LDAP konfiguráció

# yum install realmd krb5-workstation sssd sssd-ad authconfig openldap-clients oddjob-mkhomedir ntp adcli
/etc/krb5.conf
# Configuration snippets may be placed in this directory as well
includedir /etc/krb5.conf.d/
 
[logging]
 default = FILE:/var/log/krb5libs.log
 kdc = FILE:/var/log/krb5kdc.log
 admin_server = FILE:/var/log/kadmind.log
 
[libdefaults]
 dns_lookup_realm = true
 dns_lookup_kdc = true
 ticket_lifetime = 24h
 renew_lifetime = 7d
 forwardable = true
 rdns = false
 pkinit_anchors = /etc/pki/tls/certs/ca-bundle.crt
 default_realm = DOMAIN.HU
 default_ccache_name = KEYRING:persistent:%{uid}
 
[realms]
 DOMAINEM.HU = {
  kdc = ad.domainem.hu
  admin_server = ad.domainem.hu
 }
 
[domain_realm]
 .ad.domainem.hu = AD.DOMAINEM.HU
 ad.domainem.hu = AD.DOMAINEM.HU
# kinit pagoston
# realm join -U pagoston -v pcs.hu
/etc/sssd/sssd.conf
[sssd]
domains = domainem.hu
config_file_version = 2
services = nss, pam
 
[domain/pcs.hu]
ad_domain = domainem.hu
krb5_realm = DOMAINEM.HU
realmd_tags = manages-system joined-with-samba
cache_credentials = True
id_provider = ad
krb5_store_password_if_offline = True
default_shell = /bin/bash
ldap_id_mapping = True
#use_fully_qualified_names = True
fallback_homedir = /home/%u@%d
access_provider = ad
# authconfig --enablesssdauth --enablesssd --enablemkhomedir --update
# systemctl restart sssd

Kivétel a domain alól:

# realm leave ad.example.com

Ellenőrzés:

net ads testjoin

https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/windows_integration_guide/sssd-ad https://outsideit.net/realmd-sssd-ad-authentication/

doksik_leirasok/ldap.txt · Utolsó módosítás: 2019/05/15 12:27 szerkesztette: admin
CC Attribution-Share Alike 4.0 International
Driven by DokuWiki Recent changes RSS feed Valid CSS Valid XHTML 1.0