Research Administration Tasks: Difference between revisions

From Research
Jump to navigation Jump to search
 
(127 intermediate revisions by 6 users not shown)
Line 1: Line 1:
==Adding users==
== Finding Users ==
** As root on yamato, run {{Commandline | /usr/local/sbin/diradm.superadduser '$username' '$email' '$Fullname'}}
<br>
** Note that a file named '$username' is created in your current directory with the template filled out for mailing (the same file is displayed onscreen).
If you want to know if a user exists in the Research database, run the following command on any of the Linux servers (eg: sr-hood):<br>
** For now, we must:
* getent passwd |grep '''search-string'''
  export DEBUG=1
<br>
  DEBUG=1 /usr/local/sbin/diradm.superadduser ...
Where '''search-string''' is part of, or the entire, user name that you're searching for.<br>
** The password you are prompted for at the end is '''for hood'''
''Note: Not all entries have the user's full name (ie: first and last), so you may have to search for just part of the user's name.''
** Add the newly-created user to our [http://bismarck.iat.sfu.ca/mailman/admin/research/ Research Mailing List]
 
==Adding groups==
 
** As root on hood, diradm groupadd
== Adding Users ==
** same syntax as groupadd(8).
<br>
* Adding or removing users from a group
We try to align the research usernames with an existing SFU Computing ID.  This reduces confusion, and if the user chooses to also align their passwords, this gives the illusion of a single, seamless set of credentials across SFU / SIAT Research.
** same syntax as gpasswd(8)
 
** As root on hood, diradm gpasswd (-a|-d) USERNAME GROUP
However, about 50% of our research users are non-SFU people.  It is for this reason we run our own LDAP authentication server, and maintain our own users (as an aside, we also encrypt/store passwords in four different formats, which include suitable format for our SGI supercomputers, Linux workstations, Mac OS-X and two variations of Windows - this variety of password encryption is another reason we run local authentication).
==Adding projects==
 
** As root on hood: {{Commandline | diradm amadd -O $mapbase $key $src}}
For a non-SFU user, we create their username  by period-separating their first and last names:
** '-O' means the default mount options for automount.
'''Non-SFU''' userid creation:
** As root on yamato: create the $src directory now, and give it the approriate permissions. chgrp -R it, and chmod 2771 it.
** Make the directory. mkdir -p $src
'''firstname.lastname''' (for example:  ''john.doe'')
** Set ownership. chgrp -R $group $src
<br>
** Set permissions. chmod 2771 $src
* As root on '''spitfire''':
** If web content is being served: mkdir -p $src/htdocs ; chmod 2775 $src/htdocs  
# cd
# DEBUG=1 /usr/local/sbin/diradm.superadduser '$username' '$email' '$fullname'
* Note that a file named '$username' is created in your current directory with the template filled out for mailing (the same file is displayed onscreen), and this is why it is very important to 'cd' to root's home directory before running the script so as to not cause any problems with home-directory creation.
* Further note that $username is the new user's username (which will not be tied in with their regular SFU username), $email is their preferred email address and $fullname is their first and last name.
* An email will be sent to their email address
* Add the newly-created user to our [https://ponyexpress.iat.sfu.ca/mailman/admin/research/ Research Mailing List].
* '''Add the new user to '/etc/amanda/spitfire/disklist'. This is to enable backups of the user's home directory '''
 
== Deleting Users ==
Make sure there are no sym-links pointing to important stuff!!
# find -P /home/users/$username -noleaf  -type l
 
* As root on '''spitfire''':
  # DEBUG=1 diradm userdel -r $username
* As root on '''hood''':
# DEBUG=1 diradm userdel $username
* Keeping the user on our [https://ponyexpress.iat.sfu.ca/mailman/admin/research/ Research Mailing List] is probably a good idea.
* If you delete a user, you MUST disallow diradm from ever using that UIDNumber again. To do so, go to each machine with diradm and edit the diradm.conf file so that UIDNUMBERMIN to equal the same number as the highest UIDNumber currently being used. (At least one higher than the user you deleted) This is important!
* Comment out the user from /etc/amanda/spitfire/disklist, only if they will never need the data.
 
== Changing a Users Password ==
This method does not require the old password.
* As root on '''hood''':
# ldappass $username
 
== Adding Users to a Group ==
Adding or removing from a group. Uses the same syntax as gpasswd(8).
* As root on '''hood''':
# diradm gpasswd (-a|-d) $username $group
# diradm gpasswd -a mdeepwel pond
 
In addition, many users are added to a group in order to maintain and evolve related web-content.  In this case, we add a symlink in the user-home-directory, which points to the project/htdocs folder.  On any LDAP-enabled machine where logins are permitted (ie not hood), first make the symlink, then change the ownership (from root):
# cd /home/users/$user
# ln -s /home/projects/$project
# chown -h $user:$project /home/users/$user/$project
 
== Adding Groups ==
Adding groups takes the same syntax as groupadd(8).
* As root on '''hood''':
# diradm groupadd $groupname
 
To change the GID of any group:
* As root on '''hood''':
# diradm groupmod -g GID $groupname
 
== Adding Projects ==
This creates a project for the user, and adds a web folder, hosted via hercules00. If the user just wants places for their files, skip the htdocs and htlogs stuff, and skip all the hercules config.
=== For a single user ===
 
Note that '''$project''' designates the name of the new project and '''$user''' designates the user for whom the project is being created.
 
Create the new project directory:
* As root on '''hurricane''':
# mkdir /mnt/raid/projects/$project
# mkdir /mnt/raid/projects/$project/htdocs
# chown -R $user /mnt/raid/projects/$project
# chmod -R 2701 /mnt/raid/projects/$project
# chmod 2775 /mnt/raid/projects/$project/htdocs
# mkdir /mnt/raid/projects/$project/htlogs
# chmod 755 /mnt/raid/projects/$project/htlogs
 
 
Add an LDAP entry for the newly created project:
* As root on '''hood''':
# diradm amadd -O home.projects $project 209.87.56.231:/mnt/raid/projects/$project
# '-O' means the default mount options for automount.
 
