Differences
This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision | ||
redhat:other-redhat:join-domain-redhat [2017/09/05 15:52] – [How to join RHEL system to Active Directory domain using adcli] michael | redhat:other-redhat:join-domain-redhat [2019/03/07 14:49] (current) – [How to join RHEL system to Active Directory] michael | ||
---|---|---|---|
Line 1: | Line 1: | ||
====== How to join RHEL system to Active Directory ====== | ====== How to join RHEL system to Active Directory ====== | ||
- | ===== Voraussetzungen: | ||
- | | + | {{ : |
- | * Vorhandenes und funktionierendes - '' | + | |
+ | <WRAP center round important 100%> | ||
+ | |||
+ | **Voraussetzungen: | ||
+ | |||
+ | | ||
+ | | ||
+ | </ | ||
+ | |||
+ | |||
+ | ---- | ||
===== Konfigurationsablauf ===== | ===== Konfigurationsablauf ===== | ||
- | - Make Sure RHEL machine is able to resolve Active Directory servers. | + | <wrap em> |
- | - Install adcli package along with sssd: < | + | - **Install adcli package** along with **sssd**: < |
- | - Then discover the AD domain: < | + | - Then **discover** the **AD domain**: < |
- | - adcli will show few details about the AD domain. now, **join RHEL system to AD domain using adcli**< | + | - **adcli** will show few details about the AD domain. now, **join RHEL system to AD domain using adcli**< |
< | < | ||
</ | </ | ||
- The join operation creates a keytab the machine will authenticate with. When inspect the with klist -kt, should show several entries that contain client hostname in some form: < | - The join operation creates a keytab the machine will authenticate with. When inspect the with klist -kt, should show several entries that contain client hostname in some form: < | ||
- | - Configure / | + | - **Configure / |
default_realm = AD.EXAMPLE.COM | default_realm = AD.EXAMPLE.COM | ||
dns_lookup_realm = true | dns_lookup_realm = true | ||
Line 33: | Line 42: | ||
</ | </ | ||
</ | </ | ||
- | - Use authconfig to set up the Name Service Switch(/ | + | - Use authconfig to **set up** the **Name Service Switch**(/ |
- | - < | + | - **The final step** is to __configure__ the **SSSD** itself. Open / |
+ | < | ||
+ | services = nss, pam, ssh, autofs | ||
+ | config_file_version = 2 | ||
+ | domains = AD.EXAMPLE.COM | ||
+ | |||
+ | [domain/ | ||
+ | id_provider = ad | ||
+ | # Uncomment if service discovery is not working # ad_server = server.win.example.com | ||
+ | </ | ||
+ | </ | ||
+ | - Start the SSSD and make sure it's up after reboots: < | ||
+ | # systemctl enable sssd</ | ||
+ | |||
+ | **After you are done, fetch user information for AD user and try to login:** | ||
+ | < | ||
+ | # ssh Administrator@localhost</ | ||