Unterschiede
Hier werden die Unterschiede zwischen zwei Versionen angezeigt.
Beide Seiten der vorigen Revision Vorhergehende Überarbeitung Nächste Überarbeitung | Vorhergehende Überarbeitung | ||
content:serverbasics:docker-freeipa [2025/03/26 12:49] – [Prerequiusite] Daniel | content:serverbasics:docker-freeipa [2025/04/09 15:24] (aktuell) – [Setup your Browser to trust your IPA-Server] Daniel | ||
---|---|---|---|
Zeile 10: | Zeile 10: | ||
You will need a Docker- Host, that is rechable from the Internet with its fully qualifierd Domain- Name (FQDN) as described in the chapters before. The given Ports must be reachable from the clients. | You will need a Docker- Host, that is rechable from the Internet with its fully qualifierd Domain- Name (FQDN) as described in the chapters before. The given Ports must be reachable from the clients. | ||
- | |||
===== Docker composer ===== | ===== Docker composer ===== | ||
Zeile 259: | Zeile 258: | ||
Well, you're in trouble. The only way, i found to fix this, is to adjust the Hosts time to some time before that expiration- date, start the Container with " | Well, you're in trouble. The only way, i found to fix this, is to adjust the Hosts time to some time before that expiration- date, start the Container with " | ||
- | |||
===== Web- Gui / Logon ===== | ===== Web- Gui / Logon ===== | ||
Zeile 518: | Zeile 516: | ||
</ | </ | ||
+ | |||
+ | ==== Jxplorer - GUI for LDAP ==== | ||
+ | |||
+ | A very nice tool for exploring your LDAP- Tree is: [[http:// | ||
===== Port opening ===== | ===== Port opening ===== | ||
Zeile 534: | Zeile 536: | ||
This is done by adding an NS- Entry to you Internet-DNS. Please check yout ISP- Docs for how to add that NS entry for your domain: | This is done by adding an NS- Entry to you Internet-DNS. Please check yout ISP- Docs for how to add that NS entry for your domain: | ||
- | |||
< | < | ||
+ | |||
clients.domain.tld | clients.domain.tld | ||
Zeile 554: | Zeile 556: | ||
</ | </ | ||
- | This should return the IP of yout IPA- Server. If this works, you are done with the asic setup. | + | This should return the IP of yout IPA- Server. If this works, you are done with the basic setup. |
+ | |||
+ | ===== Client Setup ===== | ||
+ | |||
+ | to fully use Single Sign On on your Client, you will need to | ||
+ | |||
+ | - Setup your Browser to trust your IPA-Server | ||
+ | - Install a working Kerberos-Client and enroll your PC to the Domain | ||
+ | - Logon to your Linux- PC using SSSD/ | ||
+ | |||
+ | ==== Install Kerberos-Client and enroll your PC to the Domain ==== | ||
+ | |||
+ | Currently unfortunatelly i was not able to get Leap 15.6 working with freeipa-client (which worked for 15.5). So i switched to fedora (the KDE- Spin is very nice) | ||
+ | |||
+ | On Fedora, you can archive the Installation like this (Docs at [[https:// | ||
+ | < | ||
+ | |||
+ | #:> sudo yum install ipa-client | ||
+ | |||
+ | </ | ||
+ | |||
+ | After that, go on with the next chapter https:// | ||
+ | |||
+ | ---- | ||
+ | |||
+ | Using Ferdora, skip this! | ||
+ | |||
+ | After a fresh Install of OpenSUSE, you frist need to get the Package freeipa-client. | ||
+ | |||
+ | I personally made it working that way: | ||
+ | |||
+ | * Open Yast | ||
+ | * Choose User and Group- Management | ||
+ | * Go to Authentication Settings | ||
+ | * Select SSSD and Add a new FreeIPA-Domain. | ||
+ | * Enable Domain Logons | ||
+ | * Create Home-Directory = yes | ||
+ | * Sync Users and Groups | ||
+ | * SSH + Sudo = yes | ||
+ | |||
