwt/rp.keystore on the iPS gateway.

  5. Stop and restart the reverse proxy server on the iPlanet Portal Server gateway for the certificate to take effect.

    See the procedure To Restart a Gateway or Server.

  6. Make a backup copy of the rp.keystore file.


Obtaining SSL Certificates From Vendors

After installation, you have the option to install SSL server certificates signed by vendors who provide official certificate authority (CA) services. iPlanet Portal Server software contains root certificates that can be used with SSL certificates from Verisign, Inc. If you decide to install an SSL certificate from a vendor other than Verisign, you must install a root certificate from that vendor first, and then install the web server certificate.

If you want to use an SSL certificate from a certificate vendor after you have installed the iPlanet Portal Server software, you must run the certadmin script to generate an SSL certificate signing request (CSR). The CSR is used to get an SSL certificate from a vendor.

Certificates are stored in the rp.keystore file. Once you generate a CSR, make sure you keep a backup copy of the rp.keystore file. This file contains your private key, which is associated with the certificate that you purchase. If you lose the file, you cannot use the certificate that you bought.


To Install SSL Certificates From Verisign

  1. Log in to the iPlanet Portal Server gateway as root.

  2. Run the certadmin script on the iPlanet Portal Server gateway:


    /opt/SUNWwt/bin/certadmin

    The Certificate Administration menu appears:

    :

    1) Generate Self-Signed Certificate
    2) Generate Certificate Signing Request (CSR)
    3) Add Root CA Certificate
    4) Install Certificate from Certificate Authority (CA)
    5) List Root CA Certificates
    6) Quit
    choice: [6]

  3. Type 2 on the Certificate Administration menu to generate a certificate signing request (CSR). Either of the following happens:

  4. If no self-signed certificate exists on this machine, the Certificate Administration script notifies you that you must create one.

  5. If a self-signed certificate exists on this machine, the information from the certificate appears. The Certificate Administration script asks if the information is correct.

    :

    Is this information correct (y/n)? [n]

  6. Do the either of the following:

  7. Type n if the information is not correct.

    If you type n, the script prompts for information for a new self-signed certificate. Fill in the information as requested.

  8. Type y if the information is correct.

    The script prompts for the name, email address, and phone number of the Web master of the machine for which the certificate is being generated:


    What is the name of the admin/webmaster for this server? []
    What is the email address of the admin/webmaster for this server? []
    What is the phone number of the admin/webmaster for this server? []

  9. Type the name, the email address, and the telephone number of the administrator or web master for this server.

    The certadmin script displays the values you typed and asks if the values are correct:


    Are these values correct (y/n)? [n]

  10. Type y if the information is correct, or n if it is not correct.

  11. If you type y, the program generates the CSR and stores it in the file /tmp/csr.hostname.

  12. If you type n, the certadmin script asks you to type the values again.

  13. Go to the certificate authority's web site and order your web server certificate.

    1. Provide information from your CSR, as requested by the CA.

    2. Provide any other information as requested by the CA, such as a pass phrase.

    3. Specify your web server type as: NES Webserver.

  14. After you receive your certificate from the CA, save it in a file.

    The certificate starts with the line:

    -----BEGIN CERTIFICATE----

    continues with the certificate itself, and concludes with the line:

    -----END CERTIFICATE-----

    Make sure you include both lines with the certificate in the file.

  15. Run the certadmin script on the iPlanet Portal Server gateway:


    /opt/SUNWwt/bin/certadmin

    The Certificate Administration menu appears:


    1) Generate Self-Signed Certificate
    2) Generate Certificate Signing Request (CSR)
    3) Add Root CA Certificate
    4) Install Certificate from Certificate Authority (CA)
    5) List Root CA Certificates
    6) Quit
    choice: [6]

  16. Type 4 to install your certificate from the CA.

    The Certificate Administration script asks for the path name of the file containing the certificate.

    :

    What is the name (including path) of the file that contains the certificate? []

  17. Type the full path to the file containing the certificate from the CA.

    The program stores your certificate in the file /etc/opt/SUNWwt/rp.keystore.

  18. Stop and restart the reverse proxy server on the iPlanet Portal Server gateway for the certificate to take effect.

    See the procedure To Restart a Gateway or Server.

