CentOS Stream 8
Sponsored Link

OpenLDAP : Configure LDAP Client
2021/03/11
 
Configure LDAP Client in order to share users' accounts in your local networks.
[1] Install OpenLDAP Client.
[root@node01 ~]#
dnf -y install openldap-clients sssd sssd-ldap oddjob-mkhomedir
# swicth authentication provider to sssd
# for [with-mkhomedir], specify it if you need (create home directory when initial login)

[root@node01 ~]#
authselect select sssd with-mkhomedir --force
Backup stored at /var/lib/authselect/backups/2022-03-23-05-13-41.enGlNB
Profile "sssd" was selected.
The following nsswitch maps are overwritten by the profile:
- passwd
- group
- netgroup
- automount
- services

Make sure that SSSD service is configured and enabled. See SSSD documentation for more information.

- with-mkhomedir is selected, make sure pam_oddjob_mkhomedir module
  is present and oddjobd service is enabled and active
  - systemctl enable --now oddjobd.service

[root@node01 ~]#
vi /etc/openldap/ldap.conf
# add to the end : your LDAP server's URL and Suffix

URI ldap://dlp.srv.world/
BASE dc=srv,dc=world
[root@node01 ~]#
vi /etc/sssd/sssd.conf
# create new
# replace [ldap_uri], [ldap_search_base] to your own environment value

[domain/default]
id_provider = ldap
autofs_provider = ldap
auth_provider = ldap
chpass_provider = ldap
ldap_uri = ldap://dlp.srv.world/
ldap_search_base = dc=srv,dc=world
ldap_id_use_start_tls = True
ldap_tls_cacertdir = /etc/openldap/certs
cache_credentials = True
ldap_tls_reqcert = allow

[sssd]
services = nss, pam, autofs
domains = default

[nss]
homedir_substring = /home

[root@node01 ~]#
chmod 600 /etc/sssd/sssd.conf

[root@node01 ~]#
systemctl restart sssd oddjobd

[root@node01 ~]#
systemctl enable sssd oddjobd

[root@node01 ~]#
logout
CentOS Stream 8
Kernel 4.18.0-365.el8.x86_64 on an x86_64

Activate the web console with: systemctl enable --now cockpit.socket

node01 login: redhat      # LDAP user
Password:                 # password
Creating home directory for redhat.
[redhat@node01 ~]$        # logined

# changing LDAP password is common way with passwd

[redhat@node01 ~]$
Changing password for user redhat.
Current Password:        # current password
New password:            # new password
Retype new password:
passwd: all authentication tokens updated successfully.
Matched Content