pam_apparmorThe Authentication Server is based on LDAP and optionally Kerberos. On SUSE Linux Enterprise Server, you can configure it with a YaST wizard.
For more information about LDAP, see Chapter 5, LDAP—A Directory Service, and about Kerberos, see Chapter 7, Network Authentication with Kerberos.
For configuring an Authentication Server, see the SUSE Linux Enterprise Server documentation.
YaST includes the module that helps with defining authentication scenarios. Start the module by selecting › . The YaST Authentication Client is a shell for configuring the System Security Services Daemon (SSSD). SSSD then can talk to remote directory services that provide user data, and provide various authentication methods. This way, the host can be both, an LDAP or an Active Directory (AD) client. SSSD can locally cache these user data and then allow users to use of the data, even if the real directory service is (temporarily) unreachable. An NSS (Name Service Switch) and PAM (Pluggable Authentication Module) interface are also available.
First you must configure at least one authentication domain. A
authentication domain is a database that contains user information. Click
, and as the of the New
Domain enter an arbitrary name (alphanumeric ASCII characters, dashes,
and underscores are allowed). Then select one of the available
identification providers and finally select the authentication provider
to be used for that domain. For example, if you want to access an LDAP
directory with kerberos authentication, select ldap as
the and
krb5 as the
and leave enabled (see
Figure 4.2, “Authentication Client: Adding New Domain (LDAP and Kerberos)”).
In the next step you see that and
are properly selected, must set some
mandatory parameters for these providers. In the LDAP/Kerberbos scenario
for example, ldap://ldap.example.com as the
, the IP address of the Kerberbos server
(192.168.1.114 as ), and
EXAMPLE.COM as
(normally, your Kerberbos realm is your domain name in uppercase
letters). Then confirm.
For more information and additional configuration option you can set via
the button, see the context
and the SSSD man pages such as
sssd.conf (man sssd.conf) and
sssd-ldap (man sssd-ldap). It is
also possible to select later all parameters available for the selected
identification and authentication providers.
If you use LDAP, TLS is mandatory. Do not select
ldap_tls_reqcert, if an official certificate is not
available.
SSSD provides following identification providers:
proxy
Support a legacy NSS provider.
local
SSSD internal provider for local users.
ldap
LDAP provider. See sssd-ldap(5) for more information on configuring LDAP.
ipa
FreeIPA and Red Hat Enterprise Identity Management provider.
ad
Active Directory provider.
Supported authentication providers are:
ldap
Native LDAP authentication.
krb5
Kerberos authentication.
ipa
FreeIPA and Red Hat Enterprise Identity Management provider.
ad
Active Directory provider.
proxy
Relaying authentication to some other PAM target.
none
Disables authentication explicitly.
If you enter more then one authentication domain, SSSD will query one
after the one in the order they appear in the
/etc/sssd/sssd.conf configuration file. If a domain
is rarely used and you can to avoid waiting for the timeout, you can
configure it as inactive by either unselecting the
button at initial setup or by removing it
later from the list of the
section.
Clicking one of the listed at the left side,
allows you to edit sssd.conf sections such as
or .
If you click in the main dialog, YaST will enable and start the SSSD service. You can check it on the command line with:
systemctl status sssd.service
sssd.service - System Security Services Daemon
Loaded: loaded (/usr/lib/systemd/system/sssd.service; enabled)
Active: active (running) since Thu 2014-09-25 10:46:43 CEST; 5s ago
...