Check the FQDN of your server by executing following two commands in the terminal.

Similar documents
Install Apache, PHP And MySQL On CentOS 7 (LAMP)

Spacewalk. Installation Guide RHEL 5.9

Spacewalk. Installation Guide for CentOS 6.4

Configure CEM Controller on CentOS 6.9

Oracle VM. Installation and Upgrade Guide for Release 3.0.3

Configure HOSTNAME by adding the hostname to the file /etc/sysconfig/network. Do the same to all the all nodes.

This tutorial will guide you how to setup and run your own minecraft server on a Linux CentOS 6 in no time.

Flush Dns Settings Linux Redhat 5 Step Step

Configuring User Access for the Cisco PAM Desktop Client

Installing Connector on Linux

ULTEO OPEN VIRTUAL DESKTOP CENTOS 6.0 SUPPORT

Content Gateway v7.x: Frequently Asked Questions

User Manual op5 System 3.1

Configuring User Access for the Cisco PAM Desktop Client

(U) Hive Infrastructure Installation and Configuration Guide

Link Gateway Initial Configuration Manual

Build Your Own Oracle RAC 11g Release 2 Cluster on Red Hat 4 and iscsi

Setting Up Identity Management

Authenticating and Importing Users with AD and LDAP

Virtual Hosting With PureFTPd And MySQL (Incl. Quota And Bandwidth Management) On CentOS 6.4

Configure HOSTNAME by adding the hostname to the file /etc/sysconfig/network. Do the same to all the other 3(4) nodes.

BLUEPRINT TEAM REPOSITORY. For Requirements Center & Requirements Center Test Definition

User Manual. op5 System 3.0

a. puppet should point to master (i.e., append puppet to line with master in it. Use a text editor like Vim.

Authenticating and Importing Users with AD and LDAP

Red Hat Gluster Storage 3.2 Console Installation Guide

LAMP Stack with VirtualHosts On Centos 6.x

Deploying Rubrik Datos IO to Protect MongoDB Database on GCP

Realms and Identity Policies

HOW TO SECURELY CONFIGURE A LINUX HOST TO RUN CONTAINERS

Two factor authentication for Apache using mod_auth_xradius

An internal CA that is part of your IT infrastructure, like a Microsoft Windows CA

Authenticating and Importing Users with Active Directory and LDAP

Installing idenprotect server on RHEL 6 or CentOS 6. idenprotect Ltd.

Braindumps EX200 15q

Gateway Guide. Leostream Gateway. Advanced Capacity and Connection Management for Hybrid Clouds

High Availability & Fault Tolerance of the Deployment Manager using NFS on Linux

Globus Online: Setup and configure Globus Connect Endpoints howto guide - V1.4

Deploying Oracle Real Application Clusters 11g R2 on Red Hat Linux 6.x

AsteriskNow IPTables Firewall Configuration

Using SSL/TLS with Active Directory / LDAP

How to Use This Lab Manual

INUVIKA TECHNICAL GUIDE

Using Fluentd as an alternative to Splunk

ULTEO OPEN VIRTUAL DESKTOP SUSE LINUX ENTERPRISE SERVER (SLES) 11 SP1 SUPPORT

Installation 1. Installing DPS. Date of Publish:

Configuring User VPN For Azure

LDAP Configuration Guide

How to install LDAP. # yum install openldap-servers openldap nss_ldap python-ldap openldap-clients -y

Installing MyDNS And The MyDNSConfig Control Panel On Fedora 8

Horizon DaaS Platform 6.1 Service Provider Installation - vcloud

Two factor authentication for Apache using mod_auth_radius

CRM Integration LDAP 06/01/2016

Offloading NDO2DB To Remote Server

Connector Administrator Guide, Release 3.X

CLI users are not listed on the Cisco Prime Collaboration User Management page.