Create a sym-link in the user's home directory
* As root on whatever you want:
# cd /home/users/$user
# ln -s /home/projects/$project
 
Next, to set the up the hosting and the database:
* As root on '''hercules00''' set up a new vhost.conf using an existing template:
# cd /etc/apache2/vhosts.d/projects/
# cat vhost_template.sample > $project.conf
 
'''TO DO - DATABASE HOWTO'''
 
Make sure you get Vic to add an alias!
 
=== For a group ===
 
Note that '''$project''' designates the name of the new project and '''$group''' designates the group for whom the project is being created.
 
First create a [[Research Administration Tasks#Adding Groups|new group]].
 
Create the new project directory:
* As root on '''hurricane''':
# mkdir /mnt/raid/projects/$project
# chgrp -R $group /mnt/raid/projects/$project
# chmod -R 2771 /mnt/raid/projects/$project
# mkdir /mnt/raid/projects/$project/htdocs
# chmod 2775 /mnt/raid/projects/$project/htdocs
# mkdir /mnt/raid/projects/$project/htlogs
# chmod 755 /mnt/raid/projects/$project/htlogs
 
Add an LDAP entry for the newly created project:
* As root on '''hood''':
# diradm amadd -O home.projects $project 209.87.56.231:/mnt/raid/projects/$project
# '-O' means the default mount options for automount.
 
Create a sym-link in the all the user's home directories (the users belonging to $group). To find out who is in what group, use the command getent group | grep $group on any ldap-enabled machine.
* As root on your LDAP-enabled machine of choice:
# cd /home/users/$user
# ln -s /home/projects/$project
 
Next, to set the up the hosting and the database:
* As root on '''hercules00''' set up a new vhost.conf using an existing template:
# cd /etc/apache2/vhosts.d/projects/
# cat vhost_template.sample > $project.conf
 
'''TO DO - DATABASE HOWTO'''
 
Make sure you get Vic to add an alias!
 
== Adding CVS Repositories ==
 
Note: $user represents a user's username, $group represents a new group that will need access to the repository, and $repository is the new name for the CVS repository.
 
=== For a single user ===
 
Add the user to the cvs group:
* As root on '''hood''':
# diradm gpasswd -a $user cvs


== Adding CVS repositories ==
Create the repository and set the correct permissions:
* On hood, run ''diradm amadd -O auto.cvs ${foobar} 209.87.56.240:/export/cvs/${foobar}''
* As root on '''hurricane''':
** Replace ''${foobar}'' with the name of the repository
# cvs -d /mnt/raid/cvs/$repository
* On yamato, run (assuming there's a previously created group called ''${foobar}'':
# chmod -R 2700 /mnt/raid/cvs/$repository
** ''cvs -d /export/cvs/${foobar} init''
# chown -R $user /mnt/raid/cvs/$repository
** ''chmod -R 2770 /export/cvs/${foobar}''
** ''chgrp foobar /export/cvs/${foobar}''
** The chgrp command can instead be a chown command for a single user repository; group name and cvs repository name don't have to match, either.
* To access CVS repo, use ''CVS_RSH="ssh"'' with URL being '':ext:${user}@cvs.iat.sfu.ca:/var/cvsroot/${foobar}''
* Users must be in group cvs in addition to ${foobar} to access the repository!


== Adding SVN repositories ==
=== For multiple users ===
* On hood, run ''diradm amadd -O auto.svn ${foobar} 209.87.56.240:/export/svn/${foobar}''
** Replace ''${foobar}'' with the name of the repository
* On yamato, run (assuming there's a previously created group called ''${foobar}'':
** ''chmod -R 2770 /export/cvs/${foobar}''
** ''chgrp foobar /export/cvs/${foobar}''
* On nelson, run ''svnadmin create /var/svnroot/${foobar} --fs-type fsfs''
* Repo URL is ''svn+ssh://${user}@cvs.iat.sfu.ca/var/svnroot/${foobar}''
* Users must be in group cvs in addition to ${foobar} to access the repository!


== General user management ==
Create a new group, and add all the users that require access to the newly created group as well as the cvs group:
** diradm offers almost all regular POSIX commands, sometimes with a few extra frills. The only commands NOT completely implemented are gpasswd and passwd.
* As root on '''hood''':
* Gentoo update procedures (eg, how to update without ever messing up a machine).
# diradm groupadd $group
** TODO
# diradm gpasswd -a $user $group
* Welcoming new users; email template or typical wording you've used
# diradm gpasswd -a $user cvs
 
Create the repository and set the correct permissions:
* As root on '''hurricane''':
# cvs -d /mnt/raid/cvs/$repository
# chmod -R 2770 /mnt/raid/cvs/$repository
# chgrp -R $group /mnt/raid/cvs/$repository
 
* To access the CVS repository, use ''CVS_RSH="ssh"'' with URL being '':ext:$user@cvs.iat.sfu.ca:/var/cvsroot/$foobar''
* See the more detailed [[HOWTO_Access_The_CVS_Server | CVS User guide]]
 
== Adding SVN Repositories ==
 
Note: $user represents a user's username, $group represents a new group that will need access to the repository, and $repository is the new name for the SVN repository.
 
=== For a single user ===
 
Add the user to the svn group:
* As root on '''hood''':
# diradm gpasswd -a $user svn
 
Create the repository and set the correct permissions:
* As root on '''hurricane''':
# svnadmin create /mnt/raid/svn/$repository --fs-type fsfs
# chmod -R 2700 /mnt/raid/svn/$repository
# chown -R $user:root /mnt/raid/svn/$repository
 
=== For multiple users ===
 
Create a new group, and add all the users that require access to the newly created group as well as the svn group:
* As root on '''hood''':
# diradm groupadd $group
# diradm gpasswd -a $user $group
# diradm gpasswd -a $user svn
 
Create the repository and set the correct permissions:
* As root on '''hurricane''':
# svnadmin create /mnt/raid/svn/$repository --fs-type fsfs
# chmod -R 2770 /mnt/raid/svn/$repository
# chown -R root:$group /mnt/raid/svn/$repository
 
* The repository URL is '''svn+ssh://$username@svn.iat.sfu.ca/$repository'''
 
== Dumping the contents of SVN Repositories to a file, and vice-versa ==
 
Note: $repository represents the repository's name.
 
