mise_en_place_de_sssd
Differences
This shows you the differences between two versions of the page.
| Next revision | Previous revision | ||
| mise_en_place_de_sssd [2017/01/27 11:35] – created wurtz | mise_en_place_de_sssd [2023/11/01 20:18] (current) – external edit 127.0.0.1 | ||
|---|---|---|---|
| Line 12: | Line 12: | ||
| - ajouter sss comme source pour login et mot de passe dans / | - ajouter sss comme source pour login et mot de passe dans / | ||
| - vérifier que dans le fichier / | - vérifier que dans le fichier / | ||
| + | |||
| + | Pour obtenir les fichiers ci-dessus le mieux est de ce déplacer dans un des répertoire backup par exemple de menkab et de faire des copies. | ||
| + | |||
| + | Les sauvegardes de menkab sont sous ''/ | ||
| + | |||
| + | Le répertoire '' | ||
| ============================================= / | ============================================= / | ||
| - | <blockquote># | + | <code> |
| + | # | ||
| # / | # / | ||
| # | # | ||
| Line 79: | Line 86: | ||
| aliases: | aliases: | ||
| - | sudoers: | + | sudoers: |
| + | </code> | ||
| ============================================= / | ============================================= / | ||
| + | < | ||
| + | [nss] | ||
| + | filter_groups = root | ||
| + | filter_users = root | ||
| + | reconnection_retries = 3 | ||
| + | [pam] | ||
| + | reconnection_retries = 3 | ||
| + | |||
| + | [sssd] | ||
| + | config_file_version = 2 | ||
| + | reconnection_retries = 3 | ||
| + | sbus_timeout = 30 | ||
| + | services = nss, pam | ||
| + | domains = IGBMC.U-STRASBG.FR | ||
| - | ============================================= /etc/pam.d/ | + | [domain/ |
| + | #With this as false, a simple " | ||
| + | enumerate | ||
| + | cache_credentials | ||
| + | |||
| + | id_provider | ||
| + | # | ||
| + | auth_provider | ||
| + | chpass_provider | ||
| + | |||
| + | # | ||
| + | ldap_uri | ||
| + | ldap_search_base | ||
| + | # | ||
| + | # | ||
| + | |||
| + | #This parameter requires that the DC present a completely validated certificate chain. If you're testing or don't care, use ' | ||
| + | # | ||
| + | ldap_tls_reqcert = allow | ||
| + | krb5_realm = IGBMC.U-STRASBG.FR | ||
| + | dns_discovery_domain = IGBMC.U-STRASBG.FR | ||
| + | |||
| + | ldap_schema = rfc2307bis | ||
| + | ldap_access_order = expire | ||
| + | ldap_account_expire_policy = ad | ||
| + | ldap_force_upper_case_realm = true | ||
| + | |||
| + | ldap_user_search_base = dc=igbmc, | ||
| + | ldap_group_search_base = dc=igbmc, | ||
| + | ldap_user_object_class = user | ||
| + | ldap_user_name = sAMAccountName | ||
| + | ldap_user_fullname = displayName | ||
| + | ldap_user_home_directory = unixHomeDirectory | ||
| + | # | ||
| + | ldap_group_object_class = group | ||
| + | ldap_group_name = sAMAccountName | ||
| + | |||
| + | #Bind credentials | ||
| + | # | ||
| + | # | ||
| + | # | ||
| + | # | ||
| + | ldap_default_bind_dn = CN=Authentification Cavarelli-Wurtz, | ||
| + | ldap_default_authtok = 52S5rF(JrNP5xU | ||
| + | |||
| + | # | ||
| + | # | ||
| + | |||
| + | dyndns_update = true | ||
| + | dyndns_refresh_interval = 43200 | ||
| + | dyndns_update_ptr = true | ||
| + | dyndns_ttl = 3600 | ||
| + | debug_level = 7 | ||
| + | </ | ||
| + | ============================================= / | ||
| + | < | ||
| + | # | ||
| + | # / | ||
| + | # | ||
| + | # This file is included from other service-specific PAM config files, | ||
| + | # and should contain a list of modules that define tasks to be performed | ||
| + | # at the start and end of sessions of *any* kind (both interactive and | ||
| + | # non-interactive). | ||
| + | # | ||
| + | # As of pam 1.0.1-6, this file is managed by pam-auth-update by default. | ||
| + | # To take advantage of this, it is recommended that you configure any | ||
| + | # local modules either before or after the default block, and use | ||
| + | # pam-auth-update to manage selection of other modules. | ||
| + | # pam-auth-update(8) for details. | ||
| + | # here are the per-package modules (the " | ||
| + | session [default=1] pam_permit.so | ||
| + | # here's the fallback if no module succeeds | ||
| + | session requisite pam_deny.so | ||
| + | # prime the stack with a positive return value if there isn't one already; | ||
| + | # this avoids us returning an error just because nothing sets a success code | ||
| + | # since the modules above will each just jump around | ||
| + | session required pam_permit.so | ||
| + | # The pam_umask module will set the umask according to the system default in | ||
| + | # / | ||
| + | # umask settings with different shells, display managers, remote sessions etc. | ||
| + | # See "man pam_umask" | ||
| + | session optional pam_umask.so | ||
| + | # and here are more per-package modules (the " | ||
| + | session optional pam_krb5.so | ||
| + | session required pam_unix.so | ||
| + | # | ||
| + | session optional pam_systemd.so | ||
| + | # end of pam-auth-update config | ||
| + | </ | ||
mise_en_place_de_sssd.1485516901.txt.gz · Last modified: (external edit)
