Openldap posix accounts: Unterschied zwischen den Versionen

Aus Xinux Wiki
Zur Navigation springen Zur Suche springen
 
(2 dazwischenliegende Versionen desselben Benutzers werden nicht angezeigt)
Zeile 1: Zeile 1:
 +
=nsswitch und pam anbinden=
 +
*apt install libnss-ldap libpam-ldap ldap-utils
 
=ldap.conf=
 
=ldap.conf=
 
*[[ldap.conf]]
 
*[[ldap.conf]]
=nsswitch und pam anbinden=
 
*apt install libnss-ldap libpam-ldap ldap-utils
 
 
==Wir benutzen nur eine Konfigurationdatei==
 
==Wir benutzen nur eine Konfigurationdatei==
 
*ln -sf /etc/ldap/ldap.conf /etc/ldap.conf
 
*ln -sf /etc/ldap/ldap.conf /etc/ldap.conf
Zeile 23: Zeile 23:
 
  uid=2001(leroy) gid=3001(it) Gruppen=3001(it)
 
  uid=2001(leroy) gid=3001(it) Gruppen=3001(it)
  
=Anpassen der Pam=
+
*[[pam ldap]]
==Die Authentifizierung(installation nimmt einstellung schon vor)==
 
*cat /etc/pam.d/common-auth
 
auth    [success=2 default=ignore]      pam_unix.so nullok
 
auth    [success=1 default=ignore]      pam_ldap.so use_first_pass
 
auth    requisite                      pam_deny.so
 
auth    required                        pam_permit.so
 
 
 
==Das Accounting==
 
*cat /etc/pam.d/common-account
 
account [success=2 new_authtok_reqd=done default=ignore]       pam_unix.so
 
account [success=1 default=ignore]     pam_ldap.so
 
account requisite                      pam_deny.so
 
account required                        pam_permit.so
 
 
 
==Passwort änderungen==
 
;use_authtok gegebenfalls entfernen
 
 
 
*cat /etc/pam.d/common-password
 
password        [success=2 default=ignore]      pam_unix.so obscure yescrypt
 
password        [success=1 user_unknown=ignore default=die]    pam_ldap.so try_first_pass
 
password        requisite                      pam_deny.so
 
password        required                        pam_permit.so
 
 
 
==Die Session==
 
*cat /etc/pam.d/common-session
 
session [default=1]                    pam_permit.so
 
session requisite                      pam_deny.so
 
session required                        pam_permit.so
 
'''session required pam_mkhomedir.so  skel=/etc/skel umask=0022 '''
 
session required                        pam_unix.so
 
session optional                        pam_ldap.so
 
session optional                        pam_systemd.so
 
 
 
==su -==
 
*su - thomas
 
  
 
=sudo opportunity 1=
 
=sudo opportunity 1=

Aktuelle Version vom 16. Januar 2023, 13:26 Uhr

nsswitch und pam anbinden

  • apt install libnss-ldap libpam-ldap ldap-utils

ldap.conf

Wir benutzen nur eine Konfigurationdatei

  • ln -sf /etc/ldap/ldap.conf /etc/ldap.conf
  • ln -sf /etc/ldap/ldap.conf /etc/libnss-ldap.conf
  • ln -sf /etc/ldap/ldap.conf /etc/pam_ldap.conf

Test

  • ldapsearch -x | head -20

ergänzen /etc/nsswitch.conf

passwd:         compat ldap
group:          compat ldap

nsswitch tests

passwd test

getent passwd | grep 3001
leroy:x:2001:3001:leroy:/home/leroy:/bin/bash

group test

getent group | grep 3001
it:*:3001:

id test

id leroy
uid=2001(leroy) gid=3001(it) Gruppen=3001(it)

sudo opportunity 1

  • /etc/pam.d/common-auth
#First entry should be
auth    required     pam_group.so use_first_pass
  • /etc/security/group.conf
*;*;*;Al0000-2400;audio,cdrom,dialout,floppy,sudo,adm,video

sudo opportunity 2

  • visudo
%it     ALL=(ALL:ALL) ALL