blob: 6ee0537656d41ad116f86bfeca74ce35669931f7 (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
|
<refsect1 id='modified-default-options'>
<title>MODIFIED DEFAULT OPTIONS</title>
<para>
Certain option defaults do not match their respective backend provider
defaults, these option names and AD provider-specific defaults are listed
below:
</para>
<refsect2 id='krb5_modifications'>
<title>KRB5 Provider</title>
<itemizedlist>
<listitem>
<para>
krb5_validate = true
</para>
</listitem>
<listitem>
<para>
krb5_use_enterprise_principal = true
</para>
</listitem>
</itemizedlist>
</refsect2>
<refsect2 id='ldap_modifications'>
<title>LDAP Provider</title>
<itemizedlist>
<listitem>
<para>
ldap_schema = ad
</para>
</listitem>
<listitem>
<para>
ldap_force_upper_case_realm = true
</para>
</listitem>
<listitem>
<para>
ldap_id_mapping = true
</para>
</listitem>
<listitem>
<para>
ldap_sasl_mech = GSS-SPNEGO
</para>
</listitem>
<listitem>
<para>
ldap_referrals = false
</para>
</listitem>
<listitem>
<para>
ldap_account_expire_policy = ad
</para>
</listitem>
<listitem>
<para>
ldap_use_tokengroups = true
</para>
</listitem>
<listitem>
<para>
ldap_sasl_authid = sAMAccountName@REALM (typically SHORTNAME$@REALM)
</para>
<para>
The AD provider looks for a different principal than the LDAP provider by
default, because in an Active Directory environment the principals are
divided into two groups - User Principals and Service Principals. Only User
Principal can be used to obtain a TGT and by default, computer object's
principal is constructed from its sAMAccountName and the AD realm. The
well-known host/hostname@REALM principal is a Service Principal and thus
cannot be used to get a TGT with.
</para>
</listitem>
</itemizedlist>
</refsect2>
<refsect2 id='nss_modifications'>
<title>NSS configuration</title>
<itemizedlist>
<listitem>
<para>
fallback_homedir = /home/%d/%u
</para>
<para>
The AD provider automatically sets "fallback_homedir = /home/%d/%u" to
provide personal home directories for users without the homeDirectory
attribute. If your AD Domain is properly populated with Posix attributes,
and you want to avoid this fallback behavior, you can explicitly set
"fallback_homedir = %o".
</para>
<para>
Note that the system typically expects a home directory in /home/%u
folder. If you decide to use a different directory structure, some other
parts of your system may need adjustments.
</para>
<para>
For example automated creation of home directories in combination with
selinux requires selinux adjustment, otherwise the home directory will be
created with wrong selinux context.
</para>
</listitem>
</itemizedlist>
</refsect2>
</refsect1>
|