automated single login access to Novell storage resources

Slides:



Advertisements
Similar presentations
Implementing Tableau Server in an Enterprise Environment
Advertisements

Omni eControl. New Features in Version 2.x - Manage Mixed Networks: eDirectory, Active Directory, GroupWise, Exchange eControl Version 2.0 New Features.
Module 6: Configuring Windows XP Professional to Operate in a Microsoft Network.
Module 5: Configuring Access for Remote Clients and Networks.
Understand Virtualized Clients Windows Operating System Fundamentals LESSON 2.4.
Active Directory: Final Solution to Enterprise System Integration
Chapter 9 Chapter 9: Managing Groups, Folders, Files, and Object Security.
Network+ Guide to Networks, Fourth Edition Chapter 10 Netware-Based Networking.
6.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure.
Chapter Nine NetWare-Based Networking. Objectives Identify the advantages of using the NetWare network operating system Describe NetWare’s server hardware.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
Lesson 5-Accessing Networks. Overview Introduction to Windows XP Professional. Introduction to Novell Client. Introduction to Red Hat Linux workstation.
Exchange server Mail system Four components Mail user agent (MUA) to read and compose mail Mail transport agent (MTA) route messages Delivery agent.
Lesson 4-Installing Network Operating Systems. Overview Installing and configuring Novell NetWare 6.0. Installing and configuring Windows 2000 Server.
Hands-On Microsoft Windows Server 2003 Chapter 2 Installing Windows Server 2003, Standard Edition.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 8: Implementing and Managing Printers.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
Chapter 12 Reading assignment n From “Running Linux”, on reserve at PSU Main library (2-hour checkout) Chapter 1 (pages 1 through 41)Chapter 1 (pages 1.
Chapter 8: Network Operating Systems and Windows Server 2003-Based Networking Network+ Guide to Networks Third Edition.
Server 2008 Terminal Services and Remote Desktop Services Basic application access is possible without Citrix, and Server 2008 R2 adds on some key features.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 7 Configuring File Services in Windows Server 2008.
Macintosh Configuration Management Will Jorgensen 1.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 1: Introduction to Windows Server 2003.
Migrating your Novell Environment to Windows Server 2003 Steve Plank – Microsoft UK Darren Catterrall – Quest Software.
1 Chapter Overview Creating User and Computer Objects Maintaining User Accounts Creating User Profiles.
Purpose Intended Audience and Presenter Contents Proposed Presentation Length Intended audience is all distributor partners and VARs Content may be customized.
Overview of Active Directory Domain Services Lesson 1.
Section 6.1 Explain the development of operating systems Differentiate between operating systems Section 6.2 Demonstrate knowledge of basic GUI components.
Clinic Security and Policy Enforcement in Windows Server 2008.
MCTS Guide to Microsoft Windows Server 2008 Applications Infrastructure Configuration (Exam # ) Chapter Two Deploying Windows Servers.

1 Group Account Administration Introduction to Groups Planning a Group Strategy Creating Groups Understanding Default Groups Groups for Administrators.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
1 Guide to Novell NetWare 6.0 Network Administration Chapter 12.
1 Guide to Novell NetWare 6.0 Network Administration Chapter 13.
Module 10: Configuring Windows XP Professional to Operate in Microsoft Networks.
Home Media Network Hard Drive Training for Update to 2.0 By Erik Collett Revised for Firmware Update.
Microsoft Active Directory(AD) A presentation by Robert, Jasmine, Val and Scott IMT546 December 11, 2004.
5 Chapter Five Web Servers. 5 Chapter Objectives Learn about the Microsoft Personal Web Server Software Learn how to improve Web site performance Learn.
1 Chapter Overview Using the New Connection Wizard to configure network and Internet connections Using the New Connection Wizard to configure outbound.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 1: Introduction to Windows Server 2003.
Module 11: Implementing ISA Server 2004 Enterprise Edition.
GroupWise.AdvisorEvents.com Welcoming iFolder to the GroupWise Family Danita Zanrè Caledonia Gregg Hinchman Hinchman Consulting Danita Zanrè Caledonia.
Riva Managed Identity Integration for Active Directory and Novell ® GroupWise ® Aldo Zanoni CEO, Managing Director Omni Technology Solutions
1 Introduction to Microsoft Windows 2000 Windows 2000 Overview Windows 2000 Architecture Overview Windows 2000 Directory Services Overview Logging On to.
1 Administering Shared Folders Understanding Shared Folders Planning Shared Folders Sharing Folders Combining Shared Folder Permissions and NTFS Permissions.
Section 11: Implementing Software Restriction Policies and AppLocker What Is a Software Restriction Policy? Creating a Software Restriction Policy Using.
Module 3 Configuring File Access and Printers on Windows 7 Clients.
PLANNING A MICROSOFT EXCHANGE SERVER 2003 INFRASTRUCTURE Chapter 2.
Purpose Intended Audience and Presenter Contents Proposed Presentation Length Intended audience is all distributor partners and VARs This would be presented.
April-June 2006 Windows Hosting Seminar Series Technical Labs.
Module 7: Implementing Security Using Group Policy.
Integrating Active Directory with eDirectory ™ Using Novell Account Manager Reid Oakes Technical Team Manager Novell, Inc.
Microsoft Virtual Academy Preparing for the Windows 8.1 MCSA Module 5: Managing Devices & Resource Access.
Introduction to Active Directory
1 Overview of Microsoft Windows 2000 Multipurpose OS Reduces total cost of ownership (TCO)
Module 8 Implementing Security Using Group Policy.
Automating Installations by Using the Microsoft Windows 2000 Setup Manager Create setup scripts simply and easily. Create and modify answer files and UDFs.
Chapter Nine NetWare-Based Networking. Objectives Identify the advantages of using the NetWare network operating system Describe NetWare’s server hardware.
Managing Servers Lesson 10. Skills Matrix Technology SkillObjective DomainObjective # Using Remote DesktopPlan server management strategies 2.1 Delegating.
Microsoft Installing & Configuring Windows Server Exam Questions Answers Powered By:
Windows interoperability with Unix/Linux
Create setup scripts simply and easily.
Overview of Active Directory Domain Services
A Network Operating System
File System Implementation
Active Directory Administration
Objectives Differentiate between the different editions of Windows Server 2003 Explain Windows Server 2003 network models and server roles Identify concepts.
To Join the Teleconference
Presentation transcript:

