RHDS Design Workshop
RHDS Design Workshop
RHDS
Design Workshop
Muhammad Aizuddin Bin Zali(Din)
Kuala Lumpur, Malaysia
ASEAN Assoc. Principal Platform Consultant
1
AGENDA CONFIDENTIAL Designator
● Outcome:
○ Red Hat to provide design document for customer to review and sign-off.
2
AGENDA CONFIDENTIAL Designator
What we’ll be
RHDS Introduction
discussing
Data/DIT Design Discussion
● Planning the Directory Data
● Designing Directory Schema
● Designing Directory Tree
● Designing Directory Topology
3
CONFIDENTIAL Designator
4
Red Hat Directory Server 10 Hello World! CONFIDENTIAL Designator
2005
1996
Sources:
https://en.wikipedia.org/wiki/389_Directory_Server
CONFIDENTIAL Designator
6
Planning the Directory Data CONFIDENTIAL Designator
Data & DIT Discussion
● Discussion:
○ What information will be stored?
○ What information to be excluded?
○ Defining directory needs:
■ What kind of apps/user accessing the directory?
■ Where directory will get the data source (Data Master)?
● A data master is a server that is the master source of data.
8
CONFIDENTIAL Designator
9
Designing the Directory Schema CONFIDENTIAL Designator
Data & DIT Discussion
10
Designing the Directory Schema CONFIDENTIAL Designator
Data & DIT Discussion
objectClass: person
object distinguishedName:
dn: uid=bjensen,ou=people,dc=example,dc=com Schema for using
person objectClass
11
Directory Structure
CONFIDENTIAL Designator
CONFIDENTIAL Designator
13
Designing the Directory Tree CONFIDENTIAL Designator
Data & DIT Discussion
14
Designing the Directory Tree CONFIDENTIAL Designator
Data & DIT Discussion
15
CONFIDENTIAL Designator
16
Designing the Directory Topology CONFIDENTIAL Designator
Data & DIT Discussion
17
Designing the Directory Topology CONFIDENTIAL Designator
Data & DIT Discussion
18
Designing the Directory Topology CONFIDENTIAL Designator
Data & DIT Discussion
19
CONFIDENTIAL Designator
20
Designing the replication process CONFIDENTIAL Designator
Server Design Discussion
● Replication is the mechanism that automatically copies directory data from one Red Hat Directory
Server to another.
● In practical terms, replication provides the following benefits:
○ Fault tolerance and failover
■ By replicating directory trees to multiple servers
○ Load balancing
■ Replicating the directory tree across servers reduces the access load on any given
machine
● Planning replication:
○ What information to replicate.
○ Which servers hold the master copy, or read-write replica, of that information.
○ Which servers hold the read-only copy, or read-only replica, of that information.
○ What should happen when a read-only replica receives an update request; that is, to which
server it should refer the request.
○
● Unit of replication:
○ The smallest unit of replication is a database. An entire database can be replicated but not a
subtree within a database.
○ The replication mechanism also requires that one database correspond to one suffix. A suffix
(or namespace) that is distributed over two or more databases cannot be replicated.
● Multi-Master Replication:
○ In a multi-master replication environment, master copies of the same information can exist
on multiple servers.
○ Red Hat Directory Server supports a maximum of 20 master servers in any replication
environment, as well as an unlimited number of hub suppliers. The number of consumer
servers that hold the read-only replicas is unlimited.
23
Designing the replication process CONFIDENTIAL Designator
Server Design Discussion
● Replication Survey:
○ The quality of the LANs and WANs connecting different buildings or remote sites and the
amount of available bandwidth.
○ The physical location of users, how many users are at each site, and their usage patterns;
that is how they intend to use the directory service.
○ The number of applications that access the directory service and the relative percentage of
read, search, and compare operations to write operations.
○ The number and size of the entries stored in the directory service.
24
CONFIDENTIAL Designator
25
Performance Expectation CONFIDENTIAL Designator
Server Design Discussion
26
Server Version CONFIDENTIAL Designator
Server Design Discussion
● Current is RHDS 12
○ RHEL 8.x
○ Min 4 vCPU
○ Min 8GB of RAM
○ Min 120GB of OS storage
○ Min xxxGB of LDAP Data storage
○ Cockpit console available
27
Securing Directory CONFIDENTIAL Designator
Server Design Discussion
● Threats:
○ Unauthorized access
○ Unauthorized tampering
○ Denial of service
○ SSL
28
Securing Directory CONFIDENTIAL Designator
Server Design Discussion
○ Certificate-Based Authentication
■ An alternative form of directory authentication involves using digital certificates to
bind to the directory. The directory prompts users for a password when they first
access it. However, rather than matching a password stored in the directory, the
password opens the user's certificate database.
29
Securing Directory CONFIDENTIAL Designator
Server Design Discussion
● Password Policy
○ Max Failure
○ Password change after reset
○ Password Expiration
○ Password Syntax Checking
○ Password Length
○ Password Minimum Age
○ Password History
30
Securing Directory CONFIDENTIAL Designator
Server Design Discussion
● Database encryption
○ Do we require some attributes to be encrypted?
■ Special step required for import/export later due to encryption key.
● Securing connection
○ TLS - LDAPS
■ LDAPS
■ Cockpit HTTPS
○ Start TLS
○ SASL
31
Service Access CONFIDENTIAL Designator
Server Design Discussion
● Load balancer?
32
Backup & Restore CONFIDENTIAL Designator
Server Design Discussion
33
Migration from old directory server CONFIDENTIAL Designator
Server Design Discussion
34
Console Access CONFIDENTIAL Designator
Server Design Discussion
● LDAP CLI
● X11 Console (Require SSH X11 Forwarding and X11 capable client)
35
Monitoring CONFIDENTIAL Designator
Server Design Discussion
● In place monitoring?
● SNMP?
36
CONFIDENTIAL Designator
OPTIONAL SECTION MARKER OR TITLE
Thank you
Red Hat is the world’s leading provider of enterprise
linkedin.com/company/red-hat facebook.com/redhatinc
youtube.com/user/RedHatVideos twitter.com/RedHat
37