meta data for this page

LDAP konfiguráció

Linux

# yum install realmd krb5-workstation sssd sssd-ad authconfig openldap-clients oddjob-mkhomedir ntp adcli
/etc/krb5.conf
# Configuration snippets may be placed in this directory as well
includedir /etc/krb5.conf.d/
 
[logging]
 default = FILE:/var/log/krb5libs.log
 kdc = FILE:/var/log/krb5kdc.log
 admin_server = FILE:/var/log/kadmind.log
 
[libdefaults]
 dns_lookup_realm = true
 dns_lookup_kdc = true
 ticket_lifetime = 24h
 renew_lifetime = 7d
 forwardable = true
 rdns = false
 pkinit_anchors = /etc/pki/tls/certs/ca-bundle.crt
 default_realm = DOMAIN.HU
 default_ccache_name = KEYRING:persistent:%{uid}
 
[realms]
 DOMAINEM.HU = {
  kdc = ad.domainem.hu
  admin_server = ad.domainem.hu
 }
 
[domain_realm]
 .ad.domainem.hu = AD.DOMAINEM.HU
 ad.domainem.hu = AD.DOMAINEM.HU
# kinit pagoston
# realm join -U pagoston -v pcs.hu
/etc/sssd/sssd.conf
[sssd]
domains = domainem.hu
config_file_version = 2
services = nss, pam
 
[domain/pcs.hu]
ad_domain = domainem.hu
krb5_realm = DOMAINEM.HU
realmd_tags = manages-system joined-with-samba
cache_credentials = True
id_provider = ad
krb5_store_password_if_offline = True
default_shell = /bin/bash
ldap_id_mapping = True
#use_fully_qualified_names = True
fallback_homedir = /home/%u@%d
access_provider = ad
# authconfig --enablesssdauth --enablesssd --enablemkhomedir --update
# systemctl restart sssd

Kivétel a domain alól:

# realm leave ad.example.com

Ellenőrzés:

net ads testjoin

https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/windows_integration_guide/sssd-ad https://outsideit.net/realmd-sssd-ad-authentication/

TSM konfiguráció

[tsm@tsm1 ~]$ gsk8capicmd_64 -cert -add -db "cert.kdb" -stashed -label "MyRootCA2023" -format ascii -file MyRootCA2023_pem.pem -trust enable
[tsm@tsm1 ~]$ gsk8capicmd_64 -cert -add -db "cert.kdb" -stashed -label "MyServerSubCA2023" -format ascii -file MyServerSubCA2023_pem.pem -trust enable
[tsm@tsm1 ~]$ gsk8capicmd_64 -cert -add -db "cert.kdb" -stashed -label "MyClientSubCA2023" -format ascii -file MyClientSubCA2023_pem.pem -trust enable

Miután a TSM szerver újraindult:

set ldapuser _tsm_ad_auth@ebh.erste.hu
set ldappassword bdgBgwRzI5GyVnMrGsys3RJW