centos6搭建ldap服务

前端之家收集整理的这篇文章主要介绍了centos6搭建ldap服务前端之家小编觉得挺不错的,现在分享给大家,也给大家做个参考。

内容简介

在centos6系统中安装配置openldap服务,通过migrationtools工具生成基于linux系统账户相关的ldap账户信息以及通过nfs共享方式在客户端自动挂接ldap用户的家目录

环境准备

1,准备两台及以上centos6操作系统主机,一台用于部署服务端其它用于部署客户端接入ldap认证
2,关闭selinux
3,清空iptables规则
4,配置好yum源,推荐使用阿里云yum源

ldap服务端安装与配置

安装相关软件包

[root@ldap-server ~]# yum list | grep openldap
openldap.x86_64                             2.4.23-20.el6                @anaconda-RedHatEnterpriseLinux-201111171049.x86_64/6.2
compat-openldap.i686                        1:2.3.43-2.el6               base   
compat-openldap.x86_64                      1:2.3.43-2.el6               base   
openldap.i686                               2.4.40-7.el6_7               updates
openldap.x86_64                             2.4.40-7.el6_7               updates
openldap-clients.x86_64                     2.4.40-7.el6_7               updates
openldap-devel.i686                         2.4.40-7.el6_7               updates
openldap-devel.x86_64                       2.4.40-7.el6_7               updates
openldap-servers.x86_64                     2.4.40-7.el6_7               updates
openldap-servers-sql.x86_64                 2.4.40-7.el6_7               updates
[root@ldap-server ~]# yum install openldap openldap-clients openldap-servers openldap-devel -y
openldap配置主目录在/etc/openldap下,默认文件目录如下
[root@ldap-server ~]# ll /etc/openldap/
total 28
drwxr-xr-x 2 root root 4096 Jan 10 11:07 certs
-rw-r----- 1 root ldap  121 Nov 10  2015 check_password.conf
-rw-r--r-- 1 root root  280 Nov 10  2015 ldap.conf
drwxr-xr-x 2 root root 4096 Jan 10 11:07 schema
drwx------ 2 ldap ldap 4096 Jan 10 11:10 slapd.d
生成hash密码稍后用于配置ldap管理员密码,此处设置的密码为123456
[root@ldap-server ~]# slappasswd 
New password: 
Re-enter new password: 
{SSHA}SpiJ+uf0d1j7bRm6XoLJo9EX3Gk5uzzH
拷贝服务端配置模版至/etc/openldap并配置,主要修改dc=my-domain,dc=com为自己的域名以及配置rootpw用于后续导入系统帐号信息,如下图所示
[root@ldap-server ~]# /bin/cp /usr/share/openldap-servers/slapd.conf.obsolete /etc/openldap/slapd.conf

拷贝DB_SAMPLE模版文件文件至/var/lib/ldap
[root@ldap-server ~]# /bin/cp /usr/share/openldap-servers/DB_CONFIG.example /var/lib/ldap/DB_CONFIG
[root@ldap-server ~]# chown ldap. /var/lib/ldap/ -R
删除默认的ldap配置信息并重新生成相关配置
[root@ldap-server ~]# rm -rf /etc/openldap/slapd.d/*
[root@ldap-server ~]# slaptest -f /etc/openldap/slapd.conf -F /etc/openldap/slapd.d
config file testing succeeded
[root@ldap-server ~]# chown ldap. /etc/openldap/ -R

至此服务配置已经完成,启动ldap服务

[root@ldap-server ~]# service slapd start
Starting slapd:                                            [  OK  ]
[root@ldap-server ~]#

