OpenLDAP – Graylog LDAP Integration

This entry is part 5 of 8 in the series Openldap Tutorial

In this section we will cover Graylog LDAP Integration. We have enabled the necessary modules & overlays that are required for this integration in the previous section of this series. Now that we have the configurations ready, we need to start adding the entries as per the structure planned in the previous post.

Add Entries 

GRAYLOG DIT - UPDATED

 

We need to create the entries depicted in the diagram. Since we already saw how to make changes using LDIF files and ldap commands, let’s do this using phpldapadmin this time.

Login to your phpldapadmin dashboard using http://<hostname>/phpldapadmin. You can refer this article to know more about phpldapadmin.

Once logged in, in the left hand side, you can see the Directory structure with entries. You’ll see a container for password policy (ou=pwpolicies) with entries in it created already. We created this entry while enabling ppolicy overlay in the previous article.

Graylog LDAP - 1

Create containers ( ou=people,ou=group )

First let us create a container for People (ou=people).

1)  Click ‘Create new entry here‘ link available directly below the suffix ( dc=devopsideas,dc=com ) to add an entry.

 

Graylog LDAP - 2

2) Next, select ‘Oraganization Unit‘ for template (objectClass).

Graylog LDAP - 3

 

3) Give a name for the container (people in this case) and click ‘Create Object’,

Graylog LDAP - 4

4) Click ‘commit’ button

Graylog LDAP - 5

5) Click ‘Update’ to make the changes.

Graylog LDAP - 6

 

You’ll see the OU getting created. Follow the same steps and create the other container ‘ou=group’

 

Repeat the above steps for creating the second container ou=group

 

Create user entries for ou=people node

Next we need to add entries to the container created above. We’ll be adding two user’s, chris.sam and aron.francis

1)  Click the container ou=people and select ‘Create a child entry’. Make sure you are under the right DN

Graylog LDAP user - 1

 

2) Select default in the template section

Graylog LDAP user - 2

3) Select ineOrgPerson for objectClass and click Proceed.

 

4) Select cn for RDN and enter values for cn, sn, givenName, password and click ‘Create Object’

Graylog LDAP user - 4

Graylog LDAP user - 5

Graylog LDAP user - 6

Graylog LDAP user - 7

 

5) You’ll be asked for confirm, click ‘commit’

Graylog LDAP user - 8

6) You can find the object getting created under ou=people,dc=devopsideas,dc=com DN.

Graylog LDAP user - 9

 

Repeat the above  steps for creating the other user.

 

Create groups for Graylog

We still need to create an entity for graylog within ou=group,dc=devopsideas,dc=com and two entries representing graylog groups. We will be creating two entries for graylog group, graylog_dev and graylog_admin.

This time we will do this using LDIF file.

We will first create sub-container ou=graylog within the container ou=group,dc=devopsideas,dc=com. Create a file called subou.ldif and copy the below content

dn: ou=graylog,ou=group,dc=devopsideas,dc=com
objectClass: organizationalUnit
ou: graylog
description: Graylog groups

Implement the change by running the below command,

ldapadd -W -Z -D cn=admin,dc=devopsideas,dc=com -f subou.ldif

Next, we will create the group for graylogs. Create a file named graylog_group.ldif and copy the below content.

dn: cn=graylog_admin,ou=graylog,ou=group,dc=devopsideas,dc=com
objectclass: groupOfNames
cn: graylog_admin
description: Graylog Admin Group
member: cn=chris.sam,ou=people,dc=devopsideas,dc=com

dn: cn=graylog_dev,ou=graylog,ou=group,dc=devopsideas,dc=com
objectclass: groupOfNames
cn: graylog_dev
description: Graylog Dev Group
member: cn=aron.francis,ou=people,dc=devopsideas,dc=com

Note that the objectClass we used here is groupOfNames. This objectClass is used for entries that represent a group that will hold members. As part of creating this entry we are adding members to it. chris.sam is added as part of graylog_admin and aron.francis is added as part of graylog_dev group.

Important: The memberOf is a dynamic attribute meaning that we need to manually load the module to use it. Every group created before this module is enabled has to be deleted and remade in order for these changes to take effect. Refer this article to know more about memberOf overlay and how to enable it.

Implement this change by running the below command,

ldapadd -W -Z -D cn=admin,dc=devopsideas,dc=com -f graylog_group.ldif

 

Let us verify if the changes are made by viewing phpldapadmin.

You’ll see the graylog group getting created as shown below.

Graylog LDAP group - 1

 

You’ll also see users in the member attribute.

 

Graylog LDAP group - 2

 

Create serviceid for Graylog

Similar to the user entry, create a service id for binding graylog under ou=service_ids node. We are yet to create the service_ids container. Create a file named serviceou.ldif with the below content

dn: ou=service_ids,dc=devopsideas,dc=com
objectClass: organizationalUnit
ou: service_ids
description: Group for Service ids

Run the below command to create the container,

ldapadd -W -Z -D cn=admin,dc=devopsideas,dc=com -f serviceou.ldif

Create a file named serviceid.ldif with the below content

dn: cn=serviceid,ou=service_ids,dc=devopsideas,dc=com
cn: serviceid
givenName: Service ID
sn: id
uid: serviceid
objectClass: top
objectClass: inetOrgPerson
objectClass: person
userPassword: {SHA}qUqP5cyxm6YcTAhz05Hph5gvu9M=

The password hash can be created as below,

$ slappasswd -h {SHA} -s <password>
{SHA}qUqP5cyxm6YcTAhz05Hph5gvu9M=

Make a note of this password since we will use in LDAP configuration in Graylog.

