RHCSA Rapid Track
In this lab, you will connect your desktopX system to become
a client of the LDAP server running on classroom.example.com. You
will configure your desktopX system to use the Kerberos
infrastructure provided by classroom.example.com for additional
authentication.
| Resources: | |
|---|---|
| Files: |
http://classroom.example.com/pub/example-ca.crt
|
| Machines: | desktopX |
Outcomes
desktopX configured for LDAP user information and Kerberos
authentication from classroom.example.com.
Reset your
desktopXsystem.
To simplify user management, your company has decided to switch to centralized user management. Another team has already set up all the required LDAP and Kerberos services. Centralized home directories are not yet available, so the system should be configured to create local home directories when a user first logs in.
Given the following information, configure your desktopX
system to use user information from the LDAP server, and authentication
services from the Kerberos KDC. DNS service records for the realm have
not yet been configured, so you will have to configure Kerberos
settings manually.
| Name | Value |
|---|---|
| LDAP server |
ldap://classroom.example.com
|
| LDAP base DN |
dc=example,dc=com
|
| Use TLS | Yes |
| Root CA |
http://classroom.example.com/pub/example-ca.crt
|
| Kerberos realm |
EXAMPLE.COM
|
| Kerberos KDC |
classroom.example.com
|
| Kerberos admin server |
classroom.example.com
|
Start by installing the necessary packages: sssd, krb5-workstation, and authconfig-gtk.
[student@desktopX ~]$sudo yum -y install sssd authconfig-gtk krb5-workstation
Launch the Authentication Configuration application, then apply the settings from the table for both LDAP and Kerberos options.
Either launch system-config-authentication from the command line, or launch → → . Enter the
studentpassword (student) when asked.Make sure the Identity & Authentication tab is open.
In the User Account Database, select LDAP.
Enter
dc=example,dc=comin the LDAP Search Base DN field, andclassroom.example.comin the LDAP Server field.Make sure the Use TLS to encrypt connections box is checked, then click the button.
Enter
http://classroom.example.com/pub/example-ca.crtin the Certificate URL field, then click .Select Kerberos password from the Authentication Method dropdown, and uncheck both Use DNS... boxes.
Enter
EXAMPLE.COMin the REALM field, andclassroom.example.comin both the KDCs and Admin Servers fields.Switch to the Advanced Options tab and place a checkmark in the Create home directories on the first login box.
Click the button to apply your changes.
Use both getent and ssh to verify your work. You can use the username
ldapuser(whereXis your station number) with the passwordXkerberos. Please note that your users will not yet have a home directory mounted.[student@desktopX ~]$getent passwd ldapuserldapuserX:*:170X:170X:LDAP Test User X:/home/guests/ldapuserX:/bin/bashX[student@desktopX ~]$ssh ldapuserThe authenticity of host 'localhost (::1)' can't be established. EDCSA key fingerprint is XX:XX:XX:XX:XX:XX:XX:XX:XX:XX:XX:XX:XX:XX:XX:XX.X@localhostAre you sure you want to continue connecting (yes/no)?yesWarning: Permanently added 'localhost' (ECDSA) to the list of known hosts.ldapuserX@localhost's password:kerberosCreating home directory for ldapuserX.[ldapuserX@desktopX ~]$pwd/home/guests/ldapuserX[ldapuserX@desktopX ~]$ls -a. .bash_history .bash_profile .cache .mozilla .. .bash_logout .bashrc .config[ldapuserX@desktopX ~]$logout