1 | | Work in progress. |
| 1 | Here is an SSSD configuration that is working in production against OIT LDAP. You will still need to manage certificates properly to use this in a secure manner. While you are testing, you can add "ldap_tls_reqcert = allow" as a line under the domain definition. This will help you debug by ruling out any certificate issues. DO NOT use that line in production! |
| 2 | |
| 3 | The only real deviations from a standard config is the addition of "min_id = 1", as OIT has group IDs in the 10s-20s. "enumerate = true" will create a local precache, and allows tools such as finger to operate normally. |
| 4 | |
| 5 | {{{ |
| 6 | [sssd] |
| 7 | config_file_version = 2 |
| 8 | reconnection_retries = 3 |
| 9 | sbus_timeout = 30 |
| 10 | services = nss, pam |
| 11 | domains = oit |
| 12 | |
| 13 | [nss] |
| 14 | filter_groups = root |
| 15 | filter_users = root |
| 16 | reconnection_retries = 3 |
| 17 | |
| 18 | [pam] |
| 19 | reconnection_retries = 3 |
| 20 | |
| 21 | [domain/oit] |
| 22 | auth_provider = ldap |
| 23 | ldap_id_use_start_tls = True |
| 24 | chpass_provider = ldap |
| 25 | cache_credentials = True |
| 26 | krb5_realm = EXAMPLE.COM |
| 27 | ldap_search_base = o=Princeton University,c=US |
| 28 | id_provider = ldap |
| 29 | ldap_uri = ldap://ldap.princeton.edu/ |
| 30 | krb5_kdcip = kerberos.example.com |
| 31 | ldap_tls_cacertdir = /etc/pki/tls/certs |
| 32 | min_id = 1 |
| 33 | enumerate = true |
| 34 | }}} |
| 35 | |
| 36 | |
| 37 | Someone else once wrote this: |