automated single login access to Novell storage resources Kanaka for Mac 2.1 Providing Mac OS X automated single login access to Novell storage resources Doug Ouzts Technical Trainer douzts@condreycorp.com

Agenda Current Novell and Mac Integration Challenges Kanaka for Mac 2.1 Overview Kanaka for Mac 2.1 Technical Architecture Kanaka for Mac 2.1 Requirements Interactive Training

Integration Challenges Between Apple and Novell Developing software for Mac environments has not been a priority with Novell Client software is either nonexistent or out of date. Integration tends to be workarounds rather than solutions The problem is, actually integrating Macs in Novell networks. Developing software for Mac environments has not been a priority with Novell And Client software is either nonexistent or out of date. So customers are having to come up with workaround integration scenarios that are extremely complex to learn and configure. I will go over examples of these in the next few slides.

Complex to Configure Manually Configure for simple or universal password in the eDirectory tree Ensure AFP or CIFS is installed and configured Ensure that each Mac can resolve server’s host name Edit SSL certificate on each Mac Extend eDirectory schema Verify extended schema eDirectory first has to be configured for simple or universal password. Then you need to make sure that either that the Apple Filing Protocol or CIFS is installed and configured on the network. It’s at Step 3 where everything starts getting hard. To ensure that each Mac can resolve the server’s host name, you need to go to each Mac and create a local host line in the /etc/hosts You then need to edit the SSL certificate on each Mac. This is a lengthy process of entering new lines and deleting existing lines in each Mac’s certificate. Steps 3 and 4 can be made simpler if there is a methodology in place for imaging Mac OS X. To extend the schema, you can use iManager or ConsoleOne, but this is slower, so the instructor recommended using ldap command-line tools. You then check the schema through iManager, ConsoleOne or LDAP.

Complex to Configure Manually (cont.) Extend user objects Create mount volumes for each volume you want to access Configure each Mac to authenticate to eDirectory Set additional preferences in eDirectory User objects are extended in ConsoleOne, iManager, or LDAP through a complex command line. Mount volume objects involve first creating a container to store them, then using ConsoleOne, iManager, or LDAP to create mount objects for each server volume. You then need to go back to each Mac and, based on which Mac OS version is running, dig around and configure the LDAPv3 plug-in, manually create and edit a new LDAP connection, set up search and mappings, add LDAP v3 to the search policy, and test it. You then need to extend or create other objects as needed (such as Groups). Then you need to set additional preferences in eDirectory where needed. The disclaimer at the bottom is somewhat true because when the instructor demonstrated this, it failed to work. Provided you put in all of the time to learn to understand and perform each step, this approach might work.

Manual Configuration Requires On-going Configuration As users are added, moved, renamed, or removed, the extended user object needs reconfigured When a new Mac is added, one half of these steps must be repeated If a home directory path is moved, the mount objects need to be updated Now, assuming this does work, this configuration must be maintained and partially re-configured when users are added, moved, renamed or removed. By just adding a new Mac, you need to do many of the previous steps. And if you move a home directory, which is very common, you need to modify the mount objects.

