RockyLinux 8: Difference between revisions

From The Power of Many
Created page with "=== authselect === <nowiki>#</nowiki> mkhomedir module dnf install oddjob systemctl enable oddjobd.service systemctl start  oddjobd.service <nowiki>#</nowiki> replace lda..."
 
// Edit via Wikitext Extension for VSCode
 
(2 intermediate revisions by the same user not shown)
Line 1: Line 1:
=== authselect ===
== About ==
<nowiki>#</nowiki> mkhomedir module
Rocky Linux is a community enterprise Operating System designed to be 100% bug-for-bug compatible with Enterprise Linux, now that CentOS has shifted direction.


dnf install oddjob
The official website: https://rockylinux.org/


systemctl enable oddjobd.service
===authselect===
 
<syntaxhighlight lang="bash">
systemctl start  oddjobd.service
dnf install -y openldap-clients sssd sssd-ldap oddjob-mkhomedir openssl-perl
 
systemctl enable --now oddjobd.service
<nowiki>#</nowiki> replace ldap_tls_cacertdir with ldap_tls_cacert in /etc/sssd/conf.d/sssd.conf
 
<nowiki>#</nowiki>ldap_tls_cacertdir = /etc/openldap/cacerts


# replace ldap_tls_cacertdir with ldap_tls_cacert in /etc/sssd/conf.d/sssd.conf
#ldap_tls_cacertdir = /etc/openldap/cacerts
ldap_tls_cacert = /etc/openldap/cacerts/caname.crt
ldap_tls_cacert = /etc/openldap/cacerts/caname.crt


<nowiki>#</nowiki> chmod  
# chmod
 
chmod 0600 /etc/openldap/cacerts/caname.crt
chmod 0600 /etc/openldap/cacerts/caname.crt
chmod 0600 /etc/sssd/conf.d/sssd.conf
chmod 0600 /etc/sssd/conf.d/sssd.conf


systemctl enable autofs
dnf install -y autofs nfs-utils
systemctl enable --now autofs
systemctl enable --now sssd


systemctl enable sssd
# grep -Ev "^$|^\s*#" /etc/idmapd.conf
[General]
Domain = DOMAIN.TLD
[Mapping]
Nobody-User = nobody
Nobody-Group = nobody
[Translation]
[Static]
[UMICH_SCHEMA]
LDAP_server = LDAP.DOMAIN.TLD
LDAP_base = dc=DOMAIN,dc=TLD


dnf install autofs nfs-utils
authselect current
 
authselect select sssd with-mkhomedir with-sudo --force
[root@localhost]# grep -Ev "^$|^\s*#" /etc/idmapd.conf


[General]
#apply changes
authselect apply-changes
</syntaxhighlight>


Domain = DOMAIN.TLD
<syntaxhighlight lang="text">
[domain/default]
id_provider = ldap
autofs_provider = ldap
auth_provider = ldap
chpass_provider = ldap
ldap_uri = ldaps://DS.DOMAIN.TLD
ldap_chpass_uri = ldaps://DS.DOMAIN.TLD
ldap_schema = rfc2307bis
ldap_group_member = uniqueMember
ldap_search_base = dc=DOMAIN,dc=TLD
ldap_id_use_start_tls = False
ldap_tls_cacert = /etc/openldap/cacert.pem


[Mapping]
cache_credentials = True
 
#ldap_tls_reqcert = never
Nobody-User = nobody
entry_cache_timeout = 600
ldap_network_timeout = 3
ldap_connection_expire_timeout = 60


Nobody-Group = nobody
debug_level = 9
ldap_autofs_map_object_class = nisMap
ldap_autofs_map_name = nisMapName
ldap_autofs_entry_object_class = nisObject
ldap_autofs_entry_key = cn
ldap_autofs_entry_value = nisMapEntry
ldap_autofs_search_base = ou=service,dc=DOMAIN,dc=TLD


