Fedora 42
Sponsored Link

OpenLDAP : Configure LDAP Client2025/04/26

 

Configure LDAP Client in order to share user accounts in your local networks.

[1] Install OpenLDAP Client.
[root@node01 ~]#
dnf -y install sssd sssd-ldap oddjob-mkhomedir
# switch authentication provider to sssd

[root@node01 ~]#
authselect select sssd with-mkhomedir --force
Backup stored at /var/lib/authselect/backups/2025-04-26-08-06-09.Ics5db
Profile "sssd" was selected.

Make sure that SSSD service is configured and enabled. See SSSD documentation for more information.

- with-mkhomedir is selected, make sure pam_oddjob_mkhomedir module
  is present and oddjobd service is enabled and active
  - systemctl enable --now oddjobd.service

[root@node01 ~]#
vi /etc/sssd/sssd.conf
# create new
# replace [ldap_uri], [ldap_search_base] to your own environment value

[domain/default]
id_provider = ldap
auth_provider = ldap
chpass_provider = ldap
ldap_uri = ldap://dlp.srv.world/
ldap_search_base = dc=srv,dc=world
ldap_id_use_start_tls = True
ldap_tls_cacertdir = /etc/openldap/certs
cache_credentials = True
ldap_tls_reqcert = allow

[sssd]
services = nss, pam
domains = default

[nss]
homedir_substring = /home

[root@node01 ~]#
chmod 600 /etc/sssd/sssd.conf

[root@node01 ~]#
systemctl restart sssd oddjobd

[root@node01 ~]#
systemctl enable sssd oddjobd

[root@node01 ~]#
logout
Fedora Linux 42 (Server Edition)
Kernel 6.14.2-300.fc42.x86_64 on x86_64 (ttyS0)

Activate the web console with: systemctl enable --now cockpit.socket

node01 login: redhat      # LDAP user
Password:                 # LDAP password
Creating home directory for redhat.
[redhat@node01 ~]$        # logined

# changing LDAP password is common way with passwd

[redhat@node01 ~]$
Changing password for user redhat.
Current Password:        # current password
New password:            # new password
Retype new password:
passwd: all authentication tokens updated successfully.
Matched Content