What about the “Magic Triangle Configuration”? Capability of integrating Mac client system and two differing directories to provide the information for both login and management. Tips for doing so are scattered among Mac “Tips & Tricks” documents, forum discussions, and Apple Open Directory Admin Guide. Significant investment in time to learn and then implement. The term “Magic Triangle” comes up a lot when talking about manual configuration between Mac OS X, Apple Open Directory, and another directory such as Novell eDirectory or Microsoft Active Directory. Again, this is a very complex process that frankly, involves more time to learn, and deploy than the previous 10-step outline I just went over.

Why Make Things More Complex than They Have to Be? The way we look at it, why make things more complex than you have to. The simple solution for integrating your Macs in Novell networks is already out there, and it will save you hours of configuration and ongoing management time.

Simplified Integration with Kanaka Configure simple or universal password in the eDirectory tree Ensure AFP or CIFS is installed and configured Install the Kanaka Engine Run the Setup Wizard Install Kanaka on workstations Login and access storage resources Kanaka for Mac reduces the complexity by automating many of the configuration steps I covered earlier. Once you configure for simple or universal password in eDirectory and ensure that AFP or CIFs is installed and configured, you install the Kanaka Engine on a host server, run the Setup Wizard and configure storage resources and access policies. Next you install the Kanaka client or plugin on the Mac workstations, and then login as a Novell eDirectory user and access your storage resources.

Developed with Apple Directory Services Engineering Group Onsite cooperative engineering effort in 2005 Close developer association with Apple Apple Developer Connection member since 2005 Kanaka is recommended by Apple as a preferred solution for integrating Macs and Novell networks Kanaka was developed with the cooperative assistance from the Apple Directory Services Engineering Group. Condrey Corporation maintains a strong relationship with this group, and the group is so pleased with the result that they tend to recommend Kanaka to their customers that need integration with Novell networks.

How Kanaka Works Authentication and storage access through Kanaka is quite simple because Kanaka is an identity-based product. Users authenticate to eDirectory through either the Kanaka Plug-in or the Kanaka Desktop Client. The Plug-in has no interface. The user just enters his or her username and password in the Mac OS X login window. Where Kanaka, through eDirectory and the attributes stored for that user, determines user and collaborative storage resources to mount. For example, if the user has a home directory and is a member of groups with storage on multiple volumes, Kanaka finds these and mounts them for access from the Mac desktop. The process is the same for the Kanaka Desktop Client except the user authenticates through the specific Desktop Client login window.

Single Password Login Options Kanaka Plug-in: Simultaneous authentication to eDirectory during Mac login Mounts all user and group storage Kanaka Desktop Client: Client login authentication to eDirectory Both of these authentication and access methods are single password, contextless login methods and auto-mounts all user and group storage

Kanaka Plug-in Authentication Single Novell Simple or Universal password login. Home directory and collaborative storage attributes retrieved. Converts attributes into URL format for OS X to mount storage. URL can be AFP or CIFS. Checks to see if eDirectory authentication is required to gain access to the desktop. Here is the process for authenticating through the Kanaka Plug-in. Item 4 is an item that you can enable or disable based on the needs of your users.

Kanaka Desktop Client Authentication Single Novell Simple or Universal password login. Home directory and collaborative storage attributes retrieved. Converts attributes into URL format for OS X to mount storage. URL can be AFP or CIFS. The authentication process for the Kanaka Desktop Client is even simpler.

Why Two Authentication Methods? Kanaka Plug-in Users in a computer lab setting Mac OS X 10.4 users Kanaka Desktop Client Users with assigned workstations and local accounts Users who do not want to go through the Login Window to access network storage resources Users who do not want to lose their workstation settings when accessing network storage resources Mobile users who frequently work at home and connect through VPN Prior to Kanaka for Mac 2.0, the only authentication and access method we offered was the Kanaka Plug-in. This method was great for Mac users in computer labs, or for people that kept their Macs in the office and always wanted to mount their Novell storage whenever they logged in. But many of our users were workstation users who didn’t want to lose their workstation settings when accessing Novell storage areas, or were laptop users on the road who wanted the ability to mount Novell storage through VPN and only when needed. For these users, the Kanaka Desktop Client is probably a better option for single password authentication and access.

Identity Determines User and Collaborative Storage Resources Home directory and collaborative storage links built dynamically at login Group membership automatically mounts associated group storage No machine dependency for accessing storage No need to remember location of storage No need to traverse from root of a volume down to a user’s storage No need to visit each machine to manually mount volumes Like all of Condrey Corporation developed products, Kanaka leverages the power of identity built into directory services—in this case, Novell eDirectory. Identity, not login scripts, is the means of determining what storage a user has rights to and what to mount for the user once authenticated. Identity means that there is no machine dependency for accessing storage, no need to remember the location of storage to mount, no need to traverse down a file path to mount storage, and no need to configure this mounting on a workstation basis.