  19. Make a backup copy of the rp.keystore file for the iPlanet Portal Server gateway.


To Install SSL Root Certificates

You must have already generated a self-signed certificate to install a root certificate.

  1. Go to the Certificate Authority's web site and download its root certificate.

    The web site should contain instructions for downloading the certificate, usually as a file.

  2. Become root on the gateway and run the certadmin script:


    # /opt/SUNWwt/bin/certadmin

    The Certificate Administration menu appears:


    1) Generate Self-Signed Certificate
    2) Generate Certificate Signing Request (CSR)
    3) Add Root CA Certificate
    4) Install Certificate from Certificate Authority (CA)
    5) List Root CA Certificates
    6) Quit
    choice: [6]

  3. Type 3 to add a root certificate from the CA.

    The script asks for the path name of the file containing the root certificate you want to add to the database.

    :

    What is the name (including path) of the file that contains the root certificate that you would like to add to your database? []

  4. Type the full path to the file containing the root certificate.

    The file appears and the certadmin script asks if the information is correct.

    :

    Is this information correct (y/n)? [n]

  5. Type y if the file is correct, or n if it is not.

  6. If you type y, certadmin stores the root certificate in the /etc/opt/SUNWwt/rp.CAstore file.

  7. If you type n, it does not add the root certificate.


To Install SSL Certificates From a Certificate Authority

  1. Log in to the iPlanet Portal Server gateway as root.

  2. Run the certadmin script on the iPlanet Portal Server gateway:


    /opt/SUNWwt/bin/certadmin

    The Certificate Administration menu appears:


    1) Generate Self-Signed Certificate
    2) Generate Certificate Signing Request (CSR)
    3) Add Root CA Certificate
    4) Install Certificate from Certificate Authority (CA)
    5) List Root CA Certificates
    6) Quit
    choice: [6]

  3. Type 4 on the Certificate Administration menu to install the certificate from the CA.

    The Certificate Administration script asks for the path name of the file containing the certificate:


    What is the name (including path) of the file that contains the certificate? []

  4. Type the full path to the file containing the certificate.

    The program adds your certificate to the /etc/opt/SUNWwt/rp.keystore file.

  5. Stop and restart the iPlanet Portal Server gateway for the certificate to take effect.

  6. Make a backup copy of the .rppass, rp.CAstore, and rp.keystore files for the iPlanet Portal Server gateway. If you ever need to restore a certificate, you can copy these three files back to /etc/opt/SUNWwt.

  7. Run the certadmin script on the iPlanet Portal Server gateway:


    # /opt/SUNWwt/bin/certadmin

    The Certificate Administration menu appears:


    1) Generate Self-Signed Certificate
    2) Generate Certificate Signing Request (CSR)
    3) Add Root CA Certificate
    4) Install Certificate from Certificate Authority (CA)
    5) List Root CA Certificates
    6) Quit
    choice: [6]

  8. Type 5 on the Certificate Administration menu to display all CA certificates installed.


Configuring Encrypted Communications on the Server

  1. Go to the NES administration console by typing the following URL:


    http://iPlanet Portal Server_server:8888

  2. Type the appropriate administrative ID and password you used during installation in the popup window.

  3. Click the Manage button in the frame on the right of the next window that appears.

    At this point, the system may warn you that the configuration has been manually edited and the resulting changes have not been loaded. If so:

    1. Dismiss the warning window.

    2. Click the Apply button in the upper right corner of the screen.

      If you are asked to undo the changes, choose to undo them and click Apply again.

    3. Choose Load configuration files.

      A popup window appears indicating that operation was successful.

    4. Click OK to dismiss this window.



      Note When given a choice, always load the configuration files. If you somehow save the current setup when none has been loaded (because the system does not load manual edits), you will overwrite the web server configuration, thus requiring that you reinstall the iPlanet Portal Server platform software. Read all the dialog boxes and be sure to choose to load the configuration files.



  4. Select the Security tab.

    The "Create a Trust Database" screen appears.

  5. Type a database password (twice), and click OK to create the database.

    A popup window appears indicating that operation was successful. Click OK to dismiss this window.

  6. Select "Request a certificate" on the navigation bar on the left side of the screen

  7. Type your email address in the "CA email address" field.

  8. Type the same password In the Key Pair File Password field that you typed in step 5.

  9. Type your name and telephone number and other data requested.

  10. Type the fully qualified name of the iPlanet Portal Server server (such as ipsserver.eng.sun.com) in the Common Name field.