To dump the contents to a file:
* As root on '''hurricane''':
# svnadmin dump /mnt/raid/svn/$repository > file.dump
 
To load the contents from a file into a previously created repository:
* As root on '''hurricane''':
# svnadmin load /mnt/raid/svn/$repository < file.dump
 
== Adding and Removing Computers to/from the Domain ==
* As root on '''hood''':
<font color=red>hood</font> <font color=blue>~ #</font> '''diradm smbhostadd sr-#####'''
* refer to [[Workstation_Naming_Convention]]
* The LDAP entry is case-sensitive.  Make sure it matches the machine's name.
* If you are adding a Windows 7 machine, it also requires a registry hack.  See '''Win7_Samba3DomainMember.reg''' under \\hurricane\software\windows.  It contains the following:
Windows Registry Editor Version 5.00<br><br>[HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\LanManWorkstation\Parameters]<br>"DNSNameResolutionRequired"=dword:00000000<br>"DomainCompatibilityMode"=dword:00000001
* To remove an LDAP entry, use '''smbhostdel''':
<font color=red>hood</font> <font color=blue>~ #</font> '''diradm smbhostdel sr-#####'''
* If you don't add the computer's name to ldap and its MAC to Men and Mice, the machine will not be able to connect to the Research domain.  This problem can also be verified by going into the command line and typing '''ipconfig /all'''.  If the domain name doesn't show as '''iat.sfu.ca''', then it is very likely that one or both of those two steps were skipped.
* We add machine to the Domain to facilitate Windows' operations; Unix/Linux/Mac don't care about machine entries.  You may want to verify machine-names (either present, or absent) - to check what Samba thinks about all accounts (user-accounts and machine-accounts):
<font color=red>hood</font> <font color=blue>~ #</font> '''pdbedit -L''' ''(note:  machine-accounts end in '''$''')''
 
== General User Management ==
* diradm offers almost all regular POSIX commands, sometimes with a few extra frills. The only commands NOT completely implemented are gpasswd and passwd.
* Welcoming new users; email template
** This is in the diradm.superadduser script, as it fills out the template.
** This is in the diradm.superadduser script, as it fills out the template.
<pre>
<pre>
From: help@siat.sfu.ca
To: $FULLNAME <$EMAIL>
To: $FULLNAME <$EMAIL>
Subject: Research account created - $NEWUSER
Subject: Research account created - $NEWUSER
Line 55: Line 237:
Hello $FULLNAME,
Hello $FULLNAME,


Your research account has been created.
Your SIAT Research account has been created:
Username: $NEWUSER
Username: $NEWUSER
Password: $NEWPASS
Password: $NEWPASS


Please visit http://research.iat.sfu.ca/network/changepassword.php to change
Please note that this username and password pair is only valid for the SFU Surrey
Research Network, and is NOT tied into the main SFU authentication systems.
 
Please visit https://research.iat.sfu.ca/network/changepassword.php to change
your password when you receive this email.
your password when you receive this email.


For support with the research network, please email:
For support with the research network, please email:
help@research.iat.sfu.ca
help@siat.sfu.ca
Please include a good description of the entire problem and a suitable subject
line.
 
More information about SIAT Research can be found on our Research Wiki:
https://research.iat.sfu.ca/wiki/
 
Our wiki also has information about how to connect to SIAT printers:
https://research.iat.sfu.ca/wiki/index.php?title=Printers
 
and the software that is available to researchers:
https://research.iat.sfu.ca/wiki/index.php?title=Research_Workstations_-_default_software_loads
 
 
Here are some cool ideas about the benefits of this SIAT Research account:
 
- you can log onto a SIAT Research workstation with your new account,
  and automatially have your U:\ drive connected, on any workstation
  you log onto!  This U:\ home-directory is held on a SIAT Research
  fileserver, and gets backed-up nightly.
 
- you can access your data, on our SIAT Research file-servers, from
  just about anywhere:
https://research.iat.sfu.ca/wiki/index.php?title=Accessing_Your_Data


And include a good description of the entire problem and a suitable subject
- we have a cloud service, which can let you access your data across
line.
  many different devices and locations; here is Owncloud:
https://research.iat.sfu.ca/wiki/index.php?title=Cloud-based_File_Storage
https://owncloud.iat.sfu.ca
 
- there are SVN and CVS servers available, for check-in/check-out and
  version control
 
- we can create shared "project" folders, which allows for collaboration
  and sharing among several people
 
 
If *YOU* have any ideas for services or features which may be useful,
please don't hesitate to let us know what you're thinking!  We can all
benefit from your ideas!


Please note that this username/password pair is only valid for the SFU Surrey
Welcome! Have fun!
Research Network, and is NOT tied into the main SFU authentication systems.
</pre>
</pre>
* quotas
** TODO


== Sassafras K2 Keyserver Administration ==
=== Background ===
We use the [http://www.sassafras.com Sassafras] K2 Keyserver product for most license-compliance, primarily to extend the usefulness of a small number of licensed applications within the School of Interactive Arts & Technology (SIAT) Researcher community.  Most users are sporadic, and don't require full-time access to our specialized applications; rather, they need to accomplish a defined task which may be one component of their research or publication.
<br>
The Sassafras keyserver runs on our Windows server, lancer.iat.sfu.ca.
<br>
We currently (2012) have 200 key-client licenses, which covers our current user-quantity, with some room for future growth.<br>
This keyserver serves licenses to Windows and Mac clients (only :-( ).<br>
<br> <br>
'''Old Information, Retained for Reference Purposes:'''
The Sassafras keyserver runs under Linux, on bismarck.iat.sfu.ca, with install-root under '''/usr/local/k2'''.<br>
In a process-listing, it shows up as:
  /usr/local/k2/ks -d -e /usr/local/k2/startup.txt<br>
It's started from an init-script under
  /etc/init.d/KeyServer
which, in turn, is launched upon startup by the Gentoo rc-update scripts.  No manual intervention is necessary (normally :-) ).<br>


==Customizing Logwatch==
=== Administration ===
There are two basic customizations which we often perform:
 
# increase the header-information with machine-specific info (hardware, admininstrator(s), usage, etc):
The main administration tool is the K2Admin program, which is capable of running under Windows, or Mac OS-X (only :-( No Linux).  When installed, you will have a program called, KeyConfigure.
# adjust the order of the information - we care very much about disk-usage, and prefer it ''first''
 
Here is the [[Media:K2Admin.dmg|Local Mac Copy]]<br>
And, the [[Media:K2Admin.exe|Local Windows Copy]]
==== Viewing Key-served Applications ====
 
Open up K2's KeyConfigure, the license administration software. When you do, you'll need to enter the following information:
 
* Server: research-keyserver.iat.sfu.ca
* Username: Administrator
* Password: ''secret''
 
Once open, you can see which Computers on the network are using what Software, what Software is running on what machine, and what Licenses are registered with the system.
<br> <br>
'''Old Information, Retained for Reference Purposes:'''
In the Licenses window, you will see the name of the application, as well as how many licenses are in use at that particular moment in time, how many people are waiting for a license to free up, and how many licenses we own (labeled as 'Limit').
 
