OpenLDAP : Configure LDAP Client2024/11/07 |
Configure LDAP Client in order to share user accounts in your local networks. |
|
[1] | Install OpenLDAP Client. |
[root@node01 ~]#
dnf -y install sssd sssd-ldap oddjob-mkhomedir # switch authentication provider to sssd [root@node01 ~]# authselect select sssd with-mkhomedir --force
Backup stored at /var/lib/authselect/backups/2024-11-07-01-38-15.qcSOvV Profile "sssd" was selected. Make sure that SSSD service is configured and enabled. See SSSD documentation for more information. - with-mkhomedir is selected, make sure pam_oddjob_mkhomedir module is present and oddjobd service is enabled and active - systemctl enable --now oddjobd.service
[root@node01 ~]#
vi /etc/sssd/sssd.conf # create new # replace [ldap_uri], [ldap_search_base] to your own environment value [domain/default] id_provider = ldap auth_provider = ldap chpass_provider = ldap ldap_uri = ldap://dlp.srv.world/ ldap_search_base = dc=srv,dc=world ldap_id_use_start_tls = True ldap_tls_cacertdir = /etc/openldap/certs cache_credentials = True ldap_tls_reqcert = allow [sssd] services = nss, pam domains = default [nss] homedir_substring = /home chmod 600 /etc/sssd/sssd.conf [root@node01 ~]# systemctl restart sssd oddjobd [root@node01 ~]# systemctl enable sssd oddjobd
[root@node01 ~]#
logout Fedora Linux 41 (Server Edition) Kernel 6.11.5-300.fc41.x86_64 on an x86_64 (ttyS0) Web console: https://node01.srv.world:9090/ or https://10.0.0.51:9090/ node01 login: redhat # LDAP user Password: # LDAP password Creating home directory for redhat. [redhat@node01 ~]$ # logined # changing LDAP password is common way with passwd [redhat@node01 ~]$ Changing password for user redhat. Current Password: # current password New password: # new password Retype new password: passwd: all authentication tokens updated successfully. |
Sponsored Link |