生成系统账户并导入ldap

创建/home/ldapuser为ldap用户家目录的上级目录
创建teacher及student组,gid分别为2000和3000(根据实际情况而定) 生成user01-user10归属teacher组
生成user11-users0归属student组
[root@ldap-server ~]# mkdir -p /home/ldapuser
[root@ldap-server ~]# groupadd teacher -g 2000
[root@ldap-server ~]# groupadd student -g 3000
[root@ldap-server ~]# for i in {01..10};do useradd -g teacher -d /home/ldapuser/user$i user$i;done
[root@ldap-server ~]# for i in {11..20};do useradd -g student -d /home/ldapuser/user$i user$i;done
[root@ldap-server ~]# for i in {01..20};do echo user$i | passwd --stdin user$i;done
Changing password for user user01.
passwd: all authentication tokens updated successfully.
Changing password for user user02.
passwd: all authentication tokens updated successfully.
Changing password for user user03.
passwd: all authentication tokens updated successfully.
Changing password for user user04.
passwd: all authentication tokens updated successfully.
Changing password for user user05.
passwd: all authentication tokens updated successfully.
Changing password for user user06.
passwd: all authentication tokens updated successfully.
Changing password for user user07.
passwd: all authentication tokens updated successfully.
Changing password for user user08.
passwd: all authentication tokens updated successfully.
Changing password for user user09.
passwd: all authentication tokens updated successfully.
Changing password for user user10.
passwd: all authentication tokens updated successfully.
Changing password for user user11.
passwd: all authentication tokens updated successfully.
Changing password for user user12.
passwd: all authentication tokens updated successfully.
Changing password for user user13.
passwd: all authentication tokens updated successfully.
Changing password for user user14.
passwd: all authentication tokens updated successfully.
Changing password for user user15.
passwd: all authentication tokens updated successfully.
Changing password for user user16.
passwd: all authentication tokens updated successfully.
Changing password for user user17.
passwd: all authentication tokens updated successfully.
Changing password for user user18.
passwd: all authentication tokens updated successfully.
Changing password for user user19.
passwd: all authentication tokens updated successfully.
Changing password for user user20.
passwd: all authentication tokens updated successfully.
提取上述用户在/etc/passwd及/etc/group中的信息至临时文件
[root@ldap-server ~]# mkdir /tmp/ldap
[root@ldap-server ~]# cat /etc/passwd | grep -E 'user[0-9]{2}' > /tmp/ldap/passwd
[root@ldap-server ~]# cat /etc/group | grep -E 'teacher|student' > /tmp/ldap/group
[root@ldap-server ~]# cat /tmp/ldap/passwd 
user01:x:503:2000::/home/ldapuser/user01:/bin/bash
user02:x:504:2000::/home/ldapuser/user02:/bin/bash
user03:x:505:2000::/home/ldapuser/user03:/bin/bash
user04:x:506:2000::/home/ldapuser/user04:/bin/bash
user05:x:507:2000::/home/ldapuser/user05:/bin/bash
user06:x:508:2000::/home/ldapuser/user06:/bin/bash
user07:x:509:2000::/home/ldapuser/user07:/bin/bash
user08:x:510:2000::/home/ldapuser/user08:/bin/bash
user09:x:511:2000::/home/ldapuser/user09:/bin/bash
user10:x:512:2000::/home/ldapuser/user10:/bin/bash
user11:x:513:3000::/home/ldapuser/user11:/bin/bash
user12:x:514:3000::/home/ldapuser/user12:/bin/bash
user13:x:515:3000::/home/ldapuser/user13:/bin/bash
user14:x:516:3000::/home/ldapuser/user14:/bin/bash
user15:x:517:3000::/home/ldapuser/user15:/bin/bash
user16:x:518:3000::/home/ldapuser/user16:/bin/bash
user17:x:519:3000::/home/ldapuser/user17:/bin/bash
user18:x:520:3000::/home/ldapuser/user18:/bin/bash
user19:x:521:3000::/home/ldapuser/user19:/bin/bash
user20:x:522:3000::/home/ldapuser/user20:/bin/bash
[root@ldap-server ~]# cat /tmp/ldap/group
teacher:x:2000:
student:x:3000:
安装migrationtools工具生成相应的ldap信息文件
[root@ldap-server ~]# yum install migrationtools -y

修改/usr/share/migrationtools/migrate_common.ph文件第71和74行信息为自己对应的域名信息,如下图所示

通过migrate_bash.pl生成帐号基础信息文件
通过migrate_passwd.pl和/tmp/ldap/passwd文件生成用户信息文件
通过migrate_group.pl和/tmp/ldap/group文件生成用户信息文件
[root@ldap-server ~]# /usr/share/migrationtools/migrate_base.pl > /tmp/ldap/base.ldif
[root@ldap-server ~]# /usr/share/migrationtools/migrate_passwd.pl /tmp/ldap/passwd > /tmp/ldap/passwd.ldif
[root@ldap-server ~]# /usr/share/migrationtools/migrate_group.pl /tmp/ldap/group > /tmp/ldap/group.ldif
[root@ldap-server ~]# head /tmp/ldap/base.ldif
dn: dc=rocshen,dc=com
dc: rocshen
objectClass: top
objectClass: domain

dn: ou=Hosts,dc=rocshen,dc=com
ou: Hosts
objectClass: top
objectClass: organizationalUnit

