Thanks for the reply. Responses inline…
[QUOTE=tbrinkmann;25660]Yes drastically !
SLES12 now use the SSSD to connect to an external AUTH Service SSSD(System Security Services Daemon) → https://fedorahosted.org/sssd/
[COLOR=#ff0000]OpenLDAP is not recommended anymore[/COLOR][/QUOTE]
By this, I assume you mean a direct configuration to OpenLDAP as was done in nsswitch, as now the OpenLDAP “passes through” SSSD?
[QUOTE=tbrinkmann;25660]
In SLES11 we also used yast to configure openLDAP. Now we use file bast SSSD config
- SSSD.CONF
#>vi /etc/sssd/sssd.conf
[sssd]
config_file_version = 2
services = nss, pam
domains = [LDAPSERVER]
[nss]
filter_groups = root
filter_users = root
[pam]
[domain/[LDAPSERVER]]
id_provider = ldap
auth_provider = ldap
ldap_uri = ldaps://[LDAPSERVER]:636
ldap_search_base = ou=XX
ldap_tls_cacert = /etc/ssl/certs/root.pem
ldap_tls_cacertdir = /etc/ssl/certs
#debug_level = 1
case_sensitive = false
create_homedir = true
ldap_network_timeout = 3
access_provider = ldap
ldap_access_filter = groupMembership=cn=LDAP-Users-
#ldap_schema = rfc2307 <<<<<<<<<<<<<<<<<<<<<<<< DEFAULT
[COLOR=#000000]#ldap_user_object_class = posixAccount <<<<<<<< DEFAULT[/COLOR]
#ldap_user_name = uid <<<<<<<<<<<<<<<<<<<<<<<<< DEFAULT
- for sshd create homedir after login you need to use pam
#>pam-config --add --mkhomedir
Hope that helps !
Till[/QUOTE]
Some clarification needed.
In the /etc/sssd/sssd.conf file, you suggest[INDENT][sssd]
config_file_version = 2
services = nss, pam
[COLOR=#ff0000]domains = [LDAPSERVER][/COLOR]
…
[/INDENT]
Is the "domains = " line to indicate the hostname/IP of the LDAP server, or the LDAPdomain (as indicated by the base dc= option?[INDENT][COLOR=#ff0000]ldap_search_base = ou=XX[/COLOR][/INDENT]
What is that base? is it the “ou=users,dc=example,dc=com”, or it is just the “dc=example,dc=com”[INDENT]
[COLOR=#ff0000]ldap_access_filter = groupMembership=cn=LDAP-Users-[/COLOR]
[/INDENT]
Not sure I get this one, as I don’t see this attribute (groupMembership) in my ldap
Could or should I be using the option: [COLOR=#ff0000]ldap_access_filter = ou=Users,dc=example,dc=com[/COLOR][COLOR=#000000] since all users would belong to this OU?
[/COLOR][COLOR=#000000][INDENT]#[COLOR=#ff0000]ldap_schema = rfc2307[/COLOR] <<<<<<<<<<<<<<<<<<<<<<<< DEFAULT
[COLOR=#000000]#ldap_user_object_class = posixAccount <<<<<<<< DEFAULT[/COLOR]
#ldap_user_name = uid <<<<<<<<<<<<<<<<<<<<<<<<< DEFAULT[/INDENT]
For correct group membership in order to get the member: attribute, should I use rfc2307bis ldap_schema instead? Thanks again for the response, and hopefully, with those pointers I will be able to get the issue sorted out. [/COLOR][COLOR=#000000][FONT=monospace]
[/FONT][/COLOR][COLOR=#000000][FONT=monospace]
[/FONT][/COLOR][COLOR=#555555][FONT=monospace]
[/FONT][/COLOR]