The Players eDirectory Mac OS X Apple Filing Protocol Following context-less, single login, used by Kanaka to determine user and collaborative storage resources. Mac OS X Initiates login process. Causes Kanaka Plug-in to authenticate to eDirectory and retrieve necessary user information. Apple Filing Protocol After Kanaka determines home and collaborative storage attributes, AFP can be used to mount volumes. Novell Native File Access Receives control structures from OS X. Eliminates need to log in to multiple servers. CIFS/SMB After Kanaka determines home and collaborative storage attributes, CIFS/SMB can be used to mount volumes. Apple Open Directory Kanaka integrates with Apple Open Directory to extend management of Mac OS X via Workgroup Manager. Kanaka utilizes a lot of players to make single password authentication and simplified access to Novell storage resources possible. I’ve mentioned eDirectory’s identity attributes already. AFP and CIFS/SMB are the standard protocol types that Kanaka converts home and collaborative storage attributes to so that they can be used for mounting via NFAP protocols. Kanaka utilizes some of the client capabilities built into Mac OS X for authentication. Novell Native File Access enables single password login and mounting of volumes via supported protocols. Apple Open Directory via Workgroup Manager provides added Mac OS X management features.

Mounting Home and Group Storage Network resources are displayed on the desktop. Home directory and group storage mounts on the Dock or in the Mac Finder. Once authenticated, storage is mounted and can be configured to be accessed right from the Mac Dock. Here you see network resources, along with a home and group storage directories mounted.

Kanaka Mobility Leverages Apple’s Mobile Account feature Provides Mac network and local login Flexibility to configure mirroring so that network home directory and local home directory always contain same data Capable of reducing network traffic and network home directory quotas By supporting Mac OS X Mobile Accounts, the Kanaka Plug-in allows you to set-up an environment that reduces the amount of traffic on your network compared to that of Network Accounts. In lab environments, mobility provides the capability to login to Mac OS X even if there is a network interruption.

Kanaka Plug-in Console Allows for the user to manage his or her eDirectory password. The Kanaka Plug-in Console is available only when using the Kanaka Plug-in. One of the capabilities it provides to end users is the ability to change their eDirectory passwords.

Kanaka Plug-in Console (cont.) Displays identity information from Novell eDirectory. It also provides the ability for the user to view some of the identity information stored about the user in eDirectory. Here you can even see information on when the eDirectory password is going to expire.

Kanaka Plug-in Console (cont.) Indicates storage capacity and usage. The Kanaka Plug-in Console can also display storage capacity and usage data for a home directory or a group storage area.

Enhancements to Kanaka 2.1 No NetWare dependencies Kanaka Engine can be hosted on either a Novell Open Enterprise Server 2 Microsoft Windows Server 2008 or Windows 7 Improved management capabilities Improved support for extended characters and object names The most notable enhancement to Kanaka 2.1 is the elimination of NetWare as the host for the Kanaka Engine. The Kanaka Engine now runs on either Novell Open Enterprise Server 2 or Microsoft Windows Server 2008 or Windows 7 host. There are some improvements in the management capabilities including an updated management interface. Managing license consumption no longer requires stopping and restarting the Kanaka Engine. Instead, you can pick and choose which workstations consume a license. And there is improved support for extended characters and object names.

Technical Architecture and Requirements Kanaka for Mac 2.1 Technical Architecture and Requirements

Architecture Mac Windows / OES 2 eDirectory OS X Kanaka Engine Context-less Authentication Auto-mount Storage Resources User Group OS X eDirectory Windows / OES 2 MCX Directives Password Change Disk Quota Kanaka Engine Kanaka Client <HTTPS> Policy Kanaka Plug-In OES 2 NetWare <AFP/CIFS/SMB> MCX Open Directory Workgroup Manager

Kanaka Requirements Engine Desktop Client / Plug-In Linux Windows Open Enterprise Server 2 (OES 2) SP2 or later Windows OS Requirement Windows Server 2008 or later Windows 7 or later Novell Client 2 SP1 IR4 or later Desktop Client Mac OS X 10.5 or later Plug-In Mac OS X 10.4 or later Plug-In Console

Kanaka 2.1 Prerequisites Kanaka clients leverage eDirectory and Native File Access (NFA) technologies from Novell, therefore, the configuration of these components is prerequisite to the installation and configuration of the Kanaka client software on Mac OS X. Please reference the Kanaka Admin guide for more information on configuring NFA and Password Management

Product Web Page http://www.condreycorp.com

Interactive Training Exercises

Questions and Answers Q & A