CLI Configuration - SSSD Configuration
...
Log in as the root
user and install the OpenLDAP client and other client utilities:
Code Block | ||
---|---|---|
| ||
dnf install |
...
sssd sssd-ldap -y |
Create an sssd.conf
file in the /etc/sssd
directory:
Code Block |
---|
touch /etc/sssd/sssd.conf |
Edit the sssd.conf
file and paste one of the following configurations:
Info |
---|
These |
...
guaranteed to work in your environment. Adjustments might have to be made. |
Note |
---|
Replace |
Note |
---|
Replace |
TLS Communication
Code Block |
---|
[sssd]
config_file_version = 2
services = nss, pam
domains = yourDomain
[nss]
homedir_substring = /home
[pam]
[domain/yourDomain]
id_provider = ldap
autofs_provider = ldap
auth_provider = ldap
chpass_provider = ldap
ldap_uri = ldap://ldapServer-IP
ldap_search_base = dc=your,dc=Domain,dc=com
ldap_id_use_start_tls = True
ldap_tls_cacertdir = /etc/openldap/certs
cache_credentials = True
ldap_tls_reqcert = allow |
SSL Communication
Code Block |
---|
[domain/yourDomain]
id_provider = ldap
autofs_provider = ldap
auth_provider = ldap
chpass_provider = ldap
ldap_uri = ldaps://ldapServer-IP:636
ldap_chpass_uri = ldaps://ldapServer-IP:636
ldap_search_base = dc=your,dc=Domain,dc=com
ldap_id_use_start_tls = False
ldap_tls_cacertdir = /etc/openldap/certs
cache_credentials = True
ldap_tls_reqcert = demand
entry_cache_timeout = 600
ldap_network_timeout = 3
ldap_connection_expire_timeout = 60 |
Non-TLS / Non-SSL Communication
Code Block |
---|
[sssd]
config_file_version = 2
services = nss, pam
domains = yourDomain.com
[nss]
homedir_substring = /home
[pam]
[domain/yourDomain.com]
enumerate = true
debug_level = 6
id_provider = ldap
autofs_provider = ldap
auth_provider = ldap
chpass_provider = ldap
ldap_uri = ldap://ldapServer-IP
ldap_user_search_base = ou=users,dc=your,dc=Domain,dc=com
ldap_group_search_base = ou=groups,dc=your,dc=Domain,dc=com
ldap_search_base = dc=your,dc=Domain,dc=com
ldap_tls_cacertdir = /etc/openldap/certs
cache_credentials = True
ldap_tls_reqcert = allow |
Change ownership of sssd.conf
file to the root
user:
Code Block |
---|
chown root:root sssd.conf |
Change permissions of the sssd.conf
file to 600
:
Code Block |
---|
chmod 600 sssd.conf |
Restart the sssd
service:
Code Block |
---|
systemctl restart sssd |
Edit the /etc/openldap/ldap.conf
file and replace the BASE
and URI
parameters with the following:
Note |
---|
Replace |
Note |
---|
Replace |
Code Block |
---|
BASE dc=your,dc=Domain,dc=com
URI ldap://ldapServer-IP |
Switch to the
...
home
directory:
Code Block |
---|
cd ~ |
Use authselect
to configure the system:
Code Block |
---|
authselect select sssd with-mkhomedir --force |
Restart the sssd
service:
Code Block |
---|
systemctl restart sssd |
Start and Enable the oddjobd.service
:
Code Block |
---|
systemctl start oddjobd.service |
Code Block |
---|
systemctl |
...
enable oddjobd.service |
Verify your LDAP user(s):
Note |
---|
If your user does not appear here, something was configured incorrectly. |
Code Block |
---|
id user |
CLI Configuration - Direct LDAP Configuration
Edit the /etc/openldap/ldap.conf
file and replace the BASE
and URI
parameters with the following:
Note |
---|
Replace |
Note |
---|
Replace |
Code Block |
---|
BASE dc=your,dc=Domain,dc=com
URI ldap://ldapServer-IP |
StorageCenter UI Configuration
From the StorageCenter UI, navigate to Settings > Identity and Access Control > LDAP Client:
From the LDAP Client page, click the Start LDAP Client Daemon button:
From the LDAP Client page, select LDAP Search Bases:
In the Global search base text box enter
ou=users,dc=your,dc=Domain,dc=com
and click the Save button:
Note |
---|
Replace |
From the LDAP Client page, select LDAP Server Configuration:
In the Hostname text box enter the IP Address of your LDAP Server and click the Save button:
From the LDAP Client page, select Services Using LDAP:
From the Services Using LDAP module, change the Second data source to LDAP for both the Unix users and Unix groups services.
From the LDAP Client page, click the Validate Configuration button:
From here you should see some similar output resulting in your system being successfully configured as an LDAP client: