FreeIPA is a solution for managing users, groups, services, hosts and services. Its functionality is almost identical to Microsoft's Active Directory. Inside FreeIPA are common software projects working together to build the the whole solution. The applications I am talking about are
389-Directory-Server
MIT-Kerberos
BIND
Dogtag
and the Apache Webserver.
Following, I will explain the installation of the master-IPA server.
First we have to edit the hosts file (/etc/hosts) and fill in our IP, FQDN and Short-FQDN.
If the setup is done, it should output something like the following, telling us to configure our firewall.
389-Directory-Server
MIT-Kerberos
BIND
Dogtag
and the Apache Webserver.
Following, I will explain the installation of the master-IPA server.
First we have to edit the hosts file (/etc/hosts) and fill in our IP, FQDN and Short-FQDN.
[root@ipa01 ~]$ echo "$(hostname -I | awk '{print $1}') $(hostname) $(hostname -s)" >> /etc/host
The output should look like the following: 172.31.10.250 ipa01.archyslife.lan ipa01
Next up we update the machine to be on the latest software and install IPA-Server and IPA-DNS.We can start the installation script by running the following command
[root@ipa01 ~]$
yum -y update && yum -y install ipa-server ipa-server-dns epel-release
Output:
[root@ipa01 ~]$
ipa-server-install
The log file for this installation can be found in /var/log/ipaserver-install.log
==============================================================================
This program will set up the IPA Server.
This includes:
* Configure a stand-alone CA (dogtag) for certificate management
* Configure the Network Time Daemon (ntpd)
* Create and configure an instance of Directory Server
* Create and configure a Kerberos Key Distribution Center (KDC)
* Configure Apache (httpd)
* Configure DNS (bind)
To accept the default shown in brackets, press the Enter key.
WARNING: conflicting time&date synchronization service 'chronyd' will be disabled
in favor of ntpd
Existing BIND configuration detected, overwrite? [no]: yes
Enter the fully qualified domain name of the computer
on which you're setting up server software. Using the form
<hostname>.<domainname>
Example: master.example.com.
Server host name [ipa7.example.com]: ipa01.archyslife.lan
Warning: skipping DNS resolution of host ipa7.example.com
The domain name has been determined based on the host name.
Please confirm the domain name [example.com]: archyslife.lan
The kerberos protocol requires a Realm name to be defined.
This is typically the domain name converted to uppercase.
Please provide a realm name [EXAMPLE.COM]: ARCHYSLIFE.LAN
Certain directory server operations require an administrative user.
This user is referred to as the Directory Manager and has full access
to the Directory for system management tasks and will be added to the
instance of directory server created for IPA.
The password must be at least 8 characters long.
Directory Manager password: secretmanager
Password (confirm): secretmanager
The IPA server requires an administrative user, named 'admin'.
This user is a regular system account used for IPA server administration.
IPA admin password: secretadmin
Password (confirm): secretadmin
Do you want to configure DNS forwarders? [yes]: yes
Enter the IP address of DNS forwarder to use, or press Enter to finish.
Enter IP address for a DNS forwarder: 208.67.222.222
DNS forwarder 208.67.222.222 added
Enter IP address for a DNS forwarder: 208.67.220.220
DNS forwarder 208.67.220.220 added
Enter IP address for a DNS forwarder: <enter>
Do you want to configure the reverse zone? [yes]: yes
Please specify the reverse zone name [10.31.172.in-addr.arpa.]: 10.31.172.in-addr.arpa
Using reverse zone 10.31.172.in-addr.arpa.
The IPA Master Server will be configured with:
Hostname: ipa01.archyslife.lan
IP address: 172.31.10.250
Domain name: archyslife.lan
Realm name: archyslife.lan
BIND DNS server will be configured to serve IPA domain with:
Forwarders: 208.67.222.222, 208.67.220.220
Reverse zone: 10.31.172.in-addr.arpa.
Continue to configure the system with these values? [no]: yes
The following operations may take some minutes to complete.
Please wait until the prompt is returned.
This procedure will take about 5-15 minutes depending on your connection speed and hardware.If the setup is done, it should output something like the following, telling us to configure our firewall.
Setup complete
Next steps:
1. You must make sure these network ports are open:
TCP Ports:
* 80, 443: HTTP/HTTPS
* 389, 636: LDAP/LDAPS
* 88, 464: kerberos
* 53: bind
UDP Ports:
* 88, 464: kerberos
* 53: bind
* 123: ntp
2. You can now obtain a kerberos ticket using the command: 'kinit admin'
This ticket will allow you to use the IPA tools (e.g., ipa user-add)
and the web user interface.
Be sure to back up the CA certificate stored in /root/cacert.p12
This file is required to create replicas. The password for this
file is the Directory Manager password
Which we do with the following commands
[root@ipa01 ~]$
firewall-cmd --add-port={80/tcp,443/tcp,389/tcp,636/tcp,88/tcp,464/tcp,53/tcp,88/udp,464/udp,53/udp,123/udp} --permanent
[root@ipa01 ~]$
firewall-cmd --reload
The IPA-Serversite is configured properly. What we have to do now, in order to access the webinterface is put the IPA-Server as the 1st DNS-Server of our client.
Here we can sign in using the credentials we provided during the installation.
More information about FreeIPA can be found at the project's homepage.
FreeIPA Homepage: http://www.freeipa.org/page/Main_Page
Feel free to comment and / or suggest a topic.
Feel free to comment and / or suggest a topic.
Comments
Post a Comment