From Fedora Project Wiki

Revision as of 19:26, 24 July 2013 by Jhrozek (talk | contribs) (Created page with "{{QA/Test_Case |description=Use nss-pam-ldapd to gain access to trusted domain users |setup= <ol> <li>Make sure your FreeIPA server is set up as in [[QA:Testcase_freeipa_trust...")
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Description

Use nss-pam-ldapd to gain access to trusted domain users

Setup

  1. Make sure your FreeIPA server is set up as in QA:Testcase_freeipa_trust_establish.
  2. Make sure nss-pam-ldapd is installed. This test uses RHEL-6.3 as an example, but the steps should be similar for other distribution or OS

How to test

Add test users and groups on the IPA server

When testing the legacy client, we will begin by creating a user and a group he is a member of on the server first to establish a baseline.

$ kinit admin
$ ipa user-add --first=test --last=user tuser
$ ipa group-add --desc="test group" tgroup
$ ipa group-add-member --users=tuser tgroup
$ ipa passwd tuser

Install required packages

The package installation step differs for every OS or distribution. For nss-pam-ldapd, simply install the packages using yum:

 # yum install nss-pam-ldapd authconfig

The authconfig utility will help us configure the PAM stack.

Configure nss-pam-ldapd and pam_ldap

Expected Results

All the test steps should end with the specified results.