Integrating Ubuntu based workstations in IPBrick s domain

CIS 192 Linux Lab Exercise

akkadian Global Directory 3.0 System Administration Guide

An Introduction to Puppet Enterprise

Installation Oracle Applications R on OEL 5.2

User Management in Resource Manager

Linux Essentials Objectives Topics:

Oracle Communications Session Delivery Manager Installation Guide. Release 8.1

ULTEO OPEN VIRTUAL DESKTOP OPENSUSE 11.3 SUPPORT

Flush Dns Settings Linux Redhat 5 Step Step Pdf

03. (). ( oracle )..

SECURE Gateway with Microsoft Azure Installation Guide. Version Document Revision 1.0

Sharing files and printers with Microsoft Windows

Using RDP with Azure Linux Virtual Machines

Installation and Upgrade 1. Installing DataPlane. Date of Publish:

OpenVPN Access Server v1.3 System Administrator Guide. Rev 1.0

Downloading and installing Db2 Developer Community Edition on Red Hat Enterprise Linux Roger E. Sanders Yujing Ke Published on October 24, 2018

RAP Installation README

Stop all processes and then reboot - same as above startx. Log in as superuser from current login exit

EX200 EX200. Red Hat Certified System Administrator RHCSA

CLI users are not listed on the Cisco Prime Collaboration User Management page.

How to open ports in the DSL router firmware version 2.xx and above

Project #3: Implementing NIS

Installing FreePBX 14 on CentOS 7

Red Hat.Actualtests.EX200.v by.Dixon.22q. Exam Code: EX200. Exam Name: Red Hat Certified System Administrator (RHCSA) Exam

Let s Install FreeSwitch

Implementing Single-Sign-On(SSO) for APM UI

Xcalar Installation Guide

Hands-on Exercise Hadoop

Avaya CFA 7.1 Patch 1 (X01) Release Notes October 13, 2014

EX200 Q&A. DEMO Version

NOCTION. Intelligent Routing Platform Lite Self-Deployment Guide. Intelligent Routing Platform. Lite (free version)

Viglen NPACI Rocks. Getting Started and FAQ

How to Set Up External CA VPN Certificates

AWS Remote Access VPC Bundle

ACE Live on RSP: Installation Instructions

SAS Visual Investigator : Deployment Guide

3) Click the Screen Sharing option and click connect to establish the session

SELinux Workshop Redux Jamie Duncan, Red Hat RVaLUG 19 April 2014

Yong Peng High School System Documentation PC Section

Step 1 - Install Apache and PostgreSQL

MULTI FACTOR AUTHENTICATION USING THE NETOP PORTAL. 31 January 2017

Cisco Stealthwatch Cloud. Private Network Monitoring Advanced Configuration Guide

Cluster Computing Spring 2004 Paul A. Farrell

Transcription:

LDAP or Lightweight Directory Access Protocol, is a protocol designed to manage and access related information in a centralized, hierarchical file and directory structure. An LDAP server is a non-relational database that is optimized for accessing, but not writing data. For example, it can be used as an address book like email clients or authentication of various services like Samba, or Linux system authentication, where it replaces /etc/passwd and basically holds the user data. 1. Prerequisite a. The LDAP server should have a valid FQDN. b. Install EPEL and REMI repositories to remove any dependencies problems. a. Configure hostname Edit /etc/hosts and add the following # cat /etc/hosts 172.31.1.173 demohost.com com Add hostname in /etc/hostname and /etc/sysconfig/network # cat /etc/hostname demohost # cat /etc/sysconfig/network NETWORKING=yes HOSTNAME="demohost" Check the FQDN of your server by executing following two commands in the terminal. # hostname demohost # hostname -f demohost.com b. Install EPEL/REMI Install REMI repository # wget http://rpms.famillecollet.com/enterprise/remi-release-6.rpm # rpm -Uvh remi-release-6.rpm

Now install EPEL repository # wget http://epel.mirror.net.in/epel/6/i386/epel-release-6-8.noarch.rpm # rpm -Uvh epel-release-6-8.noarch.rpm 2. Configure firewall Configure firewall to allow traffic to LDAP server. Add the following lines in /etc/sysconfig/iptables # nano /etc/sysconfig/iptables -A INPUT -m state --state NEW -m tcp -p tcp --dport 389 -j ACCEPT -A INPUT -m state --state NEW -m tcp -p tcp --dport 636 -j ACCEPT -A INPUT -m state --state NEW -m tcp -p tcp --dport 9830 -j ACCEPT Restart firewall to reload new settings. # service iptables restart

