温馨提示×

温馨提示×

您好,登录后才能下订单哦!

密码登录×
登录注册×
其他方式登录
点击 登录注册 即表示同意《亿速云用户服务条款》

ldap网络账号

发布时间:2020-07-15 09:11:49 来源:网络 阅读:415 作者:MissLeejuan 栏目:网络安全

######ldap网络帐号#####
1.什么是ldap?
ldap目录服务认证,和windows活动目录类似,就是记录数据的一种方式

2.ldap客户端所须软件
yum sssd krb5-workstation -y


3.如何开启ldap用户认证
authconfig-tui

                       ┌────────────────┤ Authentication Configuration ├─────────────────┐
                       │                                                                 │
                       │  User Information        Authentication                         │
                       │  [ ] Cache Information   [ ] Use MD5 Passwords                  │
                       │  [*] Use LDAP            [*] Use Shadow Passwords               │
                       │  [ ] Use NIS             [ ] Use LDAP Authentication            │
                       │  [ ] Use IPAv2           [*] Use Kerberos                       │
                       │  [ ] Use Winbind         [ ] Use Fingerprint reader             │
                       │                          [ ] Use Winbind Authentication         │
                       │                          [*] Local authorization is sufficient  │
                       │                                                                 │
                       │            ┌────────┐                      ┌──────┐             │
                       │            │ Cancel │                      │ Next │             │
                       │            └────────┘                      └──────┘             │
                       │                                                                 │
                       │                                                                 │
                       └─────────────────────────────────────────────────────────────────┘
                                                                                          


                              ┌─────────────────┤ LDAP Settings ├─────────────────┐
                              │                                                   │
                              │          [*] Use TLS                              │
                              │  Server: ldap://cla***oom.example.com/___________ │
                              │ Base DN: dc=example,dc=com_______________________ │
                              │                                                   │
                              │         ┌──────┐                ┌──────┐          │
                              │         │ Back │                │ Next │          │
                              │         └──────┘                └──────┘          │
                              │                                                   │
                              │                                                   │
                              └───────────────────────────────────────────────────┘
                                                                                   


                           ┌─────────────────┤ Kerberos Settings ├──────────────────┐
                           │                                                        │
                           │        Realm: EXAMPLE.COM_____________________________ │
                           │          KDC: cla***oom.example.com___________________ │
                           │ Admin Server: cla***oom.example.com___________________ │
                           │               [ ] Use DNS to resolve hosts to realms   │
                           │               [ ] Use DNS to locate KDCs for realms    │
                           │                                                        │
                           │          ┌──────┐                    ┌────┐            │
                           │          │ Back │                    │ Ok │            │
                           │          └──────┘                    └────┘            │
                           │                                                        │
                           │                                                        │
                           └────────────────────────────────────────────────────────┘
                                                                                    
<当出现以下报错时>

                                 ┌────────────────┤ Warning ├─────────────────┐
                                 │                                            │
                                 │ To connect to a LDAP server with TLS       │
                                 │ protocol enabled you need a CA certificate │
                                 │ which signed your server's certificate.    │
                                 │ Copy the certificate in the PEM format to  │
                                 │ the '/etc/openldap/cacerts' directory.     │
                                 │ Then press OK.                             │
                                 │                                            │
                                 │                  ┌────┐                    │
                                 │                  │ Ok │                    │
                                 │                  └────┘                    │
                                 │                                            │
                                 │                                            │
                                 └────────────────────────────────────────────┘
                                                                               
时因为tls的证书缺失,需要到服务器端下载所需要的证书到/etc/openldap/cacerts,
用到的命令
wget http://172.25.254.254/pub/example-ca.crt

<测试>
getent passwd ldapuser1
如果用户信息可以正常显示,证明客户端认成功。

4.自动挂载用户家目录
yum install autofs -y
vim /etc/autofs.master
/home/guests /etc/auto.ldap

vim /etc/auto.ldap
ldapuser1 172.25.254.254:/home/guests/ldapuser1
+++++++++++++++++++++++++++++++++++++++++++++++++++++++
*  172.25.254.254:/home/guests/&

systemctl restart autofs
####建立脚本执行ldap####
vim set-ldap.sh
#!/bin/bash
echo "install software ing ..."
yum install sssd krb5-workstation autofs -y

echo "config ldap auth client ing ..."
authconfig \
--enableldap \
--enablekrb5 \
--disableldapauth \
--enableldaptls \
--ldaploadcacert=http://172.25.254.254/pub/example-ca.crt \
--ldapserver="cla***oom.example.com" \
--ldapbasedn="dc=example,dc=com" \
--krb5realm="EXAMPLE.COM" \
--krb5kdc="cla***oom.example.com" \
--krb5adminserver="cla***oom.example.com" \
--enablesssd \
--enablesssdauth \
--update \

echo "config ldap user\'s home directory"

echo /home/guests /etc/auto.ldap >> /etc/auto.master

echo "* 172.25.254.254:/home/guests/&" >> /etc/auto.ldap

systemctl restart autofs
systemctl enable autofs

echo "all is successful!"
:wq
sh set-ldap.sh   ##执行脚本



向AI问一下细节

免责声明:本站发布的内容(图片、视频和文字)以原创、转载和分享为主,文章观点不代表本网站立场,如果涉及侵权请联系站长邮箱:is@yisu.com进行举报,并提供相关证据,一经查实,将立刻删除涉嫌侵权内容。

AI