Questo contenuto non è disponibile nella lingua selezionata.
4.5. Creating the Replica: Introduction
The
ipa-replica-install utility is used to install a new replica from an existing IdM server. Install Identity Management replicas one at a time. The installation of multiple replicas at the same time is not supported.
Note
This chapter describes the simplified replica installation introduced in Red Hat Enterprise Linux 7.3. The procedures require domain level 1 (see Chapter 7, Displaying and Raising the Domain Level).
For documentation on installing a replica at domain level 0, see Appendix D, Managing Replicas at Domain Level 0.
You can install a new replica:
- on an existing IdM client by promoting the client to a replica: see the section called “Promoting an Existing Client to a Replica”
- on a machine that has not yet been enrolled in the IdM domain: see the section called “Installing a Replica on a Machine That Is Not a Client”
In both of these situations, you can customize your replica by adding options to
ipa-replica-install: see the section called “Using ipa-replica-install to Configure the Replica for Your Use Case”.
To install the replica as hidden, pass the
--hidden-replica parameter to ipa-replica-install. For further details about hidden replicas, see Section 4.2.3, “The Hidden Replica Mode”.
Important
If the IdM server you are replicating has a trust with Active Directory, set up the replica as a trust agent after running
ipa-replica-install. See Trust Controllers and Trust Agents in the Windows Integration Guide.
Promoting an Existing Client to a Replica
To install the replica on an existing client, you must make sure the client is authorized to be promoted. To achieve this, choose one of the following:
- Provide a privileged user's credentials
- The default privileged user is
admin. There are multiple ways to provide the user's credentials. You can:- let IdM prompt you to get the credentials interactivelyNoteThis is the default way to provide the privileged user's credentials. If no credentials are available when
ipa-replica-installruns, the installation automatically prompts you. - log in as the user before running
ipa-replica-installon the client:kinit admin
$ kinit adminCopy to Clipboard Copied! Toggle word wrap Toggle overflow - add the user's principal name and password to
ipa-replica-installdirectly:ipa-replica-install --principal admin --admin-password admin_password
# ipa-replica-install --principal admin --admin-password admin_passwordCopy to Clipboard Copied! Toggle word wrap Toggle overflow
- Add the client to the
ipaservershost group - Membership in
ipaserversgrants the machine elevated privileges analogous to a privileged user's credentials. You will not be required to provide the user's credentials.
Installing a Replica on a Machine That Is Not a Client
When run on a machine that has not yet been enrolled in the IdM domain,
ipa-replica-install first enrolls the machine as a client and then installs the replica components.
To install a replica in this situation, choose one of the following:
- Provide a privileged user's credentials
- The default privileged user is
admin. To provide the credentials, add the principal name and password toipa-replica-installdirectly:ipa-replica-install --principal admin --admin-password admin_password
# ipa-replica-install --principal admin --admin-password admin_passwordCopy to Clipboard Copied! Toggle word wrap Toggle overflow - Provide a random password for the client
- You must generate the random password on a server before installing the replica. You will not be required to provide the user's credentials during the installation.
By default, the replica is installed against the first IdM server discovered by the client installer. To install the replica against a particular server, add the following options to
ipa-replica-install:
--serverfor the server's fully qualified domain name (FQDN)--domainfor the IdM DNS domain
Using ipa-replica-install to Configure the Replica for Your Use Case
When run without any options,
ipa-replica-install only sets up basic server services. To install additional services, such as DNS or a certificate authority (CA), add options to ipa-replica-install.
Warning
Red Hat strongly recommends to keep the CA services installed on more than one server. For information on installing a replica of the initial server including the CA services, see Section 4.5.4, “Installing a Replica with a CA”.
If you install the CA on only one server, you risk losing the CA configuration without a chance of recovery if the CA server fails. See Section B.2.6, “Recovering a Lost CA Server” for details.