  11. Click the OK button to generate a certificate signing request (CSR).

    At this point, the right frame contains your CSR. The CSR will also be mailed to the address you typed. You will need this CSR to request a certificate from the Certificate Authority (CA) you choose.

    NES has server CAs for most of the major vendors. You can view the installed server CAs, as well as any server certificates you have installed, by clicking on the Manage Certificates option in the navigation frame.

  12. After you receive your certificate, click the Install Certificate button in the navigation frame

    The certificate begins with the following line:

    -----BEGIN CERTIFICATE----

    continues with the certificate itself, and ends as follows:

    -----END CERTIFICATE-----

    Make sure you include both of these lines with the certificate in the file.

  13. Type your SSL pass phrase in the Key Pair File Password field,

    (Optional) If you have saved your certificate in a file, do either of the following:

  14. Type the file name in the Message in This File: field.

  15. Select the Message Text button and type the text in the text area.

  16. Click the OK button to install the certificate.

  17. Click the Add Server Certificate option when asked to confirm the addition of this certificate,

  18. (Optional) Click Manage Certificates and verify that your certificate has been installed.

  19. Dismiss the resulting popup window indicating the success of this operation.

  20. Click the OK button to dismiss the warning window.

    For now, ignore the warning about stopping and starting the server.

  21. Click the Preferences tab.

  22. Click the Encryption On/Off option in the navigation frame on the left.

  23. Type a port number in the Port Number field.



    Note This will be 443 if you requested SSL, or 8080 otherwise, unless you have specifically picked another port number during the installation of the server.



  24. Click the On button if you requested SSL to be used, during the install process.

    If a popup window asking for the server password appears, type anything for the password.

  25. Click the OK button to enable encryption on the web server.

    Ignore the warning about stopping and restarting the server. The changes to the configuration are saved, but the server will not be restarted. The server need not be restarted here.

  26. Choose the Save and Apply option when you see an error message confirming the changes to the configuration files

    At this point you see a message asking you to restart the web server. Do NOT restart from the administration console.

  27. Go to a terminal window and type:


    /etc/init.d/wtserver start [debug]


    Include the optional debug argument to confirm that the platform server is not running. This allows you to see two messages from NES, one confirming the startup of the administration console and the other confirming startup of the web server.

  28. Verify that the port is correct and that it is running on a URL that starts https://.... You will see an error message if the port number or URL is incorrect.

Remember to configure the gateway as directed in the iPlanet Portal Server Installation Guide.



Fixing Known Problems



Questions that arise during the installation, configuration, or operation of iPlanet Portal Server can include:

  • Browser issues involving the Netlet application

  • Platform debugging

  • Authentication Problems

  • Diagnosing and isolating problems related to authentication

  • What resources and advice for guidance with common issues

This section provides general guidelines and suggestions for these questions.


Browser Issues Involving the Netlet

After authenticating themselves, users occasionally receive the following message from the Netlet:


Netlet was unable to determine your browser proxy settings.
.
. See your network administrator for the correct setting.

This message appears if the user's browser has a proxy.pac file specified as the Proxy setting in the Preferences window. The Netlet cannot run with this setting.

To correct the problem, have the users set the proxies manually. They cannot use the automatic setup for proxies along with the Netlet.


Setting Platform Debugging

As Super Administrator, you can turn on platform-wide debugging by using the command line interface to modify value wtdebug in the file /etc/opt/SUNWips/platform.conf. By default, this value is set to off.

In order to see debugging on stdout, you must start the server with the command:

ipsserver start debug

To see debugging on the gateway, you must start the gateway with the command:

ipsgateway start debug

Possible values for debug are:

error=error debugging (bugs)

warning=warning debugging (also error)

message=message debugging (also error, warning for all applications)
on = all (error, warning, message) debugging to stdout (system.out)
off= debugging disabled

You can use wildcards for individual components only when output is to stdout. Debug levels are cumulative, warning displays error and warning, message displays error and warning message.

iwtAuth* turns on auth debugging only
iwtNetlet* turns on Netlet config debugging



Troubleshooting Authentication Problems

If you do not see the module that you have added as a choice on the login page, return to the Administration Console and confirm your Authentication Module settings at the platform and domain level.



