Questo contenuto non è disponibile nella lingua selezionata.

Chapter 13. Preparing the system for IdM client installation


Verify system requirements for Identity Management (IdM) client installation to ensure successful enrollment and prevent configuration issues.

13.1. Supported versions of RHEL for installing IdM clients

Identify the supported Red Hat Enterprise Linux client versions for Identity Management (IdM) when servers run on RHEL 10.

An IdM deployment in which IdM servers are running on the latest minor version of RHEL 10 supports clients that are running on the latest minor versions of:

  • RHEL 7
  • RHEL 8
  • RHEL 9
  • RHEL 10
Note

While other client systems, for example Ubuntu, can work with IdM 10 servers, Red Hat does not provide support for these clients.

13.2. DNS requirements for IdM clients

Identity Management (IdM) clients rely on specific DNS configurations to locate and authenticate with the realm. You can ensure seamless service discovery and domain integration by providing clients with access to accurate SRV records and consistent name resolution.

Client installer by default tries to search for _ldap._tcp.DOMAIN DNS SRV records for all domains that are parent to its hostname. For example, if a client machine has a hostname client1.idm.example.com, the installer will try to retrieve an IdM server hostname from _ldap._tcp.idm.example.com, _ldap._tcp.example.com and _ldap._tcp.com DNS SRV records, respectively. The discovered domain is then used to configure client components (for example, SSSD and Kerberos 5 configuration) on the machine.

However, the hostnames of IdM clients are not required to be part of the primary DNS domain. If the client machine hostname is not in a subdomain of an IdM server, pass the IdM domain as the --domain option of the ipa-client-install command. In that case, after the installation of the client, both SSSD and Kerberos components will have the domain set in their configuration files and will use it to autodiscover IdM servers.

13.3. Port requirements for IdM clients

Open outgoing network ports on Identity Management (IdM) clients to enable communication with IdM server services.

On IdM client, these ports must be open in the outgoing direction. If you are using a firewall that does not filter outgoing packets, such as firewalld, the ports are already available in the outgoing direction.

13.4. Restricting Identity Management clients to IPv4

Configure Identity Management (IdM) clients to communicate exclusively over IPv4 if your network environment does not support IPv6. You can ensure consistent service discovery and avoid timeout issues by restricting the System Security Services Daemon (SSSD) to use the IPv4 protocol.

IdM does not require the IPv6 protocol to be enabled in the kernel of the host that you want to enroll into IdM.

Procedure

  1. Add the lookup_family_order parameter to the [domain/NAME] section of the /etc/sssd/sssd.conf file:

    lookup_family_order = ipv4_only
  2. Restart the SSSD service to apply the changes:

    # systemctl restart sssd

13.5. Installing packages required for an IdM client

Install the necessary software packages to prepare a client system for Identity Management (IdM) enrollment. The ipa-client package automatically installs other required packages as dependencies, such as the System Security Services Daemon (SSSD) packages.

Procedure

  • Install the ipa-client package:

    # dnf install ipa-client
Red Hat logoGithubredditYoutubeTwitter

Formazione

Prova, acquista e vendi

Community

Informazioni sulla documentazione di Red Hat

Aiutiamo gli utenti Red Hat a innovarsi e raggiungere i propri obiettivi con i nostri prodotti e servizi grazie a contenuti di cui possono fidarsi. Esplora i nostri ultimi aggiornamenti.

Rendiamo l’open source più inclusivo

Red Hat si impegna a sostituire il linguaggio problematico nel codice, nella documentazione e nelle proprietà web. Per maggiori dettagli, visita il Blog di Red Hat.

Informazioni su Red Hat

Forniamo soluzioni consolidate che rendono più semplice per le aziende lavorare su piattaforme e ambienti diversi, dal datacenter centrale all'edge della rete.

Theme

© 2026 Red Hat
Torna in cima