For example scenarios of installing a replica with the most notable options, see:
- Section 4.5.4, “Installing a Replica with a CA”, using
--setup-ca - Section 4.5.5, “Installing a Replica from a Server without a CA”, using
--dirsrv-cert-file,--dirsrv-pin,--http-cert-file,--http-pin, and--no-pkinit
You can also use the
--dirsrv-config-file parameter to change default Directory Server settings, by specifying the path to a LDIF file with custom values. For more information, see IdM now supports setting individual Directory Server options during server or replica installation in the Release Notes for Red Hat Enterprise Linux 7.3.
For a complete list of the options used to configure the replica, see the ipa-replica-install(1) man page.
4.5.1. Promoting a Client to a Replica Using a Host Keytab Copia collegamentoCollegamento copiato negli appunti!
Copia collegamentoCollegamento copiato negli appunti!
In this procedure, an existing IdM client is promoted to a replica using its own host keytab to authorize the promotion.
The procedure does not require you to provide the administrator or Directory Manager (DM) credentials. It is therefore more secure because no sensitive information is exposed on the command line.
- On an existing server:
- Log in as the administrator.
kinit admin
$ kinit adminCopy to Clipboard Copied! Toggle word wrap Toggle overflow - Add the client machine to the
ipaservershost group.Copy to Clipboard Copied! Toggle word wrap Toggle overflow Membership inipaserversgrants the machine elevated privileges analogous to the administrator's credentials.
- On the client, run the
ipa-replica-installutility.ipa-replica-install
# ipa-replica-installCopy to Clipboard Copied! Toggle word wrap Toggle overflow - Optionally, if the IdM server you are replicating has a trust with Active Directory, set up the replica as a trust agent or trust controller. For details, see Trust Controllers and Trust Agents in the Windows Integration Guide.
4.5.2. Installing a Replica Using a Random Password Copia collegamentoCollegamento copiato negli appunti!
Copia collegamentoCollegamento copiato negli appunti!
In this procedure, a replica is installed from scratch on a machine that is not yet an IdM client. To authorize the enrollment, a client-specific random password valid for one client enrollment only is used.
The procedure does not require you to provide the administrator or Directory Manager (DM) credentials. It is therefore more secure because no sensitive information is exposed on the command line.
- On an existing server:
- Log in as the administrator.
kinit admin
$ kinit adminCopy to Clipboard Copied! Toggle word wrap Toggle overflow - Add the new machine as an IdM host. Use the
--randomoption with the ipa host-add command to generate a random one-time password to be used for the replica installation.Copy to Clipboard Copied! Toggle word wrap Toggle overflow The generated password will become invalid after you use it to enroll the machine into the IdM domain. It will be replaced with a proper host keytab after the enrollment is finished. - Add the machine to the
ipaservershost group.Copy to Clipboard Copied! Toggle word wrap Toggle overflow Membership inipaserversgrants the machine elevated privileges required to set up the necessary server services.
- On the machine where you want to install the replica, run
ipa-replica-install, and provide the random password using the--passwordoption. Enclose the password in single quotes (') because it often contains special characters:ipa-replica-install --password 'W5YpARl=7M.n'
# ipa-replica-install --password 'W5YpARl=7M.n'Copy to Clipboard Copied! Toggle word wrap Toggle overflow - Optionally, if the IdM server you are replicating has a trust with Active Directory, set up the replica as a trust agent or trust controller. For details, see Trust Controllers and Trust Agents in the Windows Integration Guide.
4.5.3. Installing a Replica with DNS Copia collegamentoCollegamento copiato negli appunti!
Copia collegamentoCollegamento copiato negli appunti!
This procedure works for installing a replica on a client as well as on a machine that is not part of the IdM domain yet. See Section 4.5, “Creating the Replica: Introduction” for details.
- Run
ipa-replica-installwith these options:--setup-dnsto create a DNS zone if it does not exist already and configure the replica as the DNS server--forwarderto specify a forwarder, or--no-forwarderif you do not want to use any forwardersTo specify multiple forwarders for failover reasons, use--forwardermultiple times.
