8.2. Migrating Identity Management from Red Hat Enterprise Linux 6 to Version 7
This procedure describes how to migrate all data and configuration from Red Hat Enterprise Linux 6 Identity Management to Red Hat Enterprise Linux 7 servers. The migration procedure includes:
- Migrating the Red Hat Enterprise Linux 6-based certificate authority (CA) master server to Red Hat Enterprise Linux 7.
- Transitioning all services to the new Red Hat Enterprise Linux 7 server. These services include CRL and certificate creating, DNS management, or Kerberos KDC administration.
- Decommissioning the original Red Hat Enterprise Linux 6 CA master.
In the following procedures:
rhel7.example.comis the Red Hat Enterprise Linux 7 system that will become the new CA master.ImportantThe only minor version that is currently supported is RHEL 7.9. Ensure you have RHEL 7.9 installed on your system.rhel6.example.comis the original Red Hat Enterprise Linux 6 CA master.NoteTo identify which Red Hat Enterprise Linux 6 server is the master CA server, determine on which server thecertmongerservice tracks therenew_ca_certcommand. Run this command on every Red Hat Enterprise Linux 6 server:getcert list -d /var/lib/pki-ca/alias -n "subsystemCert cert-pki-ca" | grep post-save
[root@rhel6 ~]# getcert list -d /var/lib/pki-ca/alias -n "subsystemCert cert-pki-ca" | grep post-save post-save command: /usr/lib64/ipa/certmonger/renew_ca_cert "subsystemCert cert-pki-ca"Copy to Clipboard Copied! Toggle word wrap Toggle overflow The post-save action that executes renew_ca_cert is defined only for the CA master.
8.2.1. Prerequisites for Migrating Identity Management from Red Hat Enterprise Linux 6 to 7 Copy linkLink copied to clipboard!
Copy linkLink copied to clipboard!
- Update the
rhel6.example.comsystem to the latest Red Hat Enterprise Linux 6 version. - On the
rhel6.example.comsystem, upgrade the ipa-* packages:yum update ipa-*
[root@rhel6 ~]# yum update ipa-*Copy to Clipboard Copied! Toggle word wrap Toggle overflow This step also makes sure that you have applied the RHBA-2015:0231-2 advisory, which provides the2.3-6.el6_6version of the bind-dyndb-ldap package and is available with the Red Hat Enterprise Linux 6.6 Extended Update Support (EUS).WarningUsing an earlier version of bind-dyndb-ldap results in inconsistent behavior in DNS forward zones serving between the Red Hat Enterprise Linux 6.6 DNS servers and Red Hat Enterprise Linux 7 DNS servers. - Make sure the
rhel7.example.comsystem meets the requirements in Section 2.1, “Prerequisites for Installing a Server” and Section 4.3, “Prerequisites for Installing a Replica”. - On the
rhel7.example.comsystem, install the required packages. See Section 2.2, “Packages Required to Install an IdM Server”.
8.2.2. Updating the Identity Management Schema on Red Hat Enterprise Linux 6 Copy linkLink copied to clipboard!
Copy linkLink copied to clipboard!
The
copy-schema-to-ca.py schema update script prepares rhel6.example.com for the installation of the rhel7.example.com replica. Updating the schema is necessary due to schema changes between Identity Management version 3.1 and later versions.
- Copy the
copy-schema-to-ca.pyschema update script from therhel7.example.comsystem to therhel6.example.comsystem. For example:scp /usr/share/ipa/copy-schema-to-ca.py root@rhel6:/root/
[root@rhel7 ~]# scp /usr/share/ipa/copy-schema-to-ca.py root@rhel6:/root/Copy to Clipboard Copied! Toggle word wrap Toggle overflow - Run the updated
copy-schema-to-ca.pyscript onrhel6.example.com.python copy-schema-to-ca.py
[root@rhel6 ~]# python copy-schema-to-ca.py ipa : INFO Installed /etc/dirsrv/slapd-PKI-IPA//schema/60kerberos.ldif [... output truncated ...] ipa : INFO Schema updated successfullyCopy to Clipboard Copied! Toggle word wrap Toggle overflow - Repeat the steps on every Red Hat Enterprise Linux 6 IdM replica that runs a certificate authority before connecting to a Red Hat Enterprise Linux 7 replica.
