Skip to content

Latest commit

 

History

History
119 lines (98 loc) · 4.31 KB

README.markdown

File metadata and controls

119 lines (98 loc) · 4.31 KB

sssd

####Table of Contents

  1. Overview
  2. Module Description - What the module does and why it is useful
  3. Quick Start
  4. Usage - Configuration options and additional functionality
  5. Limitations

Overview

The SSSD module makes it easy to authenticate against Active Directory with sssd.

Module Description

The SSSD module manages the sssd service on distributions based on RedHat Enterprise Linux 5 or 6. It is designed to work with Active Directory, but can easily be customized to work with other LDAP servers. It also helps automate home directory creation.

Quick Start

I just want to login with my network username. What's the minimum I need?

class { 'sssd':
  domains              => [ 'mydomain.local' ],
  make_home_dir        => true,
}
sssd::domain { 'mydomain.local':
  ldap_uri             => 'ldap://mydomain.local',
  ldap_search_base     => 'DC=mydomain,DC=local',
  krb5_realm           => 'MYDOMAIN.LOCAL',
  ldap_default_bind_dn => 'CN=SssdService,DC=mydomain,DC=local',
  ldap_default_authtok => 'My ultra-secret password',
  simple_allow_groups  => ['SssdAdmins'],
}

Note that you must have certificates configured appropriate on your system so that a secure TLS connection can be established with your LDAP server. On RedHat-based systems, you need to install certificates of your trusted certificate authority into /etc/openldap/certs and then hash the certs by running cacertdir_rehash /etc/openldap/certs.

Usage

Different attribute schema

Most LDAP servers use standard attribute names defined in rfc2307. This includes Windows Server since 2003 R2. If your directory uses a non-standard schema for posix accounts, you will need to define a custom attribute mapping.

sssd::domain { 'mydomain.local':
  ...
  ldap_user_object_class   => 'user',
  ldap_user_name           => 'sAMAccountName',
  ldap_user_principal      => 'userPrincipalName',
  ldap_user_gecos          => 'MSSFU2x-gecos',
  ldap_user_shell          => 'MSSFU2x-loginShell',
  ldap_user_uid_number     => 'MSSFU2x-uidNumber',
  ldap_user_gid_number     => 'MSSFU2x-gidNumber',
  ldap_user_home_directory => 'msSFUHomeDirectory',
  ldap_group_gid_number    => 'MSSFU2x-gidNumber',
}

Authenticate against multiple domains

SSSD makes it easy to authenticate against multiple domains. You need to create a second (or third) sssd::domain resource and fill in the appropriate parameters as shown above.

You also need to add the domain, with the same name, to the array of domains passed to the sssd class. This defines the lookup order.

class { 'sssd':
  domains  => [ 'domain_one.local', 'domain_two.local' ],
}
sssd::domain { 'domain_one.local':
  ldap_uri => 'ldap://domain_one.local',
  ...
}
sssd::domain { 'domain_two.local':
  ldap_uri => 'ldap://domain_two.local',
  ...
}

Use Hiera for configuration data

The SSSD module is designed to work with the automatic parameter lookup feature introduced with Hiera in Puppet 3. If you are using Hiera, you can shorten your Puppet manifest down to one line:

include sssd

Then add configuration data into your Hiera data files. If you are using a YAML backend, your configuration file might look like this.

sssd::domains:
- 'mydomain.local'
sssd::backends:
  'mydomain.local':
    ldap_uri: 'ldap://mydomain.local'
    ldap_search_base: 'DC=mydomain,DC=local'
    krb5_realm: 'MYDOMAIN.LOCAL'
    ldap_default_bind_dn: 'CN=SssdService,DC=mydomain,DC=local'
    ldap_default_authtok: 'My ultra-secret password'
    simple_allow_groups: ['SssdAdmins']

Limitations

This module has been built on and tested against these Puppet versions:

  • Puppet 3.2.4
  • Puppet 3.2.3
  • Puppet 2.6.18

This module has been tested on the following distributions:

  • Scientific Linux 6.4
  • Scientific Linx 6.3
  • CentOS release 5.6

If you need an SSSD module for Debian, there's one by [Unyonsys] (https://github.com/Unyonsys/puppet-module-sssd).