Ldap Client per SSSD: Unterschied zwischen den Versionen
Zur Navigation springen
Zur Suche springen
| Zeile 30: | Zeile 30: | ||
=== SSSD Konfiguration === | === SSSD Konfiguration === | ||
| − | + | *vim /etc/sssd/sssd.conf | |
<syntaxhighlight lang="ini"> | <syntaxhighlight lang="ini"> | ||
| Zeile 36: | Zeile 36: | ||
config_file_version = 2 | config_file_version = 2 | ||
services = nss, pam | services = nss, pam | ||
| − | domains = | + | domains = it213.int |
| − | [domain/ | + | [domain/it213.int] |
id_provider = ldap | id_provider = ldap | ||
auth_provider = ldap | auth_provider = ldap | ||
| Zeile 44: | Zeile 44: | ||
# DNS Service Discovery nutzen (benötigt SRV Records!) | # DNS Service Discovery nutzen (benötigt SRV Records!) | ||
| − | ldap_uri = _srv_ | + | #ldap_uri = _srv_ |
| − | dns_discovery_domain = | + | #dns_discovery_domain = it213.int |
| − | + | # Direkte URI statt DNS Discovery | |
| + | ldap_uri = ldaps://ldap.it213.int | ||
| − | ldap_default_bind_dn = cn=admin,dc= | + | ldap_search_base = dc=it213,dc=int |
| + | |||
| + | ldap_default_bind_dn = cn=admin,dc=it213,dc=int | ||
ldap_default_authtok_type = password | ldap_default_authtok_type = password | ||
ldap_default_authtok = 123Start$ | ldap_default_authtok = 123Start$ | ||
| Zeile 55: | Zeile 58: | ||
# TLS komplett deaktivieren (für Testumgebungen) | # TLS komplett deaktivieren (für Testumgebungen) | ||
ldap_id_use_start_tls = false | ldap_id_use_start_tls = false | ||
| − | ldap_auth_disable_tls_never_use_in_production = true | + | #ldap_auth_disable_tls_never_use_in_production = true |
| − | ldap_tls_reqcert = | + | ldap_tls_reqcert = demand |
cache_credentials = true | cache_credentials = true | ||
| Zeile 67: | Zeile 70: | ||
[pam] | [pam] | ||
offline_credentials_expiration = 2 | offline_credentials_expiration = 2 | ||
| + | |||
</syntaxhighlight> | </syntaxhighlight> | ||
Version vom 18. November 2025, 09:20 Uhr
SSSD Client-Konfiguration
SSSD (System Security Services Daemon) ersetzt die alte Konfiguration mit libnss-ldap und libpam-ldap.
Installation
- apt install sssd-ldap ldap-utils
CA Cert besorgen
- cd /etc/ldap/
- wget https://web.samogo.de/certs/ca.crt
ldap.conf (Client)
- cat /etc/ldap/ldap.conf
# Basis-Domain für Suchanfragen
BASE dc=it213,dc=int
# LDAPS-Server (TLS auf Port 636)
URI ldaps://ldap.it213.int
# TLS / Zertifikatsprüfung
TLS_CACERT /etc/ldap/ca.crt
TLS_REQCERT demand
# Minimale TLS-Verison (optional, aber empfohlen)
TLS_PROTOCOL_MIN 1.2
SSSD Konfiguration
- vim /etc/sssd/sssd.conf
[sssd]
config_file_version = 2
services = nss, pam
domains = it213.int
[domain/it213.int]
id_provider = ldap
auth_provider = ldap
chpass_provider = ldap
# DNS Service Discovery nutzen (benötigt SRV Records!)
#ldap_uri = _srv_
#dns_discovery_domain = it213.int
# Direkte URI statt DNS Discovery
ldap_uri = ldaps://ldap.it213.int
ldap_search_base = dc=it213,dc=int
ldap_default_bind_dn = cn=admin,dc=it213,dc=int
ldap_default_authtok_type = password
ldap_default_authtok = 123Start$
# TLS komplett deaktivieren (für Testumgebungen)
ldap_id_use_start_tls = false
#ldap_auth_disable_tls_never_use_in_production = true
ldap_tls_reqcert = demand
cache_credentials = true
enumerate = true
[nss]
filter_users = root,daemon,bin,sys,sync,games,man,lp,mail,news,uucp,proxy,www-data,backup,list,irc,gnats,nobody,systemd-network,systemd-resolve,messagebus,_apt,uuidd,nslcd
filter_groups = root,daemon,bin,sys,adm,tty,disk,lp,mail,news,uucp,man,proxy,kmem,dialout,fax,voice,cdrom,floppy,tape,sudo,audio,dip,www-data,backup,operator,list,irc,src,gnats,shadow,utmp,video,sasl,plugdev,staff,games,users,nogroup,systemd-journal,systemd-network,systemd-resolve,input,kvm,render,crontab,netdev,messagebus,_apt,uuidd,ssh,nslcd
[pam]
offline_credentials_expiration = 2
Alternative ohne DNS SRV Records:
Falls die DNS SRV Records nicht funktionieren, kann man auch direkt den Server angeben:
[domain/it113.int]
id_provider = ldap
auth_provider = ldap
chpass_provider = ldap
# Direkte URI statt DNS Discovery
ldap_uri = ldap://ldap.it113.int:389
ldap_search_base = dc=it113,dc=int
# TLS deaktivieren
ldap_id_use_start_tls = false
ldap_auth_disable_tls_never_use_in_production = true
ldap_tls_reqcert = never
# ... rest wie oben
Berechtigungen setzen
chmod 600 /etc/sssd/sssd.conf
SSSD Service aktivieren und starten
systemctl enable sssd systemctl start sssd