[Translation]
ldap_default_bind_dn = uid=ds_bind,ou=service,dc=DOMAIN,dc=TLD
ldap_default_authtok_type = password
ldap_default_authtok = YOUR_PASSWORD


[Static]
[sssd]
config_file_version = 2
services = nss,pam,autofs
domains = default


[UMICH_SCHEMA]
[nss]
homedir_substring = /home
debug_level = 5
filter_groups = root
filter_users = root


LDAP_server = LDAP.DOMAIN.TLD
[pam]
pam_account_locked_message = Account locked, please contact IT Team.
pam_verbosity = 2
pam_pwd_expiration_warning = 5


LDAP_base = dc=DOMAIN,dc=TLD
[sudo]


[autofs]
debug_level = 5


authselect select sssd with-mkhomedir with-sudo --force
[ssh]
</syntaxhighlight>
[[Category:OS]]
[[Category:OS]]

Latest revision as of 02:38, 19 March 2022

About

Rocky Linux is a community enterprise Operating System designed to be 100% bug-for-bug compatible with Enterprise Linux, now that CentOS has shifted direction.

The official website: https://rockylinux.org/

authselect

dnf install -y openldap-clients sssd sssd-ldap oddjob-mkhomedir openssl-perl
systemctl enable --now oddjobd.service

# replace ldap_tls_cacertdir with ldap_tls_cacert in /etc/sssd/conf.d/sssd.conf
#ldap_tls_cacertdir = /etc/openldap/cacerts
ldap_tls_cacert = /etc/openldap/cacerts/caname.crt

# chmod
chmod 0600 /etc/openldap/cacerts/caname.crt
chmod 0600 /etc/sssd/conf.d/sssd.conf

dnf install -y autofs nfs-utils
systemctl enable --now autofs
systemctl enable --now sssd

# grep -Ev "^$|^\s*#" /etc/idmapd.conf
[General]
Domain = DOMAIN.TLD
[Mapping]
Nobody-User = nobody
Nobody-Group = nobody
[Translation]
[Static]
[UMICH_SCHEMA]
LDAP_server = LDAP.DOMAIN.TLD
LDAP_base = dc=DOMAIN,dc=TLD

authselect current
authselect select sssd with-mkhomedir with-sudo --force

#apply changes
authselect apply-changes
[domain/default]
id_provider = ldap
autofs_provider = ldap
auth_provider = ldap
chpass_provider = ldap
ldap_uri = ldaps://DS.DOMAIN.TLD
ldap_chpass_uri = ldaps://DS.DOMAIN.TLD
ldap_schema = rfc2307bis
ldap_group_member = uniqueMember
ldap_search_base = dc=DOMAIN,dc=TLD
ldap_id_use_start_tls = False
ldap_tls_cacert = /etc/openldap/cacert.pem

cache_credentials = True
#ldap_tls_reqcert = never
entry_cache_timeout = 600
ldap_network_timeout = 3
ldap_connection_expire_timeout = 60

debug_level = 9
ldap_autofs_map_object_class = nisMap
ldap_autofs_map_name = nisMapName
ldap_autofs_entry_object_class = nisObject
ldap_autofs_entry_key = cn
ldap_autofs_entry_value = nisMapEntry
ldap_autofs_search_base = ou=service,dc=DOMAIN,dc=TLD

ldap_default_bind_dn = uid=ds_bind,ou=service,dc=DOMAIN,dc=TLD
ldap_default_authtok_type = password
ldap_default_authtok = YOUR_PASSWORD

[sssd]
config_file_version = 2
services = nss,pam,autofs
domains = default

[nss]
homedir_substring = /home
debug_level = 5
filter_groups = root
filter_users = root

[pam]
pam_account_locked_message = Account locked, please contact IT Team.
pam_verbosity = 2
pam_pwd_expiration_warning = 5

[sudo]

[autofs]
debug_level = 5

[ssh]