8.2.3. Installing the Red Hat Enterprise Linux 7 Replica Copy linkLink copied to clipboard!
Copy linkLink copied to clipboard!
- On the
rhel6.example.comsystem, create the replica file you will use to install therhel7.example.comreplica. For example, to create a replica file forrhel7.example.comwhose IP address is192.0.2.1:Copy to Clipboard Copied! Toggle word wrap Toggle overflow - Copy the replica information file from
rhel6.example.comtorhel7.example.com.scp /var/lib/ipa/replica-info-replica.example.com.gpg root@rhel7:/var/lib/ipa/
[root@rhel6 ~]# scp /var/lib/ipa/replica-info-replica.example.com.gpg root@rhel7:/var/lib/ipa/Copy to Clipboard Copied! Toggle word wrap Toggle overflow - If you install the new replica with an integrated CA on Red Hat Enterprise Linux 7.6 or later, append the following entry to the end of the
NSSCipherSuiteparameter in the/etc/httpd/conf.d/nss.conffile:+ecdhe_rsa_aes_128_sha,+ecdhe_rsa_aes_256_sha
+ecdhe_rsa_aes_128_sha,+ecdhe_rsa_aes_256_shaCopy to Clipboard Copied! Toggle word wrap Toggle overflow In Red Hat Enterprise Linux 7.6 or later, certain ciphers are no longer enabled by default in the IdM CA. Without adding this entry to the configuration, setting up an IdM server with integrated CA on Red Hat Enterprise Linux 7.6 as a replica of a master running on Red Hat Enterprise Linux 6 fails with a CRITICAL Failed to configure CA instance error. - Install the
rhel7.example.comreplica using the replica file. For example, the following command uses these options:--setup-cato set up the Certificate System component--setup-dnsand--forwarderto configure an integrated DNS server and set a forwarder--ip-addressto specify the IP address of therhel7.example.comsystem
Copy to Clipboard Copied! Toggle word wrap Toggle overflow See also:- Section D.2, “Creating Replicas”, which describes creating replicas using replica information files
- Verify that the Identity Management services are running on
rhel7.example.com.ipactl status
[root@rhel7 ~]# ipactl status Directory Service: RUNNING [... output truncated ...] ipa: INFO: The ipactl command was successfulCopy to Clipboard Copied! Toggle word wrap Toggle overflow
8.2.4. Transitioning the CA Services to the Red Hat Enterprise Linux 7 Server Copy linkLink copied to clipboard!
Copy linkLink copied to clipboard!
Before you begin:
- Verify that
rhel6.example.comandrhel7.example.comCAs are both configured as master servers.kinit admin ipa-csreplica-manage list
[root@rhel7 ~]$ kinit admin [root@rhel7 ~]$ ipa-csreplica-manage list rhel6.example.com: master rhel7.example.com: masterCopy to Clipboard Copied! Toggle word wrap Toggle overflow To display details about a replication agreement:Copy to Clipboard Copied! Toggle word wrap Toggle overflow
On the
rhel6.example.com original master CA, stop the CA subsystem certificate renewal:
- Disable tracking for the original CA certificates.
Copy to Clipboard Copied! Toggle word wrap Toggle overflow - Reconfigure
rhel6.example.comto retrieve renewed certificates from a new master CA.- Copy the renewal helper script into the
certmongerservice directory, and set the appropriate permissions.cp /usr/share/ipa/ca_renewal /var/lib/certmonger/cas/ chmod 0600 /var/lib/certmonger/cas/ca_renewal
[root@rhel6 ~]# cp /usr/share/ipa/ca_renewal /var/lib/certmonger/cas/ [root@rhel6 ~]# chmod 0600 /var/lib/certmonger/cas/ca_renewalCopy to Clipboard Copied! Toggle word wrap Toggle overflow - Update the SELinux configuration.
restorecon /var/lib/certmonger/cas/ca_renewal
[root@rhel6 ~]# restorecon /var/lib/certmonger/cas/ca_renewalCopy to Clipboard Copied! Toggle word wrap Toggle overflow - Restart
certmonger.service certmonger restart
[root@rhel6 ~]# service certmonger restartCopy to Clipboard Copied! Toggle word wrap Toggle overflow - Check that the CA is listed to retrieve certificates.
