At this point, I'm assuming you have a functional zimbra-server up and running including dns-records.
In my case, I was using my 2 FreeIPA-Servers to handle DNS and authentication. You can add a MX-Record to integrated DNS by running
First we will have to ensure, that we will still be able to access the administration panel even though there is no connection to the LDAP server. You can do this by issuing the following command:
Now we'll open up the administrative console from zimbra by pointing our browser to https://zimbra.archyslife.lan:7071/zimbraAdmin.
The Login Credentials for this are your the admin account you created during the setup.
In the left panel, click on 'Configure' --> 'Domains' -->
select your domain and click on 'Authentication' -->
Click on the little gearwheel on the upper right hand corner and choose 'configure authentication'. Use external LDAP
Enter your LDAP-Server-Names, in my case it's:
Click next tick the box for using DN / Password to bind to external server.
The DN required here is the dn used in the ldif file we created and imported earlier.
Now go ahead an test with one of your created users. The test should be successfull.
Your Zimbra-Server is now registered to FreeIPA and can obtain user data from the Directory Server.
Feel free to comment and / or suggest a topic.
In my case, I was using my 2 FreeIPA-Servers to handle DNS and authentication. You can add a MX-Record to integrated DNS by running
or
ipa dnsrecord-add archyslife.lan zimbra --mx-preference=0 --mx-exchanger=zimbra.archyslife.lan
[archy@ipa01 ~]$
Note: the hostname of the machine I'm using is zimbra and the dns-zone is archyslife.lan. The 'mx-rec' option is used for raw mx-records meaning the preference and exchanger must be given.
ipa dnsrecord-add archyslife.lan zimbra --mx-rec="0 zimbra.archyslife.lan"
[archy@ipa01 ~]$
First we will have to ensure, that we will still be able to access the administration panel even though there is no connection to the LDAP server. You can do this by issuing the following command:
We will also have to create a account for zimbra to bind to for the IPA-Service. I'll be using this LDIF to create the service-account. Contents of the LDIF:
su -l zimbra
[archy@zimbra ~]$ sudo
zmprov modifydomain archyslife.lan zimbraAuthFallbackToLocal TRUE
[zimbra@zimbra ~]$
dn: uid=zimbra,cn=sysaccounts,cn=etc,dc=archyslife,dc=lan
changetype: add
objectclass: account
objectclass: simplesecurityobject
uid: zimbra
userPassword: i_am_a_secret_password
passwordExpirationTime: 20380119031407Z
nsIdleTimeout: 0
Next, we have to import it to the Directory ServerThat's it. The IPA Directory is set up.
ldapmodify -h ipa01.archyslife.lan -p 389 -x -D "cn=Directory Manager" -w directory_manager_password -f zimbra_sysacc.ldif
[archy@ipa01 ~]$ sudo
Now we'll open up the administrative console from zimbra by pointing our browser to https://zimbra.archyslife.lan:7071/zimbraAdmin.
The Login Credentials for this are your the admin account you created during the setup.
Welcome Screen for the admin console |
select your domain and click on 'Authentication' -->
Click on the little gearwheel on the upper right hand corner and choose 'configure authentication'. Use external LDAP
Enter your LDAP-Server-Names, in my case it's:
ipa01.archyslife.lan
ipa02.archyslife.lan
Use the following filter for LDAP: (&(objectClass=inetOrgPerson)(objectClass=posixAccount)(uid=%u))
And the following LDAP search base: cn=users,cn=accounts,dc=archyslife,dc=lan
It should look something like this. |
Click next tick the box for using DN / Password to bind to external server.
The DN required here is the dn used in the ldif file we created and imported earlier.
uid=zimbra,cn=sysaccounts,cn=archyslife,dc=lan
Bind password: i_am_a_secret_password
Confirm password: i_am_a_secret_password
the domain binding |
Now go ahead an test with one of your created users. The test should be successfull.
Your Zimbra-Server is now registered to FreeIPA and can obtain user data from the Directory Server.
Feel free to comment and / or suggest a topic.
Comments
Post a Comment