[root@ldap-server ~]# head /tmp/ldap/passwd.ldif
dn: uid=user01,ou=People,dc=com
uid: user01
cn: user01
objectClass: account
objectClass: posixAccount
objectClass: top
objectClass: shadowAccount
userPassword: {crypt}$6$x9KqVO4x$mZnoUe483eR2X4E8YIfFxWenrWM8IAkyL5TeNomYItsfE7WoMiMhEiKOEySBAPYmqmXqg4G0zzPEuXQ03IvJ4/
shadowLastChange: 17541
shadowMin: 0
[root@ldap-server ~]# head /tmp/ldap/group.ldif
dn: cn=teacher,ou=Group,dc=com
objectClass: posixGroup
objectClass: top
cn: teacher
userPassword: {crypt}x
gidNumber: 2000

dn: cn=student,dc=com
objectClass: posixGroup
objectClass: top
[root@ldap-server ~]#
通过ldapadd命令添加上述生成的信息,主要用过下述参数;其中

-D 参数即为/etc/openldap/slapd.conf中定义的rootdn信息
-w password 中的password为上述使用slappasswd命令时的明文密码(能从命令行看见),不能与-W同时使用
-W 后不跟参数密码在敲下命令后根据提示输入(别人看不见),不能与-w同时使用
-x 使用不加密的协议与ldap服务端通信
-X 使用加密的协议与ldap服务端通信
-f 指定要添加的ldif文件路径

[root@ldap-server ~]# ldapadd --help
......
  -D binddn  bind DN
  -f file    read operations from `file'
  -w passwd  bind password (for simple authentication)
  -W         prompt for bind password
  -x         Simple authentication
  -X authzid SASL authorization identity ("dn:<dn>" or "u:<user>")
......
[root@ldap-server ~]# ldapadd -x -D "cn=Manager,dc=com" -w 123456 -f /tmp/ldap/base.ldif 
adding new entry "dc=rocshen,dc=com"

adding new entry "ou=Hosts,dc=com"

adding new entry "ou=Rpc,dc=com"

adding new entry "ou=Services,dc=com"

adding new entry "nisMapName=netgroup.byuser,dc=com"

adding new entry "ou=Mounts,dc=com"

adding new entry "ou=Networks,dc=com"

adding new entry "ou=People,dc=com"

adding new entry "ou=Group,dc=com"

adding new entry "ou=Netgroup,dc=com"

adding new entry "ou=Protocols,dc=com"

adding new entry "ou=Aliases,dc=com"

adding new entry "nisMapName=netgroup.byhost,dc=com"

[root@ldap-server ~]# ldapadd -x -D "cn=Manager,dc=com" -w 123456 -f /tmp/ldap/passwd.ldif 
adding new entry "uid=user01,dc=com"

adding new entry "uid=user02,dc=com"

adding new entry "uid=user03,dc=com"

adding new entry "uid=user04,dc=com"

adding new entry "uid=user05,dc=com"

adding new entry "uid=user06,dc=com"

adding new entry "uid=user07,dc=com"

adding new entry "uid=user08,dc=com"

adding new entry "uid=user09,dc=com"

adding new entry "uid=user10,dc=com"

adding new entry "uid=user11,dc=com"

adding new entry "uid=user12,dc=com"

adding new entry "uid=user13,dc=com"

adding new entry "uid=user14,dc=com"

adding new entry "uid=user15,dc=com"

adding new entry "uid=user16,dc=com"

adding new entry "uid=user17,dc=com"

adding new entry "uid=user18,dc=com"

adding new entry "uid=user19,dc=com"

adding new entry "uid=user20,dc=com" -w 123456 -f /tmp/ldap/group.ldif 
adding new entry "cn=teacher,dc=com"

adding new entry "cn=student,dc=com"
通过ldapsearch查询ldap中的用户组信息
[root@ldap-server ~]# ldapsearch -b "ou=Group,dc=com" -x
# extended LDIF
#
# LDAPv3
# base <ou=Group,dc=com> with scope subtree
# filter: (objectclass=*)
# requesting: ALL
#

# Group,rocshen.com
dn: ou=Group,dc=com
ou: Group
objectClass: top
objectClass: organizationalUnit

# teacher,Group,rocshen.com
dn: cn=teacher,dc=com
objectClass: posixGroup
objectClass: top
cn: teacher
userPassword:: e2NyeXB0fXg=
gidNumber: 2000