Double clicking on the name of a key-served software application, will bring up more details about its use. You can change the name of the application or change the way it is being key-served. More importantly, you can see who is using the application and on what machine (Click on 'Current User List' or 'Computer List'), and you can also see what application and which version is registered with the particular license. To see this, expand the 'Programs' section.
 
==== Adding Key-served Applications ====
 
Before starting, you must be on a Mac or Windows PC that already has the software you'd like to add installed and working.
<br>
<br>
===Logwatch Headers===
You need three entries to support a new key-served application:
Use this template, to create '''/etc/log.d/custom_header''' (ASCII, plain-text file)
# '''Product'''<br>This is the product whose license we are trying to controlA product is made up of one or more programs.
Machine info:  Pentium4 2.4GHz, 1GB, GigE, 40GB+120GB, RivaTNT
# '''Program'''<br>This is the file, or files, associated with a particular product.
  Running RedHat 9 Linux
# '''Policy'''<br>Policies specify the type of license we have for a given product, and allow us to dictate how that product can be used (eg: maximum of 5 concurrent users).
  Located in Research Server Room A (Beta Space, Surrey Campus)
  Used by Davis Marques <dmarques@sfu.ca>
  Into service xxxRe-purposed Dec. 15, 2004
  Administered by Gordon Pritchard <gordonp+corsair@sfu.ca>
Another example:
Machine info:  Pentium4 dual-core 3GHz, 2GB, GigE, 80GB, ATI-R300-mobility
  Running Gentoo Linux
  Located in office  525 / The Axis (Beta Space, Surrey Campus)
  Used by Gordon Pritchard <gordonp+zero@sfu.ca)
  Into service September 6, 2005.
  Administered by Gordon Pritchard <gordonp+zero@sfu.ca>
<br>
<br>
To include this custom header, we now have to modify the main logwatch Perl script '''logwatch.pl''' to add the bold / red line:
Sassafras Keyserver version 7 supports other features but the three that were mentioned are all we need to control how software is run.
* on a RedHat 9 machine, this file is /etc/log.d/scripts/logwatch.pl
* on a Gentoo machine, this file is /usr/sbin/logwatch.pl
<br>
<br>
    $printing = 'y';
The basic process is:<br>
    print OUTFILE "\n ################### LogWatch $Version ($VDate) #################### \n";
# Make sure the program or programs that belong to your product exist, either in KeyServer's pre-made list of available programs, or in the audit report of programs.  Note: there is no way to manually create a new program.  The only way to create a new program entry is to install software on a machine that then gets audited, or to install it on your local machine and select it from the Browse dialog when you try to create a new program entry in KeyConfigure.
    print OUTFILE "      Processing Initiated: " . localtime(time) . "\n";
# Create a new product by right-clicking on the '''Products''' window and choosing '''New Product...'''.  In its program field, drag one or more programs from the '''Programs''' window into it.
    print OUTFILE "      Date Range Processed: $Config{'range'}\n";
# Create a new policy by right-clicking on the '''Policies''' windows and choosing '''New Policy...'''.  In its product field, drag the product from the '''Products''' window into it.
    print OUTFILE "    Detail Level of Output: $Config{'detail'}\n";
# The policy settings will usually look like this:<br>
    print OUTFILE "          Logfiles for Host: $Config{'hostname'}\n";
[[File:Sassafras-policy-config.jpg]]
    <font color=red>'''print OUTFILE "\n" . `/bin/cat $BaseDir/custom_header` . "\n";'''</font>
<br>
    print OUTFILE " ################################################################ \n\n";
''Detachable means that the program can be run even if the user has lost connection to the key server. If the program is a key server-specific version and requires Sassafras KeyServer to provide a key, then the Detachable setting will be ignored.''
}
<br>
===Logwatch Information Order===
<br>
The scripts locate in '''/etc/log.d/scripts/''' are run according to their file-name orderingSo, it's pretty easy to simply rename a file to change it's relationship to other informationSo, we would move '''zz-disk-space''' to '''aa-disk-space''' to have our disk-usage appear right after the custom header; as root:
Sometimes, we will get a keyserved version of a product that requires Sassafras Keyserver to be running and to serve up keys in order for that product to run.  In that case, the vendor will also provide us with a license file that gets stored in the KeyServer Data Folder (C:\Program Files\Sassafras K2\Server\KeyServer Data Folder) on Lancer.  When KeyServer is restarted, it will automatically generate the required entries to manage that product.
<br> <br>
'''Old Information, Retained for Reference Purposes:'''
Open KeyConfigure and go to File > Create License (or press Cmd+i on a Mac or Ctrl+i on Windows).
A new window will appear. Enter a License Name, usually the same as the Software name. Then click Browse, and find the App that you'd like to keyserve (on a Mac it's usually under Applications, on Windows in Program Files). Double click it.
 
Make sure you check off 'Allow launch when KeyServer not available' (this is the default) just in case something breaks on the server, so people can still use their software until it's fixed.
 
  Click OK. A new window with more details will come up. Expand the 'Limits' section by clicking on the small triangle, and choose 'Concurrent Use Limit (Floating License)', and under 'User Limit' enter the amount of licenses we own. Close the window, and make sure you 'Save'.''
 
==== Removing Key-served Applications ====
 
This is very easy. Once you open up KeyConfigure, select the Application you'd like to remove, and go to Edit > Delete (or click Cmd+delete on a Mac, or Delete on Windows).
 