Note If you encounter authentication problems that seem to be confined to interaction with the iPlanet Portal Server system or that prove difficult to reproduce or diagnose, use the following sections to manually start and test the authentication modules and helpers.




Modules with Helpers

The RADIUS, SafeWord, SecurID, S/Key, and UNIX authentication methods use both an iPlanet Portal Server Server authentication module and a separate helper process. These helpers communicate with their respective authentication modules over TCP ports. They accept connections originating only from the localhost, or the same system on which they are running. Once the helper successfully receives all its configuration information, it enters its normal authentication mode.

To manually test these authentication helpers, first be sure that the helper is not already running. These helpers reside in /opt/SUNWips/bin. For full debug logging, make sure the helper's debug log file exists, then start the helper with the -v (verbose) flag. Use the -c (port number) flag if the helper's default configuration port conflicts with some other process running on the iPlanet Portal Server Server system.

The helper's debug files are located in /var/opt/SUNWips/debug/auth, and are named radius_client.debug, safeword_client.debug, securid_client.debug, skey_client.debug, and unix_client.debug. For example, an easy way to create the RADIUS debug file is as follows:


# touch /var/opt/SUNWips/debug/auth/radius_client.debug

The SafeWord, RADIUS, UNIX, S/Key, and SecurID authentication modules also include a separate helper component with which the modules communicate over specified ports. At iPlanet Portal Server Server initialization, the helper components are brought up in listening mode on a configuration port. The respective authentication modules send configuration information retrieved from the Profile Server. After successfully receiving its configuration information, each helper component opens the port specified for its authentication requests.

Each of these authentication modules needs the following configuration attributes set before it can work properly:

  • Configuration port: where the helper receives configuration information (including the remaining attributes) from its respective authentication module

  • Authentication port: where the helper receives authentication requests

  • Session timeout: the maximum time in minutes that an authentication request may use for completion, from submission of the authentication parameters to resolution of the request (successful or unsuccessful)

  • Maximum number of concurrent authentication requests permitted for that authentication method

Other configuration information specific to each authentication method is passed during the configuration process.

Except for the Windows NT Authentication module, which uses ASCII input, all authentication modules in iPlanet Portal Server are internationalized.

After completing debug sessions and returning to production mode, remove the "-v" flag from any script used to start the helpers.


Debugging SafeWord


Starting Debugging Using the SafeWord Helper

To start the SafeWord helper, follow these steps:

  1. As root, enter the following:

    # touch /var/opt/SUNWips/debug/auth/safeword_client.debug

    # /opt/SUNWips/bin/doSafeWord -v

  2. In another terminal window, type

    % telnet localhost 8945

  3. The doSafeWord helper then requests the following configuration information:

    Enter SafeWord Helper Listen Port [7945]:

    Enter SafeWord Helper Session Timeout [5]:

    Enter SafeWord Helper Max Sessions [5]:

    Enter Domain Name:

    This domain has SafeWord enabled: [y]/n:

    Enter SafeWord Helper Logging Level [0]:

    Enter SafeWord Helper SafeWord Servername: <safeword_server_hostname>

    Enter SafeWord Helper SafeWord Server Port [7482]:

    Enter SafeWord Helper SafeWord System [STANDARD]:

    Enter SafeWord Helper Log Path [/var/opt/SUNWips/logs/safehelper/log]:

    More SafeWord Servers (y/[n]):

    ------end if no more servers------

    get_config_info: doSafeWord configured successfully

    Press the Enter key to accept the default value, shown in brackets, or enter the value you want to use. Default values are usually sufficient for debugging purposes. However, you must supply the Domain Name and the SafeWord Servername, which is the hostname of the system where the SafeWord server resides.

  4. The helper is now in normal authentication mode. It has opened port 7945 (the default) or whatever port you have specified, and is waiting for authentication requests. To test SafeWord authentication, type:

    % telnet localhost 7945

The following messages are sent by the doSafeWord helper when authenticating to the SafeWord server:

Enter iPlanet Portal Server Domain Name:

Enter m_UserID:

ChallengeText =

InputPrompt = Enter Gold/Platinum Password:

Authentication complete, user passed -- No problems

         or

Authentication complete, user failed -- Failed authentication

The iPlanet Portal Server Domain Name is the name entered during configuration. If multiple SafeWord servers are configured to the helper, enter the correct corresponding domain name.