# student,rocshen.com
dn: cn=student,dc=com
objectClass: posixGroup
objectClass: top
cn: student
userPassword:: e2NyeXB0fXg=
gidNumber: 3000

# search result
search: 2
result: 0 Success

# numResponses: 4
# numEntries: 3
安装nfs设置ldap用户家目录为共享
[root@ldap-server ~]# yum install nfs-utils -y
[root@ldap-server ~]# cat /etc/exports
/home/ldapuser *(rw,no_root_squash)
[root@ldap-server ~]# service rpcbind start
Starting rpcbind:                                          [  OK  ]
[root@ldap-server ~]# service nfs start
Starting NFS services:                                     [  OK  ]
Starting NFS quotas:                                       [  OK  ]
Starting NFS mountd:                                       [  OK  ]
Starting NFS daemon:                                       [  OK  ]
[root@ldap-server ~]# chkconfig nfs on
[root@ldap-server ~]# chkconfig rpcbind on

ldap客户端安装与配置

安装openldap客户端软件包并配置/etc/openldap/ldap.conf
[root@ldap-client ~]# yum install openldap-clients nss-pam-ldapd pam_ldap -y
[root@ldap-client ~]# vim /etc/openldap/ldap.conf 

#
# LDAP Defaults
#

# See ldap.conf(5) for details
# This file should be world readable but not world writable.

#BASE   dc=example,dc=com
#URI    ldap://ldap.example.com ldap://ldap-master.example.com:666
BASE    dc=rocshen,dc=com
URI     ldap://10.59.30.94    #此处为ldap服务端ip

#SIZELIMIT      12
#TIMELIMIT      15
#DEREF          never

TLS_CACERTDIR   /etc/openldap/certs
测试搜索ldap中的用户组信息
[root@ldap-client ~]# ldapsearch -h 10.59.30.94 -x -b "ou=Group,dc=com"
# extended LDIF
#
# LDAPv3
# base <ou=Group,dc=com
objectClass: posixGroup
objectClass: top
cn: student
userPassword:: e2NyeXB0fXg=
gidNumber: 3000

# search result
search: 2
result: 0 Success

# numResponses: 4
# numEntries: 3

配置客户端启动ldap验证

配置/etc/sysconfig/authconfig
[root@ldap-client ~]# sed -i '/USESYSNETAUTH/s/no/yes/' /etc/sysconfig/authconfig
[root@ldap-client ~]# sed -i '/USELDAPAUTH/s/no/yes/' /etc/sysconfig/authconfig
[root@ldap-client ~]# sed -i '/USEMKHOMEDIR/s/no/yes/' /etc/sysconfig/authconfig
[root@ldap-client ~]# sed -i '/PASSWDALGORITHM/s/md5/yes/' /etc/sysconfig/authconfig
[root@ldap-client ~]# sed -i '/USELDAP/s/no/yes/' /etc/sysconfig/authconfig
配置/etc/nsswitch.conf,如下图所示

配置pam新增ldap认证
[root@ldap-client ~]# vim /etc/pam.d/system-auth

#%PAM-1.0
# This file is auto-generated.
# User changes will be destroyed the next time authconfig is run.
auth        required      pam_env.so
auth        sufficient    pam_fprintd.so
auth        sufficient    pam_unix.so nullok try_first_pass
auth        requisite     pam_succeed_if.so uid >= 500 quiet
auth        sufficient    pam_ldap.so
auth        required      pam_deny.so

account     required      pam_unix.so
account     sufficient    pam_localuser.so
account     sufficient    pam_succeed_if.so uid < 500 quiet
account     [default=bad success=ok user_unknown=ignore] pam_ldap.so
account     required      pam_permit.so

password    requisite     pam_cracklib.so try_first_pass retry=3 type=
password    sufficient    pam_unix.so sha512 shadow nullok try_first_pass use_authtok
password    sufficient    pam_ldap.so  use_authtok
password    required      pam_deny.so

session     optional      pam_keyinit.so revoke
session     required      pam_limits.so
session     [success=1 default=ignore] pam_succeed_if.so service in crond quiet use_uid
session     required      pam_unix.so
session     required      pam_mkhomedir.so skel=/etc/skel/ umask=0077
session     optional      pam_ldap.so