==== Sassafras KeyServer (version 7.x) Documentation ====
http://www.sassafras.com/hrl/7.0/index.html
 
==== Sassafras KeyServer Error ====
 
'''Problem:'''<br />
When running the KeyVerify client, or when the keyserver tries to connect when launching a key served application,  you get an error saying that KeyServer has denied permission to log onto the server. "KA-180" might appear at the bottom of the dialog box.
 
'''Solution:'''<br />
This could mean that the Sassafras key server has used its maximum client capacity (in our case, it's 200). 
 
To confirm this, launch KeyConfigure.  You can get it from Sassafras, or from another page in this wiki: [[Research Administration Tasks]]
 
When you launch it, go to Window -> Computers.  You'll see a list of computers that tried to connect to the KeyServer.  In the left column, under '''Login''', you'll see a count of the '''Full''', '''Basic''', and '''Prohibited''' computers.  Chances are that '''Full''' and '''Basic''' add up to 200.  '''Prohibited''' shows the computers that were unable to get a connection to the server (probably because it was full). 
 
So, here's how to make roomIn that same window's right-side pane, sort all the computers by '''Last Session'''.  Then drag your selection to choose all computers whose last session was, say, more than 6 mos. ago.  Then click on your DELETE key.  This removes those computers from the key server's database.
 
Next, in the left column of the window, double-click on the '''Prohibited''' entry.  This will bring up a window showing the '''Prohibited''' computers.  You can either delete them all, or you can also double-click on the '''Full''' entry to open up another window showing computers that get full rights, and then drag the '''Prohibited''' selection into the '''Full''' window.
 
== Flexlm License Server Administration ==
 
 
== Working with LDAP ==
 
The options used in commands below do the following:
* -x: use simple authentication instead of SASL
* -f: use the file $file.ldif to read the changes to be made
* -D: bind-dn (user to bind with)
* -W: prompt for password
 
 
=== Searching LDAP ===
Oddly enough, the tool we'll use is called '''ldapsearch''' :-)
 
==== Find Machine Accounts ====
To find machine$ (Computer) entries, almost always Windows Domain machine-accounts:
* As root on '''hood''':
  <font color=red>hostname</font> <font color=blue>/ #</font> '''ldapsearch -x -D"cn=<ReadOnlyUser>,dc=iat,dc=sfu,dc=ca" -b "ou=Computers,dc=iat,dc=sfu,dc=ca" -s one "(objectclass=*)" -w <SecretReaderPassword> -x'''
 
==== Find Users ====
To find all Users, modify the Base -
* As root on '''hood''':
  <font color=red>hostname</font> <font color=blue>/ #</font> '''ldapsearch -x -D"cn=<ReadOnlyUser>,dc=iat,dc=sfu,dc=ca" -b "ou=Users,dc=iat,dc=sfu,dc=ca" -s one "(objectclass=*)" -w <SecretReaderPassword> -x'''
 
=== Modifying an LDAP entry ===
 
First create a .ldif file with its content in this format:
 
dn: uid=bob,ou=Users,dc=iat,dc=sfu,dc=ca
changetype: modify
replace: sambaHomePath
sambaHomePath: \\NEW\Samba\home\path
 
Then run this command:
* As root on '''hood''':
  <font color=red>hostname</font> <font color=blue>/ #</font> '''ldapmodify -x -f $file.ldif -D cn=Manager,dc=iat,dc=sfu,dc=ca -W'''
* You will be prompted for our LDAP password


<font color=red>zero</font> <font color=blue>services # </font>'''mv zz-disk_space aa-disk-space'''


But wait - there's more!!
=== Deleting an LDAP entry ===
This disk-space script evolves through the various releases, often suppressing output if nothing prior is printed.  And, (now) as the first entry, nothing prior will '''ever''' get printed :-O  So, we'll strip out all the conditionals, and produce a pared-down script '''/etc/log.d/scripts/services''':


#!/bin/bash
Note that it is still better to delete users using the [[Research Administration Tasks#Deleting Users | diradm method above]], this is just for general use.
##########################################################################
# $Id: disk_space,v 1.1 2003/01/13 04:00:59 kirk Exp $
##########################################################################
my (%Config);


    echo
First create a .ldif file with its content in this format:
    echo
    echo "------------------ Disk Space --------------------"
    echo
    system("df -kP | grep '^[/ ]'")
    echo
# vi: shiftwidth=3 tabstop=3 syntax=perl et


One more thing to do - there is a corresponding configuration file which we simply move (rename) to match the above:
cn=bob,ou=home.users,ou=AutoFS,dc=iat,dc=sfu,dc=ca
* on RedHat 9, this file is /etc/log.d/conf/services/zz-disk-space.conf
* for Gentoo, it's found at /etc/log.d/conf/services/


<font color=red>zero</font> <font color=blue>services # </font>'''mv zz-disk_space.conf aa-disk-space.conf'''
Then run this command:
* As root on '''hood''':
  <font color=red>hostname</font> <font color=blue>/ #</font> '''ldapdelete -x -f $file.ldif -D cn=Manager,dc=iat,dc=sfu,dc=ca -W'''
* You will be prompted for our LDAP password

Latest revision as of 19:29, 13 December 2017

Finding Users


If you want to know if a user exists in the Research database, run the following command on any of the Linux servers (eg: sr-hood):

  • getent passwd |grep search-string


Where search-string is part of, or the entire, user name that you're searching for.
Note: Not all entries have the user's full name (ie: first and last), so you may have to search for just part of the user's name.


Adding Users


We try to align the research usernames with an existing SFU Computing ID. This reduces confusion, and if the user chooses to also align their passwords, this gives the illusion of a single, seamless set of credentials across SFU / SIAT Research.

However, about 50% of our research users are non-SFU people. It is for this reason we run our own LDAP authentication server, and maintain our own users (as an aside, we also encrypt/store passwords in four different formats, which include suitable format for our SGI supercomputers, Linux workstations, Mac OS-X and two variations of Windows - this variety of password encryption is another reason we run local authentication).