Copy to Clipboard Copied! Toggle word wrap Toggle overflow - Obtain the CA certificate database PIN.
grep internal= /var/lib/pki-ca/conf/password.conf
[root@rhel6 ~]# grep internal= /var/lib/pki-ca/conf/password.confCopy to Clipboard Copied! Toggle word wrap Toggle overflow - Configure
certmongerto track the certificates for external renewal. This requires the database PIN.Copy to Clipboard Copied! Toggle word wrap Toggle overflow
Move CRL generation from the original
rhel6.example.com CA master to rhel7.example.com.
- On
rhel6.example.com, stop CRL generation:- Stop the CA service.
service pki-cad stop
[root@rhel6 ~]# service pki-cad stopCopy to Clipboard Copied! Toggle word wrap Toggle overflow - Disable CRL generation on
rhel6.example.com. Open the/var/lib/pki-ca/conf/CS.cfgfile, and set the values of theca.crl.MasterCRL.enableCRLCacheandca.crl.MasterCRL.enableCRLUpdatesparameters tofalse.ca.crl.MasterCRL.enableCRLCache=false ca.crl.MasterCRL.enableCRLUpdates=false
ca.crl.MasterCRL.enableCRLCache=false ca.crl.MasterCRL.enableCRLUpdates=falseCopy to Clipboard Copied! Toggle word wrap Toggle overflow - Start the CA service.
service pki-cad start
[root@rhel6 ~]# service pki-cad startCopy to Clipboard Copied! Toggle word wrap Toggle overflow
- On
rhel6.example.com, configure Apache to redirect CRL requests:- Open the
/etc/httpd/conf.d/ipa-pki-proxy.conffile, and uncomment theRewriteRuleentry:RewriteRule ^/ipa/crl/MasterCRL.bin https://rhel6.example.com/ca/ee/ca/getCRL?op=getCRL&crlIssuingPoint=MasterCRL [L,R=301,NC]
RewriteRule ^/ipa/crl/MasterCRL.bin https://rhel6.example.com/ca/ee/ca/getCRL?op=getCRL&crlIssuingPoint=MasterCRL [L,R=301,NC]Copy to Clipboard Copied! Toggle word wrap Toggle overflow NoteDo not replace the server host name in the URL. The URL must refer to the local host name. - Restart Apache.
service httpd restart
[root@rhel6 ~]# service httpd restartCopy to Clipboard Copied! Toggle word wrap Toggle overflow
IdM obtains now the Certificate Revocation List (CRL) from the local CA instead of from a local file. - On
rhel7.example.com, configurerhel7.example.comas the new CA master:- Configure
rhel7.example.comto handle CA subsystem certificate renewal, as described in Section D.4.1, “Changing Which Server Handles Certificate Renewal”. - Configure
rhel7.example.comto general certificate revocation lists (CRLs), as described in Section 6.5.2.2, “Changing Which Server Generates CRLs”.
Related Information
- See Section 6.5.2, “Promoting a Replica to a Master CA Server” for details on CA subsystem certificate renewal and CRLs.
8.2.5. Stop the Red Hat Enterprise Linux 6 Server Copy linkLink copied to clipboard!
Copy linkLink copied to clipboard!
Stop all service on
rhel6.example.com to force domain discovery to the new rhel7.example.com server.
After this, using the
ipa utility will contact the new server through a remote procedure call (RPC).
8.2.6. Next Steps After Migrating the Master CA Server Copy linkLink copied to clipboard!
Copy linkLink copied to clipboard!
For each Red Hat Enterprise Linux 6 server in your topology:
- Create a replica file from
rhel7.example.com.NoteAfter installing a Red Hat Enterprise Linux 7 replica from a Red Hat Enterprise Linux 6 server, the domain level for the Identity Management domain is automatically set to 0.Red Hat Enterprise Linux 7.3 introduced an easier way to install and manage replicas. To use these features, your topology must be at domain level 1. See Chapter 7, Displaying and Raising the Domain Level. - Use the replica file to install a new replica on another Red Hat Enterprise Linux 7 system.
To decommission a Red Hat Enterprise Linux 6 server:
- Remove the server from the topology by executing the removal commands on a Red Hat Enterprise Linux 7 server.
Important
Client configurations will not update automatically. If you decommission an IDM server and configured the new server with a different name, you should review the overall client configurations. In particular, you must update the following files manually:
/etc/openldap/ldap.conf/etc/ipa/default.conf/etc/sssd/sssd.conf