OpenLDAP安装配置 作者: sysit 分类: d 发表于 2017-12-07 131人围观 > 本笔记描述OpenLDAP的安装及通过cn=config配置域及管理账号。 ## 1. 安装OpenLDAP Server ``` [root@ldap1 ~]# yum -y install openldap-servers openldap-clients [root@ldap1 ~]# cp /usr/share/openldap-servers/DB_CONFIG.example /var/lib/ldap/DB_CONFIG [root@ldap1 ~]# chown ldap. /var/lib/ldap/DB_CONFIG [root@ldap1 ~]# systemctl start slapd [root@ldap1 ~]# systemctl enable slapd Created symlink from /etc/systemd/system/multi-user.target.wants/slapd.service to /usr/lib/systemd/system/slapd.service. ``` ## 2. 配置LDAP管理密码 ``` [root@ldap1 ~]# slappasswd New password: Re-enter new password: {SSHA}4qqh8MPd8dGZdjys6+k7fap4z6nXQKvw [root@ldap1 ~]# vi chrootpw.ldif # specify the password generated above for "olcRootPW" section dn: olcDatabase={0}config,cn=config changetype: modify add: olcRootPW olcRootPW: {SSHA}4qqh8MPd8dGZdjys6+k7fap4z6nXQKvw [root@ldap1 ~]# ldapadd -Y EXTERNAL -H ldapi:/// -f chrootpw.ldif SASL/EXTERNAL authentication started SASL username: gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth SASL SSF: 0 modifying entry "olcDatabase={0}config,cn=config" ``` ## 3. 导入基础Schemas ``` [root@ldap1 ~]# ldapadd -Y EXTERNAL -H ldapi:/// -f /etc/openldap/schema/cosine.ldif SASL/EXTERNAL authentication started SASL username: gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth SASL SSF: 0 adding new entry "cn=cosine,cn=schema,cn=config" [root@ldap1 ~]# ldapadd -Y EXTERNAL -H ldapi:/// -f /etc/openldap/schema/nis.ldif SASL/EXTERNAL authentication started SASL username: gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth SASL SSF: 0 adding new entry "cn=nis,cn=schema,cn=config" [root@ldap1 ~]# ldapadd -Y EXTERNAL -H ldapi:/// -f /etc/openldap/schema/inetorgperson.ldif SASL/EXTERNAL authentication started SASL username: gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth SASL SSF: 0 adding new entry "cn=inetorgperson,cn=schema,cn=config" ``` ## 4. 配置域 ``` [root@ldap1 ~]# slappasswd New password: Re-enter new password: {SSHA}jezVaJuvRGc4KQ99LXfS7NDtk5paMy0z vi chdomain.ldif # replace to your own domain name for "dc=***,dc=***" section # specify the password generated above for "olcRootPW" section dn: olcDatabase={1}monitor,cn=config changetype: modify replace: olcAccess olcAccess: {0}to * by dn.base="gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth" read by dn.base="cn=Manager,dc=kkops,dc=com" read by * none dn: olcDatabase={2}hdb,cn=config changetype: modify replace: olcSuffix olcSuffix: dc=kkops,dc=com dn: olcDatabase={2}hdb,cn=config changetype: modify replace: olcRootDN olcRootDN: cn=Manager,dc=kkops,dc=com dn: olcDatabase={2}hdb,cn=config changetype: modify add: olcRootPW olcRootPW: {SSHA}jezVaJuvRGc4KQ99LXfS7NDtk5paMy0z dn: olcDatabase={2}hdb,cn=config changetype: modify add: olcAccess olcAccess: {0}to attrs=userPassword,shadowLastChange by dn="cn=Manager,dc=kkops,dc=com" write by anonymous auth by self write by * none olcAccess: {1}to dn.base="" by * read olcAccess: {2}to * by dn="cn=Manager,dc=kkops,dc=com" write by * read [root@ldap1 ~]# ldapmodify -Y EXTERNAL -H ldapi:/// -f chdomain.ldif SASL/EXTERNAL authentication started SASL username: gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth SASL SSF: 0 modifying entry "olcDatabase={1}monitor,cn=config" modifying entry "olcDatabase={2}hdb,cn=config" modifying entry "olcDatabase={2}hdb,cn=config" modifying entry "olcDatabase={2}hdb,cn=config" modifying entry "olcDatabase={2}hdb,cn=config" vi basedomain.ldif # replace to your own domain name for "dc=***,dc=***" section dn: dc=kkops,dc=com objectClass: top objectClass: dcObject objectclass: organization o: Server World dc: kkops dn: cn=Manager,dc=kkops,dc=com objectClass: organizationalRole cn: Manager description: Directory Manager dn: ou=People,dc=kkops,dc=com objectClass: organizationalUnit ou: People dn: ou=Group,dc=kkops,dc=com objectClass: organizationalUnit ou: Group [root@ldap1 ~]# ldapadd -x -D cn=Manager,dc=kkops,dc=com -W -f basedomain.ldif Enter LDAP Password: adding new entry "dc=kkops,dc=com" adding new entry "cn=Manager,dc=kkops,dc=com" adding new entry "ou=People,dc=kkops,dc=com" adding new entry "ou=Group,dc=kkops,dc=com" ``` ##5. 放通端口 * LDAP默认使用389/TCP端口 ``` firewall-cmd --add-service=ldap --permanent firewall-cmd --reload ``` 如果觉得我的文章对您有用,请随意赞赏。您的支持将鼓励我继续创作! 赞赏支持