Create the serviceid entry by running the below command,

ldapadd -W -Z -D cn=admin,dc=devopsideas,dc=com -f serviceid.ldif

 

If you recollect, we have set a separate password policy for service id’s and we need to apply that for this id. Create a file named serviceid_ppolicy.ldif with the below content.

dn: cn=serviceid,ou=service_ids,dc=devopsideas,dc=com
changetype: modify
add: pwdPolicySubentry
pwdPolicySubentry: cn=servicePasswordPolicy,ou=pwpolicies,dc=devopsideas,dc=com

Run the below command,

ldapmodify -W -Z -D cn=admin,dc=devopsideas,dc=com -f serviceid_ppolicy.ldif

The serviceid DN will now have ‘cn=servicePasswordPolicy,ou=pwpolicies,dc=devopsideas,dc=com’ as its password policy definition.

 

We have everything in place now for integrating Graylog with LDAP. Let’s do it

 

Graylog LDAP Integration

This article explains just the integration of Graylog with LDAP. Installation and configuration of graylog is beyond the scope of this article. Please refer Centralized logging using Graylog for more on that.

 

1)  Login  into Graylog Dashboard as admin and click Administrator–>Edit Profile

Graylog LDAP - graylog - 1

 

2) Select LDAP / Active Directory

Graylog LDAP - graylog - 2

 

3) Enable the ‘Enable LDAP’ checkbox. In the Server Configuraiton, pass in the IP or Domain Name of your LDAP host. Enable StartTLS and Allow self-signed certificates. In ‘System Username’ pass in the service id (cn=serviceid,ou=service_ids,dc=devopsideas,dc=com) which we created earlier for binding.  System Password should be the password of servicd id.

Graylog LDAP - graylog - 3

 

4) Test Server Connection. If everything goes fine, you’ll get ‘Connection to server was successful’

Graylog LDAP - graylog - 4

 

5) In User mapping,

Search Base DN : ou=people,dc=devopsideas,dc=com. This indicates where the search will start from. 

User Search Pattern: (&(objectClass=inetOrgPerson)(cn={0})). This search will filter for entry having objectClass as inetOrgPerson and id passed in the login page

Display Name attribute: givenName. This will be used for displaying the user name in the top right corner of the dashboard

Graylog LDAP - graylog - 5

 

6) In group mapping, we will be using filters to retrieve the group and map it with graylog roles.

Group Search Base DNou=graylog,ou=group,dc=devopsideas,dc=com. This denotes from where the search will start.

Group Search Pattern(&(objectClass=groupOfNames)(cn=graylog*)). This pattern uses the AND condition to retrieve the entries that has a groupOfNames as objectClass and the cn’s that starts with graylog. So this will retrieve both the groups we created ( graylog_admin & graylog_dev )

Group Name Attribute: cn . This will be the attribute used for mapping the LDAP group with Graylog roles.

Graylog LDAP - graylog - group

 

7) Login Test

Test your configuration by passing in username and password of an LDAP user. Your connection will succeed if your configuration is flawless. You’ll see all the details related to the user.

Graylog LDAP - graylog - 6

 

8) Save the LDAP configuration

 

9) In the same page, click ‘LDAP Group Mappings’

Graylog LDAP - graylog - 7

 

10) You’ll see graylog retrieving the group names we specified in LDAP.

Graylog LDAP - graylog - groupmap - 1

 

11) Map the roles with the corresponding group. In this case we will map graylog_admin to Admin role and graylog_dev to Reader rolea and click save.

Graylog LDAP - graylogmap - 2

 

Verification:

We have completed Integrating graylog with LDAP for authentication.  You can verify it by logging in as one of the LDAP user who’s part of the graylog group.

We’ll

test the admin user chris.sam

Graylog LDAP - verification - 1

Once logged in, you’ll see the full user name in the top right corner ( we got this using ‘givenName’ attribute ). This user will have admin access since he’s part of graylog_admin group.

Graylog LDAP verification - 2

You can repeat the steps to test the other user who only has ‘Reader’ access since he’s part of graylog_dev group.

 

We’ve successfully completed Graylog LDAP Integration. Up next we will see how we can connect Linux clients to LDAP for authentication.

 

Series Navigation<< Planning of LDAP DIT Structure and Config of Overlays ( access, ppolicy )openLDAP – Linux Client LDAP Integration >>

DevopsIdeas

Established in 2016, a community where system admins and devops practitioners can find useful in-depth articles, latest trends and technologies, interview ideas, best practices and much more on Devops

Leave a Reply

Your email address will not be published. Required fields are marked *

4 + three =

Hello. Add your message here.
Any Udemy Technical course for $10 Redeem Offer