Differences
This shows you the differences between two versions of the page.
Next revision | Previous revision | ||
redhat:other-redhat:join-domain-redhat [2017/09/05 15:44] – created michael | redhat:other-redhat:join-domain-redhat [2019/03/07 14:49] (current) – [How to join RHEL system to Active Directory] michael | ||
---|---|---|---|
Line 1: | Line 1: | ||
- | ====== How to join RHEL system to Active Directory | + | ====== How to join RHEL system to Active Directory ====== |
+ | |||
+ | |||
+ | {{ : | ||
+ | |||
+ | <WRAP center round important 100%> | ||
**Voraussetzungen: | **Voraussetzungen: | ||
- | | + | |
- | * Vorhandenes und funktionierendes - '' | + | |
+ | | ||
+ | </ | ||
+ | |||
+ | |||
+ | ---- | ||
===== Konfigurationsablauf ===== | ===== Konfigurationsablauf ===== | ||
- | - Make Sure RHEL machine is able to resolve Active Directory servers. | + | <wrap em> |
- | - Install adcli package along with sssd: < | + | - **Install adcli package** along with **sssd**: < |
- | - Then discover the AD domain: < | + | - Then **discover** the **AD domain**: < |
- | - < | + | - **adcli** will show few details about the AD domain. now, **join RHEL system to AD domain using adcli**< |
- | - < | + | < |
- | - < | + | </WRAP> |
- | - < | + | - The join operation creates a keytab the machine will authenticate with. When inspect the with klist -kt, should show several entries that contain client hostname in some form: < |
- | - < | + | - **Configure / |
+ | default_realm = AD.EXAMPLE.COM | ||
+ | dns_lookup_realm = true | ||
+ | dns_lookup_kdc = true | ||
+ | ticket_lifetime = 24h | ||
+ | renew_lifetime = 7d | ||
+ | forwardable = true | ||
+ | |||
+ | [realms] | ||
+ | AD.EXAMPLE.COM = { | ||
+ | kdc = server.ad.example.com | ||
+ | admin_server = server.ad.example.com | ||
+ | } | ||
+ | |||
+ | [domain_realm] | ||
+ | .ad.example.com = AD.EXAMPLE.COM | ||
+ | ad.example.com = AD.EXAMPLE.COM` | ||
+ | </ | ||
+ | </WRAP> | ||
+ | - Use authconfig to **set up** the **Name Service Switch**(/ | ||
+ | - **The final step** is to __configure__ the **SSSD** itself. Open / | ||
+ | < | ||
+ | services = nss, pam, ssh, autofs | ||
+ | config_file_version = 2 | ||
+ | domains = AD.EXAMPLE.COM | ||
+ | |||
+ | [domain/ | ||
+ | id_provider = ad | ||
+ | # Uncomment if service discovery is not working # ad_server = server.win.example.com | ||
+ | </ | ||
+ | </ | ||
+ | - Start the SSSD and make sure it's up after reboots: < | ||
+ | # systemctl enable sssd</ | ||
+ | |||
+ | **After you are done, fetch user information for AD user and try to login:** | ||
+ | < | ||
+ | # ssh Administrator@localhost</ | ||