[Info-vax] : AUTHORIZE Enhancement

Stephen Hoffman seaohveh at hoffmanlabs.invalid
Mon Nov 28 22:27:41 EST 2016


On 2016-11-29 01:41:33 +0000, Kerry Main said:

> I would agree .. enterprise authentication must be capable of providing 
> SSO (single sign-on) and resource management (group policies etc.) 
> across many clustered/non-clustered systems and the industry standard 
> approach to do this for the last 2 or 3 decades has been with 
> enterprise directories / LDAP.

Single sign-on is certainly part of — but in aggregate also more than a 
few years behind — what folks are presently using LDAP for.   
Mechanisms akin to cluster-wide logical names, user mail server 
information for message routing and delivery, user contact and 
organizational information, per-user applications and preferences and 
language settings, user and group access controls and server and server 
group default security settings, all manner of details are now commonly 
stored in the directory.   Think of what is in Mail or DEC Notes and 
various other applications for preferences, but rationalized and 
centralized across all the applications and available across the entire 
organizational network.   Yes, the existing OpenVMS LDAP authentication 
support works and is reliable, though with a singularly and hilariously 
awful configuration interface, with cryptic diagnostics and debugging 
when something goes weird or when the directory doesn't quite match up 
with expectations, and — until recently, and this is thankfully now 
fixed – involved two entirely different implementations of LOGINOUT 
(and with related messages such as “To change between the frameworks of 
LOGIN and ACMELOGIN the installation of the LOGINPLUS kit will need to 
be reinitiated.”)

> Most here may be familiar with MS's Active Directory and the concept of 
> "local" accounts and "domain" accounts.
> 
> Think of sysuaf as the "local" account and the LDAP account as the 
> "domain" account.

As far as that goes, sure.   But what OpenVMS provides locally and what 
OpenVMS uses within LDAP is a very small fraction of the capabilities, 
and of what other systems already implement and use.    In short, 
"local" LDAP authentication can mean something that's rather more 
integrated and rather capable and rather more extensible than — and 
that completely replaces — the accreted morass of OpenVMS 
authentication, and the pile of files involved in a cluster.   For the 
systems I'm commonly dealing with — I am not familiar with how 
Microsoft Windows has implemented its local authentication — local 
authentication and the rest is just LDAP running locally and without 
LDAP server — or running with a self-hosted LDAP server — and is not 
operating significantly differently from how those same systems operate 
when bound to external directory servers running on other hosts.

> After implementing an enterprise directory, where most customers are 
> headed is adding IdM (Identity Management) which adds additional layers.

OpenVMS is not going to implement Enterprise Directory services.   
Sure, OpenVMS can load and run Enterprise Directory, but there's not 
going to be much customer interest in OpenVMS doing that and efforts in 
displacing Microsoft Windows Server and Active Directory from their 
central role in most organizations.   OpenVMS ceded that 
central-to-the-network position far too many years ago, and must now 
coexist with and interoperate with Active Directory or — for those 
sites using other LDAP servers — Open Directory or other services.  For 
those few sites that are solely OpenVMS, sure, load and use Enterprise 
Directory.   That service should be baked in anyway, so that local 
authentication can be migrated from the morass over to LDAP.

Third-party add-ons are not the future of OpenVMS services and 
integration.  They can be a good market for third-party providers and 
there are some excellent products available, but — like various other 
features that are now effectively table stakes in a server product – 
these and other capabilities need to be part of a baseline, integrated 
and expected and normal configuration within OpenVMS.  Always present, 
always running, it needs to be there and it needs to work.   Much like 
IP and TLS have become integral to any modern server operating system — 
OpenVMS unfortunately still treats far too many of these pieces as 
under- or un-integrated layered or add-on products, or depends on 
third-party extensions.   The morass of having to load and configure 
product dependencies, and for users and third-parties to code 
applications to figure out what's present and what's not is the way of 
pain and complexity and subtle errors and abject complexity.   Think of 
all the "fun" we've had over the years figuring out which IP stack is 
present, if any, within our documentation and our build procedures and 
management tools.  This complexity needs to end.

These capabilities — and more — are already part of systems that are 
available in the market.   This is not fantasy, not futurism and not 
even particularly difficult to do with some systems — I'm running all 
of this now, and have OpenVMS authenticating — though I'd prefer 
OpenVMS have much deeper integration — with Open Directory running on 
the servers.


-- 
Pure Personal Opinion | HoffmanLabs LLC 




More information about the Info-vax mailing list