roumano.ldap_client
Requirements
- Optional: Define a variable
domainname
to update/etc/hosts
with the IP and hostname of the LDAP server.
Example of a group_vars/inventory.yml
:
---
ldap:
ssl: exemple_ca.crt
server: "ldaps://ldap1/,ldaps://ldap2/"
base: "dc=exemple,dc=com"
bind: "cn=readonly"
servers:
- hostname: ldap1
ip: 10.0.0.1
- hostname: ldap2
ip: 10.0.0.2
domainname: 'aws.edifixio.com'
Example of how to use:
- { role: ldap_client, when: ldap is defined and ldap.base is defined and ldap.server is defined }
Tasks to perform:
- Install the necessary LDAP packages:
- For Debian:
sssd-ldap
,sssd-tools
,sudo
- For RedHat:
authconfig
,sssd-ldap
,sssd-tools
,sudo
,openldap-clients
- For Debian:
- Push SSL certificate if there is one.
- Update
/etc/hosts
for the LDAP server. - Update
/etc/nsswitch.conf
(addsss
). - Enable the
sssd
service to start at machine boot. - Run
authconfig
(on RedHat) to configure PAM and other settings. - Run
pam-auth-update
(on Debian) to configure PAM. - Enable home directory creation at the first login using
pam_mkhomedir.so
(for Debian). - Configure
/etc/openldap/ldap.conf
for default LDAP parameters inldapsearch
. - In
SSHD
: AddAuthorizedKeysCommand
andAuthorizedKeysCommandUser
in/etc/ssh/sshd_config
to retrieve SSH keys from LDAP.
Informazioni sul progetto
Role to install and configuration ldap client
Installa
ansible-galaxy install roumano.ldap_client
Licenza
gpl-3.0
Download
182
Proprietario