新增内容如下图红框所示

使用autoconfig命令配置nscd服务,注意替换命令中的ldapserver的IP及basedb信息
[root@ldap-client ~]# authconfig --enableldap --enableldapauth --ldapserver=10.59.30.94 --ldapbasedn="dc=rocshen,dc=com" --enablemkhomedir --update
Starting nslcd:                                            [  OK  ]
[root@ldap-client ~]#
安装autofs挂载ldapserver端的用户目录;按图示操作添加相关配置
[root@ldap-client ~]# yum install autofs -y
[root@ldap-client ~]# vim /etc/auto.master 

#
# Sample auto.master file
# This is a 'master' automounter map and it has the following format:
# mount-point [map-type[,format]:]map [options]
# For details of the format look at auto.master(5).
#
/misc   /etc/auto.misc
/home/ldapuser  /etc/auto.ldapuser
#
# NOTE: mounts done from a hosts map will be mounted with the
#       "nosuid" and "nodev" options unless the "suid" and "dev"
#       options are explicitly given.
#
/net    -hosts
#
# Include central master map if it can be found using
# nsswitch sources.
#
# Note that if there are entries for /net or /misc (as
# above) in the included master map any keys that are the
# same will not be seen as the first read key seen takes
# precedence.
#
+auto.master

[root@ldap-client ~]# vim /etc/auto.ldapuser

*               -rw,soft,intr           10.59.30.94:/home/ldapuser/&

[root@ldap-client ~]# service autofs start
Loading autofs4:                                           [  OK  ]
Starting automount:                                        [  OK  ]
[root@ldap-client ~]# ls /home/ldapuser/
[root@ldap-client ~]# cd /home/ldapuser/user01
[root@ldap-client user01]# pwd
/home/ldapuser/user01
[root@ldap-client ~]#
测试使用ldapuser登录
[root@ldap-client user01]# cd 
[root@ldap-client ~]# 
[root@ldap-client ~]# ssh user01@localhost
Warning: Permanently added 'localhost' (RSA) to the list of known hosts.
user01@localhost's password: 
[user01@ldap-client ~]$ id
uid=503(user01) gid=2000(teacher) groups=2000(teacher)
[user01@ldap-client ~]$exit
[root@ldap-client ~]# getent passwd | grep user
saslauth:x:499:76:"Saslauthd user":/var/empty/saslauth:/sbin/nologin
rpcuser:x:29:29:RPC Service User:/var/lib/nfs:/sbin/nologin
user01:x:503:2000:user01:/home/ldapuser/user01:/bin/bash
user02:x:504:2000:user02:/home/ldapuser/user02:/bin/bash
user03:x:505:2000:user03:/home/ldapuser/user03:/bin/bash
user04:x:506:2000:user04:/home/ldapuser/user04:/bin/bash
user05:x:507:2000:user05:/home/ldapuser/user05:/bin/bash
user06:x:508:2000:user06:/home/ldapuser/user06:/bin/bash
user07:x:509:2000:user07:/home/ldapuser/user07:/bin/bash
user08:x:510:2000:user08:/home/ldapuser/user08:/bin/bash
user09:x:511:2000:user09:/home/ldapuser/user09:/bin/bash
user10:x:512:2000:user10:/home/ldapuser/user10:/bin/bash
user11:x:513:3000:user11:/home/ldapuser/user11:/bin/bash
user12:x:514:3000:user12:/home/ldapuser/user12:/bin/bash
user13:x:515:3000:user13:/home/ldapuser/user13:/bin/bash
user14:x:516:3000:user14:/home/ldapuser/user14:/bin/bash
user15:x:517:3000:user15:/home/ldapuser/user15:/bin/bash
user16:x:518:3000:user16:/home/ldapuser/user16:/bin/bash
user17:x:519:3000:user17:/home/ldapuser/user17:/bin/bash
user18:x:520:3000:user18:/home/ldapuser/user18:/bin/bash
user19:x:521:3000:user19:/home/ldapuser/user19:/bin/bash
user20:x:522:3000:user20:/home/ldapuser/user20:/bin/bash
[root@ldap-client ~]# getent group | grep -E 'teacher|student'
teacher:x:2000:
student:x:3000:
[root@ldap-client ~]# cat /etc/group | grep -E 'teacher|student'
[root@ldap-client ~]# cat /etc/passwd | grep user
saslauth:x:499:76:"Saslauthd user":/var/empty/saslauth:/sbin/nologin
rpcuser:x:29:29:RPC Service User:/var/lib/nfs:/sbin/nologin
[root@ldap-client ~]#
原文链接:/centos/374893.html

猜你在找的CentOS相关文章