The prompt for m_UserID is the same as an iPlanet Portal Server prompt for your SafeWord userid.

Gold and Platinum Passwords refer to various levels of SafeWord tokens.


Debugging SecurID


Starting Debugging Using the SecurID Helper

To start the SecurID helper, follow these steps:

  1. As root, enter the following:

    # touch /var/opt/SUNWips/debug/auth/securid_client.debug

    # /opt/SUNWips/bin/doSecurid -v

  2. In another terminal window, type:

    % telnet localhost 8943

  3. The doSecurID helper then requests the following configuration information:

    Enter SecurID Helper Listen Port [7943]:

    Enter SecurID Helper Session Timeout [5]:

    Enter SecurID Helper Max Sessions [5]:

    Enter Webtop Domain Name:

    This domain has SecurID enabled? [y]/n:

    Enter Config Path for Server #0 [/opt/ace/data]:

    Enter User Config Path for Server #0 [/opt/ace/prog]:

    More SecurID Servers (y/[n]):

    get_config_info: doSecurID configured successfully

    Press the Enter key to accept the default value, shown in brackets, or enter the value you want to use. Default values are usually sufficient for debugging purposes.

    Since the doSecurID helper supports multiple ACE/Servers, you supply the directories where the corresponding sdconf.rec files are located. Although the User Config Path may not be used, it should be both specified and exist.

  4. The helper is now in normal authentication mode. It has opened port 7943 (the default) or whatever port you have specified, and is waiting for authentication requests. Return to local control by typing:

    % telnet localhost 7943

The following messages are sent by the doSecurID helper when authenticating to the SafeWord server:

Enter iPlanet Portal Server domain name:

Enter SecurID login:

Enter passcode:

Authentication passed

      or

Access denied

The "iPlanet Portal Server domain name to use" is the same as enforced for this domain combination during configuration.


Debugging RADIUS


Starting Debugging Using the RADIUS Helper

To start the RADIUS helper, follow these steps:

  1. As root, enter the following:

    # touch /var/opt/SUNWips/debug/auth/radius_client.debug

    # /opt/SUNWips/bin/doRadius -v

  2. In another terminal window, type

    % telnet localhost 8944

  3. The doRadius helper then requests the following configuration information (default values are shown in brackets):

    Enter Radius Helper Listen Port [7944]:

    Enter Radius Helper Session Timeout [5]:

    Enter Radius Helper Max Sessions [5]:

    get_config_info: doRadius configured successfully

    You can press the Enter key at each prompt to use the default value, or you can supply your own values. The default values are usually sufficient for debugging purposes.

  4. The helper is now in normal authentication mode. It has opened port 7944 (the default) or whatever port you have specified, and is waiting for authentication requests. To test RADIUS authentication, type:

    % telnet localhost 7944

  5. The doRadius helper sends the following messages when authenticating to a RADIUS server:

    Enter Radius login:

    Enter password:

    Enter server 1:

    Enter server 2:

    Enter shared secret:

    Enter server port:

    Authentication passed

         or

Access denied for userid ...

You must supply the appropriate login, password, name for server 1, and shared secret. Supplying a name for server 2 is optional; press Enter to skip server 2. Note that if two RADIUS servers are specified, the shared secret is still the same. Press Return to use the default RADIUS server port (1645).

  1. The doRadius helper sends the following messages when authenticating to a SafeWord RADIUS server:

    Enter Radius login:

    Enter password:

    Enter server 1:

    Enter server 2:

    Enter shared secret:

    Enter server port:

    CHALLENGE_MSG:

    Enter Challenge Response:

    Access challenge passed

         or

Access challenge failed for userid ...

  1. The doRadius helper sends the following messages when authenticating to an ACE/Server RADIUS server:

    Enter Radius login:

    Enter password:

    Enter server 1:

    Enter server 2:

    Enter shared secret:

    Enter server port:

    Authentication passed

         or

Access denied for userid ...

