OpenLDAP : Configure LDAP Client2025/04/26 |
Configure LDAP Client in order to share user accounts in your local networks. |
|
[1] | Install OpenLDAP Client. |
[root@node01 ~]#
dnf -y install sssd sssd-ldap oddjob-mkhomedir # switch authentication provider to sssd [root@node01 ~]# authselect select sssd with-mkhomedir --force
Backup stored at /var/lib/authselect/backups/2025-04-26-08-06-09.Ics5db Profile "sssd" was selected. Make sure that SSSD service is configured and enabled. See SSSD documentation for more information. - with-mkhomedir is selected, make sure pam_oddjob_mkhomedir module is present and oddjobd service is enabled and active - systemctl enable --now oddjobd.service
[root@node01 ~]#
vi /etc/sssd/sssd.conf # create new # replace [ldap_uri], [ldap_search_base] to your own environment value [domain/default] id_provider = ldap auth_provider = ldap chpass_provider = ldap ldap_uri = ldap://dlp.srv.world/ ldap_search_base = dc=srv,dc=world ldap_id_use_start_tls = True ldap_tls_cacertdir = /etc/openldap/certs cache_credentials = True ldap_tls_reqcert = allow [sssd] services = nss, pam domains = default [nss] homedir_substring = /home chmod 600 /etc/sssd/sssd.conf [root@node01 ~]# systemctl restart sssd oddjobd [root@node01 ~]# systemctl enable sssd oddjobd
[root@node01 ~]#
logout Fedora Linux 42 (Server Edition) Kernel 6.14.2-300.fc42.x86_64 on x86_64 (ttyS0) Activate the web console with: systemctl enable --now cockpit.socket node01 login: redhat # LDAP user Password: # LDAP password Creating home directory for redhat. [redhat@node01 ~]$ # logined # changing LDAP password is common way with passwd [redhat@node01 ~]$ Changing password for user redhat. Current Password: # current password New password: # new password Retype new password: passwd: all authentication tokens updated successfully. |
Sponsored Link |
|