weehal.sssd
Ansible Role: sssd-ldap
This Ansible Role installs and sets up sssd, nsswitch, pam, and sshd to manage user accounts using LDAP.
Currently tested on:
- Ubuntu 18.04.2 LTS (Bionic Beaver)
Requirements
You need to provide some variables to connect to the LDAP server.
You can write the LDAP server login credentials in plain text, but it’s highly recommended to use Ansible Vault for security.
ldap_search_base: "cn=accounts,dc=example,dc=com"
ldap_user_search_base: "cn=users,cn=accounts,dc=example,dc=com"
ldap_group_search_base: "cn=groups,cn=accounts,dc=example,dc=com"
ldap_pam_filter: "&(objectclass=posixAccount)(!(nsaccountlock=True))"
ldap_bind_dn: !vault |
$ANSIBLE_VAULT;1.1;AES256
( ... )
ldap_bind_pw: !vault |
$ANSIBLE_VAULT;1.1;AES256
( ... )
Other Role Variables
You can find available options in defaults/main.yml
and templates/sssd.conf.j2
.
The most important options are:
use_sssd: true # why would anyone want to change this?
sssd_use_ssh_keys_from_ldap: true
ldap_user_ssh_public_key: "ipaSshPubKey"
sshd_AuthorizedKeysCommand: /usr/bin/sss_ssh_authorizedkeys
sshd_AuthorizedKeysCommandUser: root
sssd_create_homedir: true
sssd_cache_credentials: true
Dependencies
None.
Example Playbook
- hosts: servers
roles:
- role: weehal.sssd
License
BSD
Author Information
This role was created in 2019 by Michał 'warf' Łuczak
Informazioni sul progetto
Install and configure sssd, pam and sshd to get user accounts from LDAP
Installa
ansible-galaxy install weehal.sssd
Licenza
gpl-2.0
Download
43k
Proprietario