For a non-SFU user, we create their username by period-separating their first and last names:

Non-SFU userid creation:

firstname.lastname (for example:  john.doe)


  • As root on spitfire:
# cd
# DEBUG=1 /usr/local/sbin/diradm.superadduser '$username' '$email' '$fullname'
  • Note that a file named '$username' is created in your current directory with the template filled out for mailing (the same file is displayed onscreen), and this is why it is very important to 'cd' to root's home directory before running the script so as to not cause any problems with home-directory creation.
  • Further note that $username is the new user's username (which will not be tied in with their regular SFU username), $email is their preferred email address and $fullname is their first and last name.
  • An email will be sent to their email address
  • Add the newly-created user to our Research Mailing List.
  • Add the new user to '/etc/amanda/spitfire/disklist'. This is to enable backups of the user's home directory

Deleting Users

Make sure there are no sym-links pointing to important stuff!!

# find -P /home/users/$username -noleaf  -type l
  • As root on spitfire:
# DEBUG=1 diradm userdel -r $username
  • As root on hood:
# DEBUG=1 diradm userdel $username
  • Keeping the user on our Research Mailing List is probably a good idea.
  • If you delete a user, you MUST disallow diradm from ever using that UIDNumber again. To do so, go to each machine with diradm and edit the diradm.conf file so that UIDNUMBERMIN to equal the same number as the highest UIDNumber currently being used. (At least one higher than the user you deleted) This is important!
  • Comment out the user from /etc/amanda/spitfire/disklist, only if they will never need the data.

Changing a Users Password

This method does not require the old password.

  • As root on hood:
# ldappass $username

Adding Users to a Group

Adding or removing from a group. Uses the same syntax as gpasswd(8).

  • As root on hood:
# diradm gpasswd (-a|-d) $username $group
# diradm gpasswd -a mdeepwel pond

In addition, many users are added to a group in order to maintain and evolve related web-content. In this case, we add a symlink in the user-home-directory, which points to the project/htdocs folder. On any LDAP-enabled machine where logins are permitted (ie not hood), first make the symlink, then change the ownership (from root):

# cd /home/users/$user
# ln -s /home/projects/$project
# chown -h $user:$project /home/users/$user/$project

Adding Groups

Adding groups takes the same syntax as groupadd(8).

  • As root on hood:
# diradm groupadd $groupname

To change the GID of any group:

  • As root on hood:
# diradm groupmod -g GID $groupname

Adding Projects

This creates a project for the user, and adds a web folder, hosted via hercules00. If the user just wants places for their files, skip the htdocs and htlogs stuff, and skip all the hercules config.

For a single user

Note that $project designates the name of the new project and $user designates the user for whom the project is being created.

Create the new project directory:

  • As root on hurricane:
# mkdir /mnt/raid/projects/$project
# mkdir /mnt/raid/projects/$project/htdocs
# chown -R $user /mnt/raid/projects/$project
# chmod -R 2701 /mnt/raid/projects/$project
# chmod 2775 /mnt/raid/projects/$project/htdocs
# mkdir /mnt/raid/projects/$project/htlogs
# chmod 755 /mnt/raid/projects/$project/htlogs


Add an LDAP entry for the newly created project:

  • As root on hood:
# diradm amadd -O home.projects $project 209.87.56.231:/mnt/raid/projects/$project
  1. '-O' means the default mount options for automount.

Create a sym-link in the user's home directory

  • As root on whatever you want:
# cd /home/users/$user
# ln -s /home/projects/$project

Next, to set the up the hosting and the database:

  • As root on hercules00 set up a new vhost.conf using an existing template:
# cd /etc/apache2/vhosts.d/projects/
# cat vhost_template.sample > $project.conf

TO DO - DATABASE HOWTO

Make sure you get Vic to add an alias!

For a group

Note that $project designates the name of the new project and $group designates the group for whom the project is being created.

First create a new group.

Create the new project directory:

  • As root on hurricane:
# mkdir /mnt/raid/projects/$project
# chgrp -R $group /mnt/raid/projects/$project
# chmod -R 2771 /mnt/raid/projects/$project
# mkdir /mnt/raid/projects/$project/htdocs
# chmod 2775 /mnt/raid/projects/$project/htdocs
# mkdir /mnt/raid/projects/$project/htlogs
# chmod 755 /mnt/raid/projects/$project/htlogs

Add an LDAP entry for the newly created project:

  • As root on hood:
# diradm amadd -O home.projects $project 209.87.56.231:/mnt/raid/projects/$project
  1. '-O' means the default mount options for automount.

Create a sym-link in the all the user's home directories (the users belonging to $group). To find out who is in what group, use the command getent group | grep $group on any ldap-enabled machine.

  • As root on your LDAP-enabled machine of choice:
# cd /home/users/$user
# ln -s /home/projects/$project

Next, to set the up the hosting and the database:

  • As root on hercules00 set up a new vhost.conf using an existing template:
# cd /etc/apache2/vhosts.d/projects/
# cat vhost_template.sample > $project.conf

TO DO - DATABASE HOWTO

Make sure you get Vic to add an alias!

Adding CVS Repositories

Note: $user represents a user's username, $group represents a new group that will need access to the repository, and $repository is the new name for the CVS repository.

For a single user

Add the user to the cvs group:

  • As root on hood:
# diradm gpasswd -a $user cvs

Create the repository and set the correct permissions:

  • As root on hurricane:
# cvs -d /mnt/raid/cvs/$repository
# chmod -R 2700 /mnt/raid/cvs/$repository
# chown -R $user /mnt/raid/cvs/$repository

For multiple users

Create a new group, and add all the users that require access to the newly created group as well as the cvs group:

  • As root on hood:
# diradm groupadd $group
# diradm gpasswd -a $user $group
# diradm gpasswd -a $user cvs

Create the repository and set the correct permissions:

  • As root on hurricane:
# cvs -d /mnt/raid/cvs/$repository
# chmod -R 2770 /mnt/raid/cvs/$repository
# chgrp -R $group /mnt/raid/cvs/$repository
  • To access the CVS repository, use CVS_RSH="ssh" with URL being :ext:$user@cvs.iat.sfu.ca:/var/cvsroot/$foobar
  • See the more detailed CVS User guide

Adding SVN Repositories

Note: $user represents a user's username, $group represents a new group that will need access to the repository, and $repository is the new name for the SVN repository.