  1. The doRadius helper sends the following messages when authenticating to an ACE/Server RADIUS server in an authentication session that includes "next token mode":

    Enter Radius login:

    Enter password:

    Enter server 1:

    Enter server 2:

    Enter shared secret:

    Enter server port:

    CHALLENGE_MSG: (Wait for the tokencode to change, then enter the new tokencode)

    Enter Challenge Response:

    Access challenge passed

         or

Access challenge failed for userid ...

  1. The doRadius helper sends the following messages when authenticating to an ACE/Server RADIUS server in an authentication session that includes "new PIN mode":

    Enter Radius login:

    Enter password:

    Enter server 1:

    Enter server 2:

    Enter shared secret:

    Enter server port:

    CHALLENGE_MSG: A new PIN is required. Do you want the system to generate your new PIN? (y/n):

    Enter Challenge Response: (enter N)

    CHALLENGE_MSG: Enter a new PIN between 4 to 8 digits:

    Enter Challenge Response:

    CHALLENGE_MSG: PIN accepted. Wait for the tokencode to change, then enter the new tokencode:

    Enter Challenge Response:

    Access challenge passed

         or

Access challenge failed for userid ...

The challenge messages for new PIN generation may vary, depending upon how the user is configured in the ACE/server.


Debugging Windows NT Primary Domain Controller


Configuring Windows NT Aliases

The iwtAuthNT-authAliases attribute is set on a per user basis through the Administration Console.


Manually Testing Windows NT Authentication

You can manually check if NT authentication is working from your iPlanet Portal Server by typing:

#/opt/SUNWips/bin/smbclient -w <workgroup> -l <host> -u <username>

%<password>

where you substitute the appropriate values for workgroup, host, username, and password. Make sure you have installed third party packages.


Debugging UNIX


Starting Debugging Using the UNIX Helper

To start the UNIX helper, follow these steps:

  1. As root, enter the following:

    # touch /var/opt/SUNWips/debug/auth/unix_client.debug

    # /opt/SUNWips/bin/doUNIX -v

  2. In another terminal window, type:

    % telnet localhost 8946

  3. The doUNIX helper then requests the following configuration information (default values are shown in brackets):

    Enter UNIX Helper Listen Port [7946]:

    Enter UNIX Helper Session Timeout [5]:

    Enter UNIX Helper Max Sessions [5]:

    get_config_info: doUNIX configured successfully

    Press the Enter key at each prompt to use the default value, or supply your own values. The default values are usually sufficient for debugging purposes.

  4. The helper is now in normal authentication mode. It has opened port 7946 (the default) or whatever port you have specified, and is waiting for authentication requests. To test UNIX authentication, type:

    % telnet localhost 7946

  5. The following messages are sent by the doUNIX helper when authenticating to a UNIX server:

    Enter UNIX login:

    Enter password:

    Authentication passed

         or

Access denied for userid xxx, return = dd


Debugging S/Key


Starting Debugging Using the S/Key Helper

To start the S/Key helper, follow these steps:

  1. As root, enter the following:

    # touch /var/opt/SUNWips/debug/auth/skey_client.debug

    # /opt/SUNWips/bin/doSKey -v

  2. In another terminal window, type

    % telnet localhost 8947

  3. The doS/Key helper then requests the following configuration information (default values are shown in brackets):

    Enter S/Key Helper Listen Port [7947]:

    Enter S/Key Helper Session Timeout [5]:

    Enter S/Key Helper Max Sessions [5]:

    get_config_info: doSKey configured successfully

    Press the Enter key at each prompt to use the default value, or supply your own values. The default values are usually sufficient for debugging purposes.

  4. The helper is now in normal authentication mode. It has opened port 7947 (the default) or whatever port you have specified, and is waiting for authentication requests. To test S/Key authentication, type:

    % telnet localhost 7947

  5. The following messages are sent by the doSKey helper when authenticating to a S/Key server:

    Enter SKey UUID:

    Enter PIN:

    Enter passphrase number dd::

    Authentication successful for UUID xxxxx, UNIX UserID xxxx

         or

Authentication unsuccessful for UUID xxxxx

         or

Authentication failed (UUID or PIN does not match)

Remember that the passphrases are case-sensitive and always all uppercase.


Previous     Contents     Index     Next     
Copyright © 2000 Sun Microsystems, Inc. Some preexisting portions Copyright © 2000 Netscape Communications Corp. All rights reserved.

Last Updated May 04, 2000