From Fedora Project Wiki

(Template page)
No edit summary
Line 2: Line 2:
|description=Join the current machine to an Active Directory using OpenLMI
|description=Join the current machine to an Active Directory using OpenLMI
|setup=
|setup=
# TODO TODO TODO TODO This page is not done
Install the components
# Fulfill the [[QA:Testcase_realmd_prerequisites|prerequisites and make sure your Active Directory domain access works]].
<pre>
# XXX Requirements to satisfy first
sudo setenforce 0
# XXX Setup step
sudo yum install sblim-sfcb tog-pegasus pywbem
# XXX Setup step
sudo yum install realmd openlmi-realmd
#: XXX Setup substep
wget http://jdennis.fedorapeople.org/realmd-cim
chmod +x realmd-cim
</pre>
 
Verify pegasus is running
<pre>sudo systemctl status tog-pegasus</pre>
 
Set the pegasus password, in this example we'll use XXXX as the password
<pre>sudo passwd pegasus</pre>
 
Fulfill the [[QA:Testcase_realmd_prerequisites|prerequisites and make sure your Active Directory domain access works]].


|actions=
|actions=
# XXX Step to run the join command
# Show joined domains
#: XXX Notes about what should be seen
<pre>
# XXX Press enter to boot and run the installation.
realm list
./realmd-cim -u pegasus -p XXXX list
</pre>
<code>realmd-cim</code> should show equivalent information as to what <code>realmd-cim</code> shows


|results=
|results=

Revision as of 23:24, 8 May 2013

Description

Join the current machine to an Active Directory using OpenLMI

Setup

Install the components

sudo setenforce 0
sudo yum install sblim-sfcb tog-pegasus pywbem
sudo yum install realmd openlmi-realmd
wget http://jdennis.fedorapeople.org/realmd-cim
chmod +x realmd-cim

Verify pegasus is running

sudo systemctl status tog-pegasus

Set the pegasus password, in this example we'll use XXXX as the password

sudo passwd pegasus

Fulfill the prerequisites and make sure your Active Directory domain access works.

How to test

  1. Show joined domains
realm list
./realmd-cim -u pegasus -p XXXX list

realmd-cim should show equivalent information as to what realmd-cim shows

Expected Results

  1. Check if you are joined to the domain
    realm list
    The domain should be listed
    Make note of the login format
  2. Check that domain accounts can be resolved
    getent passwd 'AD\User'
    Make sure to use the quotes around the user name.
    You should see an output line that looks like passwd(5) output. It should contain an appropriate home directory, and a shell.
    Use the login-formats you saw above, to build a remote user name. It will be in the form of DOMAIN\User, where DOMAIN is the first part of your full Active Directory domain name.
  3. Check that you have an appropriate entry in your hosts keytab.
    sudo klist -k
  4. Check that you can use your keytab with kerberos
    sudo kinit -k 'HOSTNAME$@AD.EXAMPLE.COM'
    Make sure to use quotes around the argument, because of the characters in there. #: Make sure the hostname and domain are capitalized.
    Use the principal from the output of the klist command above. Use the one that's capitalized and looks like HOSTNAME$@DOMAIN.
    There should be no output from this command.
  5. Try to log into the machine as a domain account at the console.
    This should automatically create a new home directory for the user, and log into a shell prompt.



More: Try it with FreeIPA

Use a FreeIPA domain with the OpenLMI join.

Troubleshooting

  • RHBZ #XXXXXX If you see SELinux issues see this bug for details.
    • Please do this and report all AVC's to the above bug.
$ sudo setenforce permissive
... do the test
$ sudo grep realmd /var/log/audit/audit.log