For a single user

Add the user to the svn group:

  • As root on hood:
# diradm gpasswd -a $user svn

Create the repository and set the correct permissions:

  • As root on hurricane:
# svnadmin create /mnt/raid/svn/$repository --fs-type fsfs
# chmod -R 2700 /mnt/raid/svn/$repository
# chown -R $user:root /mnt/raid/svn/$repository

For multiple users

Create a new group, and add all the users that require access to the newly created group as well as the svn group:

  • As root on hood:
# diradm groupadd $group
# diradm gpasswd -a $user $group
# diradm gpasswd -a $user svn

Create the repository and set the correct permissions:

  • As root on hurricane:
# svnadmin create /mnt/raid/svn/$repository --fs-type fsfs
# chmod -R 2770 /mnt/raid/svn/$repository
# chown -R root:$group /mnt/raid/svn/$repository

Dumping the contents of SVN Repositories to a file, and vice-versa

Note: $repository represents the repository's name.

To dump the contents to a file:

  • As root on hurricane:
# svnadmin dump /mnt/raid/svn/$repository > file.dump

To load the contents from a file into a previously created repository:

  • As root on hurricane:
# svnadmin load /mnt/raid/svn/$repository < file.dump

Adding and Removing Computers to/from the Domain

  • As root on hood:
hood ~ # diradm smbhostadd sr-#####
  • refer to Workstation_Naming_Convention
  • The LDAP entry is case-sensitive. Make sure it matches the machine's name.
  • If you are adding a Windows 7 machine, it also requires a registry hack. See Win7_Samba3DomainMember.reg under \\hurricane\software\windows. It contains the following:
Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\LanManWorkstation\Parameters]
"DNSNameResolutionRequired"=dword:00000000
"DomainCompatibilityMode"=dword:00000001
  • To remove an LDAP entry, use smbhostdel:
hood ~ # diradm smbhostdel sr-#####
  • If you don't add the computer's name to ldap and its MAC to Men and Mice, the machine will not be able to connect to the Research domain. This problem can also be verified by going into the command line and typing ipconfig /all. If the domain name doesn't show as iat.sfu.ca, then it is very likely that one or both of those two steps were skipped.
  • We add machine to the Domain to facilitate Windows' operations; Unix/Linux/Mac don't care about machine entries. You may want to verify machine-names (either present, or absent) - to check what Samba thinks about all accounts (user-accounts and machine-accounts):
hood ~ # pdbedit -L (note:  machine-accounts end in $)

General User Management

  • diradm offers almost all regular POSIX commands, sometimes with a few extra frills. The only commands NOT completely implemented are gpasswd and passwd.
  • Welcoming new users; email template
    • This is in the diradm.superadduser script, as it fills out the template.
From: help@siat.sfu.ca
To: $FULLNAME <$EMAIL>
Subject: Research account created - $NEWUSER

Hello $FULLNAME,

Your SIAT Research account has been created:
Username: $NEWUSER
Password: $NEWPASS

Please note that this username and password pair is only valid for the SFU Surrey
Research Network, and is NOT tied into the main SFU authentication systems.

Please visit https://research.iat.sfu.ca/network/changepassword.php to change
your password when you receive this email.

For support with the research network, please email:
help@siat.sfu.ca
Please include a good description of the entire problem and a suitable subject
line.

More information about SIAT Research can be found on our Research Wiki:
https://research.iat.sfu.ca/wiki/

Our wiki also has information about how to connect to SIAT printers:
https://research.iat.sfu.ca/wiki/index.php?title=Printers 

and the software that is available to researchers:
https://research.iat.sfu.ca/wiki/index.php?title=Research_Workstations_-_default_software_loads


Here are some cool ideas about the benefits of this SIAT Research account:

- you can log onto a SIAT Research workstation with your new account,
  and automatially have your U:\ drive connected, on any workstation
  you log onto!  This U:\ home-directory is held on a SIAT Research
  fileserver, and gets backed-up nightly.

- you can access your data, on our SIAT Research file-servers, from
  just about anywhere:
https://research.iat.sfu.ca/wiki/index.php?title=Accessing_Your_Data

- we have a cloud service, which can let you access your data across
  many different devices and locations; here is Owncloud:
https://research.iat.sfu.ca/wiki/index.php?title=Cloud-based_File_Storage
https://owncloud.iat.sfu.ca

- there are SVN and CVS servers available, for check-in/check-out and
  version control

- we can create shared "project" folders, which allows for collaboration
  and sharing among several people


If *YOU* have any ideas for services or features which may be useful,
please don't hesitate to let us know what you're thinking!  We can all
benefit from your ideas!

Welcome! Have fun!

Sassafras K2 Keyserver Administration

Background

We use the Sassafras K2 Keyserver product for most license-compliance, primarily to extend the usefulness of a small number of licensed applications within the School of Interactive Arts & Technology (SIAT) Researcher community. Most users are sporadic, and don't require full-time access to our specialized applications; rather, they need to accomplish a defined task which may be one component of their research or publication.
The Sassafras keyserver runs on our Windows server, lancer.iat.sfu.ca.
We currently (2012) have 200 key-client licenses, which covers our current user-quantity, with some room for future growth.
This keyserver serves licenses to Windows and Mac clients (only :-( ).


Old Information, Retained for Reference Purposes:

The Sassafras keyserver runs under Linux, on bismarck.iat.sfu.ca, with install-root under /usr/local/k2.
In a process-listing, it shows up as: /usr/local/k2/ks -d -e /usr/local/k2/startup.txt
It's started from an init-script under /etc/init.d/KeyServer which, in turn, is launched upon startup by the Gentoo rc-update scripts. No manual intervention is necessary (normally :-) ).

Administration

The main administration tool is the K2Admin program, which is capable of running under Windows, or Mac OS-X (only :-( No Linux). When installed, you will have a program called, KeyConfigure.

Here is the Local Mac Copy
And, the Local Windows Copy

Viewing Key-served Applications

Open up K2's KeyConfigure, the license administration software. When you do, you'll need to enter the following information:

  • Server: research-keyserver.iat.sfu.ca
  • Username: Administrator
  • Password: secret

Once open, you can see which Computers on the network are using what Software, what Software is running on what machine, and what Licenses are registered with the system.

Old Information, Retained for Reference Purposes:

In the Licenses window, you will see the name of the application, as well as how many licenses are in use at that particular moment in time, how many people are waiting for a license to free up, and how many licenses we own (labeled as 'Limit').

