User Tools

Site Tools


自作クラスタ計算機:openldapを使ったldapサーバの基本設定

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
自作クラスタ計算機:openldapを使ったldapサーバの基本設定 [2026/05/11 19:23] – [ユーザーの追加] koudai自作クラスタ計算機:openldapを使ったldapサーバの基本設定 [2026/05/13 14:04] (current) – [SSSD] koudai
Line 191: Line 191:
  
 ====== 計算ノードでの作業 ====== ====== 計算ノードでの作業 ======
 +
 +<code>
 +$ apt install libnss-ldapd libpam-ldapd ldap-utils
 +</code>
 +
 +  * LDAP server URI: ldap://192.168.0.1/
 +  * LDAP server search base: dc=cluster,dc=home,dc=arpa
 +  * Name services to configure: passwd, group, shadow, hosts (スペースキーでチェックを入れられます)
 +
 +ユーザーがいるか確認
 +
 +<code>
 +$ getent passwd taro
 +taro:x:10000:10000:Taro Yamada:/home/taro:/bin/bash
 +</code>
 +
 +
 +参考
 +
 +
 +https://server-network-note.net/2022/11/openldap-client-ubuntu22-04lts-server/
 +
 +https://zenn.dev/iasl/articles/1d35c87a66ee35
 +
 +
 +
 +
 +
 +====== SSSD ======
 +
  
 必要なパッケージのインストール 必要なパッケージのインストール
Line 206: Line 236:
 [sssd] [sssd]
 services = nss, pam services = nss, pam
-domains = cluster.home.arpa+config_file_version = 2 
 +domains = default
  
-[domain/cluster.home.arpa]+[domain/default]
 id_provider = ldap id_provider = ldap
 auth_provider = ldap auth_provider = ldap
  
-ldap_uri = ldap://192.168.0.1+ldap_uri = ldap://192.168.01.
 ldap_search_base = dc=cluster,dc=home,dc=arpa ldap_search_base = dc=cluster,dc=home,dc=arpa
  
-# ユーザーグループの場所 +# ユーザーグループの場所 
-ldap_user_search_base = ou=People,dc=cluster,dc=home,dc=arpa +ldap_user_search_base = ou=people,dc=cluster,dc=home,dc=arpa 
-ldap_group_search_base = ou=Groups,dc=cluster,dc=home,dc=arpa+ldap_group_search_base = ou=groups,dc=cluster,dc=home,dc=arpa
  
 # 認証 # 認証
 ldap_default_bind_dn = cn=admin,dc=cluster,dc=home,dc=arpa ldap_default_bind_dn = cn=admin,dc=cluster,dc=home,dc=arpa
-ldap_default_authtok = LDAPパスワード+ldap_default_authtok = LDAPをインストールした際に設定したパスワード
  
-ホームディレクトリ +TLS 
-ldap_user_home_directory /home/%u+ldap_id_use_start_tls false 
 +ldap_tls_reqcert = never 
 +ldap_auth_disable_tls_never_use_in_production = true
 </file> </file>
  
Line 285: Line 318:
 </code> </code>
  
 +
 +
 +=== memo ===
 +
 +<file>
 +#
 +# /etc/pam.d/common-account - authorization settings common to all services
 +#
 +# This file is included from other service-specific PAM config files,
 +# and should contain a list of the authorization modules that define
 +# the central access policy for use on the system.  The default is to
 +# only deny service to users whose accounts are expired in /etc/shadow.
 +#
 +# As of pam 1.0.1-6, this file is managed by pam-auth-update by default.
 +# To take advantage of this, it is recommended that you configure any
 +# local modules either before or after the default block, and use
 +# pam-auth-update to manage selection of other modules.  See
 +# pam-auth-update(8) for details.
 +#
 +
 +# here are the per-package modules (the "Primary" block)
 +account [success=ok new_authtok_reqd=done default=ignore] pam_ldap.so
 +account required pam_unix.so 
 +# here's the fallback if no module succeeds
 +account requisite pam_deny.so
 +# prime the stack with a positive return value if there isn't one already;
 +# this avoids us returning an error just because nothing sets a success code
 +# since the modules above will each just jump around
 +account required pam_permit.so
 +# and here are more per-package modules (the "Additional" block)
 +account [success=ok new_authtok_reqd=done ignore=ignore user_unknown=ignore authinfo_unavail=ignore default=bad] pam_ldap.so minimum_uid=1000
 +# end of pam-auth-update config
 +
 +</file>
自作クラスタ計算機/openldapを使ったldapサーバの基本設定.1778494989.txt.gz · Last modified: 2026/05/11 19:23 by koudai