For example:ipa-replica-install --setup-dns --forwarder 192.0.2.1
# ipa-replica-install --setup-dns --forwarder 192.0.2.1Copy to Clipboard Copied! Toggle word wrap Toggle overflow NoteTheipa-replica-installutility accepts a number of other options related to DNS settings, such as--no-reverseor--no-host-dns. For more information about them, see the ipa-replica-install(1) man page. - If the initial server was created with DNS enabled, the replica is automatically created with the proper DNS entries. The entries ensure that IdM clients will be able to discover the new server.If the initial server did not have DNS enabled, add the DNS records manually. The following DNS records are necessary for the domain services:
_ldap._tcp_kerberos._tcp_kerberos._udp_kerberos-master._tcp_kerberos-master._udp_ntp._udp_kpasswd._tcp_kpasswd._udp
This example shows how to verify that the entries are present:- Set the appropriate values for the DOMAIN and NAMESERVER variables:
DOMAIN=example.com NAMESERVER=replica
# DOMAIN=example.com # NAMESERVER=replicaCopy to Clipboard Copied! Toggle word wrap Toggle overflow - Use the following command to check for the DNS entries:
Copy to Clipboard Copied! Toggle word wrap Toggle overflow
- Add DNS delegation from the parent domain to the IdM DNS domain. For example, if the IdM DNS domain is
ipa.example.com, add a name server (NS) record to theexample.comparent domain.ImportantThis step must be repeated each time an IdM DNS server is installed. - Optional, but recommended. Manually add other DNS servers as backup servers in case the replica becomes unavailable. See Section 33.11.1, “Setting up Additional Name Servers”. This is recommended especially for situations when the new replica is your first DNS server in the IdM domain.
- Optionally, if the IdM server you are replicating has a trust with Active Directory, set up the replica as a trust agent or trust controller. For details, see Trust Controllers and Trust Agents in the Windows Integration Guide.
4.5.4. Installing a Replica with a CA Copia collegamentoCollegamento copiato negli appunti!
Copia collegamentoCollegamento copiato negli appunti!
This procedure works for installing a replica on a client as well as on a machine that is not part of the IdM domain yet. See Section 4.5, “Creating the Replica: Introduction” for details.
- Run
ipa-replica-installwith the--setup-caoption.ipa-replica-install --setup-ca
[root@replica ~]# ipa-replica-install --setup-caCopy to Clipboard Copied! Toggle word wrap Toggle overflow - The
--setup-caoption copies the CA configuration from the initial server's configuration, regardless of whether the IdM CA on the server is a root CA or whether it is subordinated to an external CA.NoteFor details on the supported CA configurations, see Section 2.3.2, “Determining What CA Configuration to Use”. - Optionally, if the IdM server you are replicating has a trust with Active Directory, set up the replica as a trust agent or trust controller. For details, see Trust Controllers and Trust Agents in the Windows Integration Guide.
4.5.5. Installing a Replica from a Server without a CA Copia collegamentoCollegamento copiato negli appunti!
Copia collegamentoCollegamento copiato negli appunti!
This procedure works for installing a replica on a client as well as on a machine that is not part of the IdM domain yet. See Section 4.5, “Creating the Replica: Introduction” for details.
Important
You cannot install a server or replica using self-signed third-party server certificates.
- Run
ipa-replica-install, and provide the required certificate files by adding these options:--dirsrv-cert-file--dirsrv-pin--http-cert-file--http-pin
Additionally, you must specify eitheror both--no-pkinit
--no-pkinitCopy to Clipboard Copied! Toggle word wrap Toggle overflow and--pkinit-cert-file
--pkinit-cert-fileCopy to Clipboard Copied! Toggle word wrap Toggle overflow .--pkinit-pin
--pkinit-pinCopy to Clipboard Copied! Toggle word wrap Toggle overflow For details about the files that are provided using these options, see Section 2.3.6, “Installing Without a CA”.For example:Copy to Clipboard Copied! Toggle word wrap Toggle overflow NoteDo not add the--ca-cert-fileoption. Theipa-replica-installutility takes this part of the certificate information automatically from the master server. - Optionally, if the IdM server you are replicating has a trust with Active Directory, set up the replica as a trust agent or trust controller. For details, see Trust Controllers and Trust Agents in the Windows Integration Guide.