Double clicking on the name of a key-served software application, will bring up more details about its use. You can change the name of the application or change the way it is being key-served. More importantly, you can see who is using the application and on what machine (Click on 'Current User List' or 'Computer List'), and you can also see what application and which version is registered with the particular license. To see this, expand the 'Programs' section.

Adding Key-served Applications

Before starting, you must be on a Mac or Windows PC that already has the software you'd like to add installed and working.
You need three entries to support a new key-served application:

  1. Product
    This is the product whose license we are trying to control. A product is made up of one or more programs.
  2. Program
    This is the file, or files, associated with a particular product.
  3. Policy
    Policies specify the type of license we have for a given product, and allow us to dictate how that product can be used (eg: maximum of 5 concurrent users).


Sassafras Keyserver version 7 supports other features but the three that were mentioned are all we need to control how software is run.
The basic process is:

  1. Make sure the program or programs that belong to your product exist, either in KeyServer's pre-made list of available programs, or in the audit report of programs. Note: there is no way to manually create a new program. The only way to create a new program entry is to install software on a machine that then gets audited, or to install it on your local machine and select it from the Browse dialog when you try to create a new program entry in KeyConfigure.
  2. Create a new product by right-clicking on the Products window and choosing New Product.... In its program field, drag one or more programs from the Programs window into it.
  3. Create a new policy by right-clicking on the Policies windows and choosing New Policy.... In its product field, drag the product from the Products window into it.
  4. The policy settings will usually look like this:


Detachable means that the program can be run even if the user has lost connection to the key server. If the program is a key server-specific version and requires Sassafras KeyServer to provide a key, then the Detachable setting will be ignored.

Sometimes, we will get a keyserved version of a product that requires Sassafras Keyserver to be running and to serve up keys in order for that product to run. In that case, the vendor will also provide us with a license file that gets stored in the KeyServer Data Folder (C:\Program Files\Sassafras K2\Server\KeyServer Data Folder) on Lancer. When KeyServer is restarted, it will automatically generate the required entries to manage that product.

Old Information, Retained for Reference Purposes:

Open KeyConfigure and go to File > Create License (or press Cmd+i on a Mac or Ctrl+i on Windows). 
A new window will appear. Enter a License Name, usually the same as the Software name. Then click Browse, and find the App that you'd like to keyserve (on a Mac it's usually under Applications, on Windows in Program Files). Double click it.
Make sure you check off 'Allow launch when KeyServer not available' (this is the default) just in case something breaks on the server, so people can still use their software until it's fixed.
Click OK. A new window with more details will come up. Expand the 'Limits' section by clicking on the small triangle, and choose 'Concurrent Use Limit (Floating License)', and under 'User Limit' enter the amount of licenses we own. Close the window, and make sure you 'Save'.

Removing Key-served Applications

This is very easy. Once you open up KeyConfigure, select the Application you'd like to remove, and go to Edit > Delete (or click Cmd+delete on a Mac, or Delete on Windows).

Sassafras KeyServer (version 7.x) Documentation

http://www.sassafras.com/hrl/7.0/index.html

Sassafras KeyServer Error

Problem:
When running the KeyVerify client, or when the keyserver tries to connect when launching a key served application, you get an error saying that KeyServer has denied permission to log onto the server. "KA-180" might appear at the bottom of the dialog box.

Solution:
This could mean that the Sassafras key server has used its maximum client capacity (in our case, it's 200).

To confirm this, launch KeyConfigure. You can get it from Sassafras, or from another page in this wiki: Research Administration Tasks

When you launch it, go to Window -> Computers. You'll see a list of computers that tried to connect to the KeyServer. In the left column, under Login, you'll see a count of the Full, Basic, and Prohibited computers. Chances are that Full and Basic add up to 200. Prohibited shows the computers that were unable to get a connection to the server (probably because it was full).

So, here's how to make room. In that same window's right-side pane, sort all the computers by Last Session. Then drag your selection to choose all computers whose last session was, say, more than 6 mos. ago. Then click on your DELETE key. This removes those computers from the key server's database.

Next, in the left column of the window, double-click on the Prohibited entry. This will bring up a window showing the Prohibited computers. You can either delete them all, or you can also double-click on the Full entry to open up another window showing computers that get full rights, and then drag the Prohibited selection into the Full window.

Flexlm License Server Administration

Working with LDAP

The options used in commands below do the following:

  • -x: use simple authentication instead of SASL
  • -f: use the file $file.ldif to read the changes to be made
  • -D: bind-dn (user to bind with)
  • -W: prompt for password


Searching LDAP

Oddly enough, the tool we'll use is called ldapsearch :-)

Find Machine Accounts

To find machine$ (Computer) entries, almost always Windows Domain machine-accounts:

  • As root on hood:
 hostname / # ldapsearch -x -D"cn=<ReadOnlyUser>,dc=iat,dc=sfu,dc=ca" -b "ou=Computers,dc=iat,dc=sfu,dc=ca" -s one "(objectclass=*)" -w <SecretReaderPassword> -x

Find Users

To find all Users, modify the Base -

  • As root on hood:
  hostname / # ldapsearch -x -D"cn=<ReadOnlyUser>,dc=iat,dc=sfu,dc=ca" -b "ou=Users,dc=iat,dc=sfu,dc=ca" -s one "(objectclass=*)" -w <SecretReaderPassword> -x

Modifying an LDAP entry

First create a .ldif file with its content in this format:

dn: uid=bob,ou=Users,dc=iat,dc=sfu,dc=ca
changetype: modify
replace: sambaHomePath
sambaHomePath: \\NEW\Samba\home\path

Then run this command:

  • As root on hood:
 hostname / # ldapmodify -x -f $file.ldif -D cn=Manager,dc=iat,dc=sfu,dc=ca -W
  • You will be prompted for our LDAP password


Deleting an LDAP entry

Note that it is still better to delete users using the diradm method above, this is just for general use.

First create a .ldif file with its content in this format:

cn=bob,ou=home.users,ou=AutoFS,dc=iat,dc=sfu,dc=ca

Then run this command:

  • As root on hood:
 hostname / # ldapdelete -x -f $file.ldif -D cn=Manager,dc=iat,dc=sfu,dc=ca -W
  • You will be prompted for our LDAP password