A significant number of servers in the AWS\u00ae<\/sup> cloud run on Linux\u00ae<\/sup>. As such, DevOps engineers want to pair the open source OS with an open source authentication mechanism: LDAP<\/a>. The alternative is to try and \u201cmismatch\u201d authentication against Microsoft\u00ae<\/sup> Active Directory\u00ae<\/sup> (AD), which presents DevOps engineers with unnecessary challenges.<\/p>\n\n\n\n
AD struggles with non-Windows\u00ae<\/sup> systems out of the box. Generally, to perform user management on Linux servers<\/a> with AD, DevOps engineers must layer additional solutions onto it. One might assume that AWS offers tooling to help mitigate this problem. But because AWS Directory Service<\/a> is just hosted AD in AWS, many are reluctant to use it for their Linux server infrastructure. The largest deterrents are AD\u2019s limitations with Linux as well as licensing costs as compared to open source tools like OpenLDAP\u2122.<\/p>\n\n\n\n
As an open source solution, OpenLDAP<\/a> is versatile and highly flexible \u2014 it can enable the LDAP authentication<\/a> that DevOps teams need for their Linux servers in AWS. But LDAP isn\u2019t just useful for server access<\/a>. Many of the other tools that DevOps teams leverage authenticate via LDAP, too. Examples include the Atlassian\u00ae<\/sup> suite, Docker, and OpenVPN\u00ae<\/sup>.<\/p>\n\n\n\n
LDAP is most often utilized via OpenLDAP servers<\/a>. These servers have historically been housed on-prem or in the data center next to the servers they will authenticate. LDAP server require a significant amount of configuration and technical knowhow to get set up correctly. It\u2019s also possible for LDAP servers to be set up and hosted in the cloud. While physical hardware configuration and maintenance chores are handled by a third party in that case, it is still a tall order to get the software functional and keep it up-to-date, not to mention the security, availability, and performance issues.
<\/p>\n\n\n\n
One such solution is Directory-as-a-Service\u00ae<\/sup><\/a> from JumpCloud. It enables IT admins to authenticate remote Linux servers via LDAP, plus it also features the ability to authenticate via SSH keys. As an SSH key manager, users easily access all of their cloud resources. <\/p>\n\n\n\n
If you\u2019re eager to configure AWS Linux servers with cloud LDAP<\/a> and not have anything on-prem to manage, sign up<\/a> for a free JumpCloud account. It includes the ability to manage up to 10 users free, forever.
<\/p>\n","protected":false},"excerpt":{"rendered":"