+ | As IPA- Server use '' | ||
+ | |||
+ | After those settings, exit from Yast. Do not care about Errors, that SSSD is not working: Your Client is missing important Domain Integration, | ||
+ | |||
+ | As the time beeing, there is no official Package for Leap 15.6. So you may use mine: | ||
+ | |||
+ | < | ||
+ | zypper addrepo https:// | ||
+ | zypper refresh | ||
+ | zypper install freeipa-client | ||
+ | |||
+ | #Add Additional Packages / setup some needed files | ||
+ | pip3 install ifaddr | ||
+ | ln / | ||
+ | |||
+ | </ | ||
+ | |||
+ | |||
+ | === Integrate to the Domain === | ||
+ | |||
+ | After that, you need to setup your Client maybe with this small script, called ipa_register_host.sh which you can put to /root: | ||
+ | |||
+ | < | ||
+ | # | ||
+ | TLDOMAIN=domain.tld | ||
+ | DOMAIN=clients.${TLDOMAIN} | ||
+ | SERVERFQDN=ipa.${TLDOMAIN} | ||
+ | #Serialnr of this device | ||
+ | HOSTNM=pc$(dmidecode -t system|grep -i " | ||
+ | FQDN=${HOSTNM}.${DOMAIN} | ||
+ | echo " | ||
+ | hostnamectl set-hostname ${HOSTNM} | ||
+ | #Check, if hostname is resolvable to this host - if not, add entry to / | ||
+ | if ! grep -q ${FQDN} "/ | ||
+ | echo " | ||
+ | echo "">>"/ | ||
+ | echo " | ||
+ | fi | ||
+ | INSTCMD=" | ||
+ | echo ${INSTCMD} | ||
+ | ${INSTCMD} | ||
+ | echo "Ende Installation, | ||
+ | |||
+ | </ | ||
+ | |||
+ | This script will integrate your PC into your IPA- Domain. Have the Password of your IPA- Admin ready. | ||
+ | |||
+ | After that, the SSSD should start, you may start, check and enable the Service. | ||
+ | < | ||
+ | |||
+ | To prevent this, use a network- cable and configure Networking at system start, OR configure your wireless lan to be setup first. Or first logon as root, then as User. | ||
+ | |||
+ | You should frist check on non-graphical terminal if this will work, because errors will be shown there. Good Luck. | ||
+ | |||
+ | |||
+ | ==== Setup your Browser to trust your IPA-Server ==== | ||
+ | |||
+ | This one is on Firefox, as it works. | ||
+ | |||
+ | Go to your IPAs ipa.domain.tld/ | ||
+ | |||
+ | For me, the Button '' | ||
+ | |||
+ | Than open Firefox settings, Privacy and Security, Authorities- Tab and select Import. Use the downloaded file and select all Checkboxes. This installs your IPA- Authority to your Browser as trusted CA. | ||
+ | |||
+ | Do Steps 2 - 5 as described. | ||
+ | |||
+ | After that, and after loggon to your pc with your FreeIPA-User, | ||
+ | |||
+ | If not, check if your klist shows some vaild Tickets. Otherwise inspect if this works: | ||
+ | |||
+ | < | ||
+ | HOSTNAME:~ # kinit admin | ||
+ | Password for admin@DOMAIN.TLD: | ||
+ | HOSTNAME:~ # klist | ||
+ | Ticket cache: KEYRING: | ||
+ | Default principal: admin@DOMAIN.TLD | ||
+ | |||
+ | Valid starting | ||
+ | 04/07/25 12: | ||
+ | |||
+ | </ | ||
+ | |||
+ | This should be all needed to work for Firefox. | ||
+ | |||
+ | ==== Setup Sudoers with FreeIPA/ | ||
+ | |||
+ | This is quite a cool feature to have client admin- users managed by putting them in an IPA- group. When Loggin in with SSSD they will get added to the sudoers, making them admin on the given machines. Check this out: [[https:// | ||
+ | |||
+ | |||
+ | ===== Next Steps ===== | ||
- | Next, you can integrate a Middleware for Authentication. You can, but you should NOT use LDAP as Authentication- Source for anything, as LDAP is very costy and would not deliver all needed APIs e.g. for SSO. | + | Next, you can integrate a Middleware for Authentication. You could, but you should NOT use FreeIPAs |