Este contenido no está disponible en el idioma seleccionado.
Chapter 8. Configuring IdM clients in an Active Directory DNS domain
While IdM clients should ideally reside in a separate DNS zone, you can join clients located in an Active Directory (AD) DNS domain to IdM. This enables RHEL-specific features for hosts within the AD namespace.
This configuration is not recommended and has limitations. Always deploy IdM clients in a DNS zone separate from the ones owned by AD and access IdM clients using their IdM host names.
Your IdM client configuration depends on whether you require single sign-on with Kerberos.
8.1. Configuring an IdM client without Kerberos single sign-on Copiar enlaceEnlace copiado en el portapapeles!
When an IdM client resides in an Active Directory (AD) DNS domain, password-based authentication is the only supported authentication method. Join the client to the IdM realm manually without Kerberos single sign-on.
Procedure
Install the IdM client with the
--domain=IPA_DNS_Domainoption to ensure the System Security Services Daemon (SSSD) can communicate with the IdM servers:[root@idm-client.ad.example.com ~]# ipa-client-install --domain=idm.example.comThis option disables the SRV record auto-detection for the Active Directory DNS domain.
Open the
/etc/krb5.confconfiguration file and locate the existing mapping for the Active Directory domain in the[domain_realm]section..ad.example.com = IDM.EXAMPLE.COM ad.example.com = IDM.EXAMPLE.COMReplace both lines with an entry mapping the fully qualified domain name (FQDN) of the Linux clients in the Active Directory DNS zone to the IdM realm:
idm-client.ad.example.com = IDM.EXAMPLE.COMBy replacing the default mapping, you prevent Kerberos from sending its requests for the Active Directory domain to the IdM Kerberos Distribution Center (KDC). Instead Kerberos uses auto-discovery through SRV DNS records to locate the KDC.
8.2. Requesting SSL certificates without single sign-on Copiar enlaceEnlace copiado en el portapapeles!
Request SSL certificates using certmonger for Identity Management (IdM) clients without Kerberos SSO to enable secure SSL-based services.
After you configure an IdM client without Kerberos single sign-on, you can set up SSL-based services.
SSL-based services require a certificate with dNSName extension records that cover all system host names, because both original (A/AAAA) and CNAME records must be in the certificate. Currently, IdM only issues certificates to host objects in the IdM database.
In this setup, where single sign-on is not enabled, IdM already contains a host object for the FQDN in its database. You can use certmonger to request a certificate using the FQDN.
Prerequisites
- An IdM client configured without Kerberos single-sign on.
Procedure
Use
certmongerto request a certificate using the FQDN:[root@idm-client.ad.example.com ~]# ipa-getcert request -r \ -f /etc/httpd/alias/server.crt \ -k /etc/httpd/alias/server.key \ -N CN=ipa-client.ad.example.com \ -D ipa-client.ad.example.com \ -K host/idm-client.ad.example.com@IDM.EXAMPLE.COM \ -U id-kp-serverAuthThe
certmongerservice uses the default host key stored in the/etc/krb5.keytabfile to authenticate to the IdM Certificate Authority (CA).
8.3. Configuring an IdM client with Kerberos single sign-on Copiar enlaceEnlace copiado en el portapapeles!
To enable Kerberos single sign-on (SSO) for IdM clients across DNS domains, you must map a CNAME record from the Active Directory (AD) domain to the IdM client’s A/AAAA record and configure the client to allow flexible principal acceptance.
For Kerberos-based application servers, MIT Kerberos supports a method to allow the acceptance of any host-based principal available in the application’s keytab.
Procedure
Configure Kerberos by editing the
/etc/krb5.conffile on the IdM client. In the[libdefaults]section, setignore_acceptor_hostnametotrue. This allows the application to accept any host-based principal in its keytab:ignore_acceptor_hostname = true-
Ensure a CNAME record exists in the Active Directory DNS, for example
idm-client.ad.example.com, pointing to the IdM client’s A/AAAA record in the IdM DNS domain.
8.4. Requesting SSL certificates with single sign-on Copiar enlaceEnlace copiado en el portapapeles!
To secure services using Kerberos SSO, your SSL certificate must include both the host’s A/AAAA and CNAME records. Since IdM only issues certificates to database host objects, you must manually create and link a host entry for the CNAME alias.
Create a host object for ipa-client.example.com in IdM and make sure the real IdM machine’s host object is able to manage this host.
Prerequisites
- You have disabled the strict checks on what Kerberos principal is used to target the Kerberos server.
Procedure
On the IdM server, create a host entry for the AD-side alias. Use
--forcebecause the name resolves to a CNAME rather than an A/AAAA record.[root@idm-server.idm.example.com ~]# ipa host-add idm-client.ad.example.com --forceTo allow the physical IdM host to manage the new alias entry in the IdM database, grant management permissions to the host.
[root@idm-server.idm.example.com ~]# ipa host-add-managedby idm-client.ad.example.com \ --hosts=idm-client.idm.example.comOn the IdM client, use
ipa-getcertto request the certificate. Ensure that you include both the FQDN and the CNAME using the-Dflags.[root@idm-client.idm.example.com ~]# ipa-getcert request -r \ -f /etc/httpd/alias/server.crt \ -k /etc/httpd/alias/server.key \ -N CN=`hostname --fqdn` \ -D `hostname --fqdn` \ -D idm-client.ad.example.com \ -K host/idm-client.idm.example.com@IDM.EXAMPLE.COM \ -U id-kp-serverAuthIn SSL/TLS, the client checks the Subject Alternative Name (SAN) field. By using -D twice, you are populating that SAN field with both names so that no matter which URL the user hits, the certificate remains valid.