3. Configure LDAP server for performance and security Edit few parameters in the server for performance and security. Edit the file /etc/sysctl.conf # nano /etc/sysctl.conf Append the following lines. net.ipv4.tcp_keepalive_time = 350 net.ipv4.ip_local_port_range = 1024 65000 fs.file-max = 64000 Next edit the file /etc/security/limits.conf # nano /etc/security/limits.conf Append the following lines. * soft nofile 8192 * hard nofile 8192 Now edit the file /etc/profile # nano /etc/profile Add the following line at the end. ulimit -n 8192 Lastly edit file /etc/pam.d/login # nano /etc/pam.d/login Add the line at the end.

session required /lib/security/pam_limits.so Reboot the server. 4. Install 389 Directory Server Now create a LDAP user account. # useradd ldapadmin # passwd ldapadmin Install 389 directory server by executing following command # yum install -y 389-ds openldap-clients 5. Configure LDAP server Let us now configure LDAP server. Execute the following command to configure 389 directory server. # setup-ds-admin.pl Answer the questions by reading it carefully.

Would you like to continue with set up? [yes]:yes Would you like to continue? [no]: yes Choose a setup type [2]:2 Computer name:demohost.com System User [nobody]: ldapadmin System Group [nobody]: ldapadmin

Do you want to register this software with an existing configuration directory server? [no]:no Configuration directory server administrator ID [admin]: Password: Password (confirm): Administration Domain[com]: Directory server network port [389]: Directory server identifier [demohost]:demohost

Suffix [dc=com]: Directory Manager DN [cn=directory Manager]: ## Press Enter ## Password: ## Enter the password ## Password (confirm): Administration port [9830]:9830 Are you ready to set up your servers? [yes]:yes If the script runs successfully, then you will get the following messages at the end of installation. Updating the configuration for the httpd engine... Starting admin server... output: Starting dirsrv-admin:

output: [ OK ] The admin server was successfully started. Admin server was successfully created, configured, and started. Exiting... Execute the following two commands to start LDAP server automatically on reboot. # chkconfig dirsrv on # chkconfig dirsrv-admin on 6. Test LDAP server Now test LDAP server using following command. # ldapsearch -x -b "dc=demohost,dc=com" LDAP server is now ready for use. 7. Install phpldapadmin Install phpldapadmin by executing following command in the terminal. # yum install phpldapadmin

Now we need to configure few parameters for phpldapadmin. Edit the file /etc/phpldapadmin/config.php and look for the line $servers->setvalue( login, attr, uid ); uncomment it and comment out this line $servers->setvalue( login, attr, dn ); Next edit /etc/httpd/conf.d/phpldapadmin.conf file. It should look something like this: Alias /phpldapadmin /usr/share/phpldapadmin/htdocs Alias /ldapadmin /usr/share/phpldapadmin/htdocs <Directory /usr/share/phpldapadmin/htdocs> Order Deny,Allow Deny from all Allow from 127.0.0.1 Allow from all </Directory> If you want to access phpldapadmin on the server that phpldapadmin is installed then keep this line. Allow from 127.0.0.1 If you want to access phpldapadmin from the local network where phpldapserver is installed then you may want keep this line. Allow from 127.0.0.1 192.168.0.0/16

Change the network ID from 192.168.x.x to your network ID. I want to access it from anywhere, so i kept this line Allow from all Restart Apache # service httpd restart Now navigate to the following URL using your favorite web browser. http://demohost.com/phpldapadmin Replace demohost.com with your own domain name. Click login from left sidebar.

Enter username and password that you have created in step 5 and click Authenticate. If the authentication is successful, then you will be logged in inside phpldapadmin. LDAP server is installed. Now you can explore all the features of LDAP through phpldapadmin.