LDAP Authentication Configuration. SELinux is set to enforcing mode. We are going to use an OpenLDAP server which we set up some time ago. Run the authconfig in a text mode. Note that there is a GUI version of the tool available, look for authconfig-gtk. # authconfig-tui. Our configuration can be seen below.
Basic LDAP, Kerberos 5, and SMB (authentication) client configuration is also provided. If --test action is specified, authconfig can be run by users other then root, and any configuration changes are not saved but printed instead. DESCRIPTION authconfig provides a simple method of configuring /etc/sysconfig/network to handle NIS, as well as /etc/passwd and /etc/shadow, the files used for shadow password support. Basic LDAP, Kerberos 5, and Winbind client configuration is also provided. To connect to a central LDAP server for user information, Authconfig needs a number of settings: The host name of the LDAP server. The base DN (Distinguished Name) of the part of the LDAP tree where the system should look for users. This typically looks something like dc=example, dc=com.
Jan 30, 2014 · Because the SSSD daemon is being used, the nss-pam-ldapd and pam_ldap packages can be removed: yum erase nss-pam-ldapd pam_ldap Then, install the following packages: yum install sssd oddjob oddjob-mkhomedir authconfig Configuration. After installing the necessary packages, authconfig needs to be configured.
The authconfig command automatically uses the pam_oddjob_mkhomedir.so library if it is available. Otherwise, it will default to using pam_mkhomedir.so . Make sure the oddjobd service is running. Open the authconfig UI, as in Section 2.2.3, “Launching the authconfig UI”. Open the Advanced Options tab. Select the algorithm to use in the Password Hashing Algorithm drop-down menu.
We have already configured LDAP Server in earlier post “OpenLDAP configuration on CentOS6”. So in this post we will start from OpenLDAP client configuration on CentOS6. We can use authconfig command to configure LDAP client, for this command we should have install (authconfig-6.1.12-23.el6.x86_64) on our Client system.
2.2.5. authconfig を使用した設定の保存と復元; 3. authconfig を使用して認証用に ID ストアを選択する手順. 3.1. IPAv2. 3.1.1. UI での IdM の設定; 3.1.2. コマンドラインを使用した IdM の設定; 3.2. LDAP と IdM. 3.2.1. UI での LDAP 認証の設定; 3.2.2. コマンドラインでの LDAP # yum -y install authconfig krb5-workstation pam_krb5 samba-common oddjob-mkhomedir This will install everything you need to get up and running. There is two ways you can configure the authentication. From the command line (authconfig) or via a console GUI (authconfig-tui). It all works just depends on which version you are comfortable with. (01) Configure LDAP Server (02) Add LDAP User Accounts (03) Configure LDAP Client (04) Configure LDAP Client (AD) (05) LDAP over SSL/TLS (06) OpenLDAP Replication (07) OpenLDAP Multi-Master Replication (08) Install phpLDAPadmin Basic LDAP, Kerberos 5, and Winbind client configuration is also provided. If --test action is specified, the authconfig just reads the current settings from the various configuration files and prints their values. If --update action is specified, authconfig must be run by root (or through console helper), and configuration changes are saved On RHEL 6 LDAP client configuration involves editing multiple files such pam, nssswitch, authconfig etc. But “authconfig” command made it easier for us. I walk you through how it can be done in two steps. Step1. Install client packages. openldap-clients pam_ldap nss-pam-ldapd. Step2. This can be done in two ways.