[gpfsug-discuss] AD-based authentication with LDAP ID mapping

Jonathan Buzzard jonathan.buzzard at strath.ac.uk
Mon Mar 16 13:44:34 GMT 2026


I have some questions on this because the documentation referenced below 
is as clear as mud.

https://www.ibm.com/docs/en/storage-scale/5.2.3?topic=access-configuring-ad-based-authentication-ldap-id-mapping

Firstly what permissions does the LDAP account need? Is it sufficient 
for the account to only have read permissions? Specifically for security 
purposes we have a special read only account on the LDAP server for SSSD 
and would prefer to reuse that. Or is it pulling SID's from the AD and 
storing them in LDAP so needs write permission?

Secondly I have a question about the ID mapping range. It is entirely 
unclear what the ID mapping range should be. Reading around by looking 
at the examples it would appear that it should be the range of UID/GID's 
for which the LDAP server is authoritative?

Thirdly is it possible to specify more than one AD and/or LDAP server? 
So for example for the AD server specify say ad.mycorp.com which will 
return a bunch of IP address for all the AD servers we have. Similarly 
can I use ldap.mycorp.com which will return a couple of IP addresses for 
the 389-ds cluster we have. Clearly specifying just one creates a single 
point of failure which is far from ideal.

My random thought for the day would be to offer AD for authentication, 
leave it up to the user to provide a UID/GID service of their choice on 
the protocol servers whether it be LDAP, NIS, Hesiod etc. and then use 
idmap_nss to provide the mapping to SID's.


JAB.

-- 
Jonathan A. Buzzard                         Tel: +44141-5483420
HPC System Administrator, ARCHIE-WeSt.
University of Strathclyde, John Anderson Building, Glasgow. G4 0NG



More information about the gpfsug-discuss mailing list