Today we will configure our OpenLDAP server to store SSH public keys so that the OpenSSH daemon can fetch them and thus authenticate our users.
To do this, we first need two CentOS machines. This is easy to achieve via a KickStart. If you need help building a KickStart server, follow my previous blog post. Then we need a working OpenLDAP server. If you don't have one, then follow my previous blog posts to set one up.
Ideas and solutions on IT architecture, UNIX, Linux, Oracle, Telecommunication, storage and virtualization in order to help other systems administrators and DBAs.
Showing posts with label pam. Show all posts
Showing posts with label pam. Show all posts
Monday, November 4, 2013
Thursday, June 28, 2012
PC-BSD / FreeBSD Kerberos GNOME Graphical Login
A quick post just to show how to configure a PC-BSD or a FreeBSD workstation to run kinit(1) right when you login. In this example, the desktop machine is running PC-BSD 9.0 with the GNOME desktop.
Monday, May 7, 2012
HOWTO : OpenLDAP 2.4 Users & Groups Management and PAM Authentication on CentOS 6.2
Today we will create and manage users and groups in our OpenLDAP 2.4 daemon running on a CentOS 6.2 machine. Recall our goals :
Install OpenLDAP 2.4.Configure Transport Layer Security (TLS).- Manage users and groups in OpenLDAP.
- Configure pam_ldap to authenticate users via OpenLDAP.
- Use OpenLDAP as sudo's configuration repository.
- Use OpenLDAP as automount map repository for autofs.
- Use OpenLDAP as NFS netgroup repository again for autofs.
- Use OpenLDAP as the Kerberos principal repository.
- Setup OpenLDAP backup and recovery.
- Setup OpenLDAP replication.
Subscribe to:
Posts (Atom)