1.11. Options for the IdM installation commands
Commands such as ipa-server-install, ipa-replica-install, ipa-dns-install and ipa-ca-install have numerous options you can use to supply additional information for an interactive installation. You can also use these options to script an unattended installation.
The following tables display some of the most common options for different components. Options for a specific component are shared across multiple commands. For example, you can use the --ca-subject option with both the ipa-ca-install and ipa-server-install commands.
For an exhaustive list of options, see the ipa-server-install(1), ipa-replica-install(1), ipa-dns-install(1) and ipa-ca-install(1) man pages.
| Argument | Description |
|---|---|
|
| Enables debug logging for more verbose output. |
|
| Enables an unattended installation session that does not prompt for user input. |
|
| The fully-qualified domain name of the IdM server machine. Only numbers, lowercase alphabetic characters, and hyphens (-) are allowed. |
|
| Specifies the IP address of the server. This option only accepts IP addresses associated with the local interface. |
|
| The path to an LDIF file used to modify the configuration of the directory server instance. |
|
| The name of the LDAP server domain to use for the IdM domain. This is usually based on the IdM server’s hostname. |
|
|
The password of the superuser, |
|
|
The password for the |
|
|
The name of the Kerberos realm to create for the IdM domain in uppercase, such as |
|
| Tells the installation script to set up a DNS service within the IdM domain. |
|
|
Install and configure a CA on this replica. If a CA is not configured, certificate operations are forwarded to another replica with a CA installed. For |
| Argument | Description |
|---|---|
|
| Enables Random Serial Numbers version 3 (RSNv3) for the IdM CA. When enabled, the CA generates fully random serial numbers for certificates and requests in the PKI. This option is enabled by default for all new IdM installations on RHEL 10 or if another CA in the topology is configured with RSNv3. Since RHEL 10 does not support sequential serial numbers, it is not possible to disable this. IMPORTANT: RSNv3 is supported only for new IdM CA installations. If enabled, it is required to use RSNv3 on all PKI services. |
|
| Specifies the CA certificate subject Distinguished Name (default: CN=Certificate Authority,O=REALM.NAME). Relative Distinguished Names (RDN) are in LDAP order, with the most specific RDN first. |
|
| Specifies the subject base for certificates issued by IdM (default O=REALM.NAME). Relative Distinguished Names (RDN) are in LDAP order, with the most specific RDN first. |
|
| Generates a certificate signing request to be signed by an external CA. |
|
|
Specifies the signing algorithm of the IdM CA certificate. Possible values are SHA1withRSA, SHA256withRSA, SHA512withRSA. The default is SHA256withRSA. Use this option with |
|
|
Specifies a file that contains overrides for the CA installation. Also available with the |
| Argument | Description |
|---|---|
|
| Specifies a DNS forwarder to use with the DNS service. To specify more than one forwarder, use this option multiple times. |
|
| Uses root servers with the DNS service instead of forwarders. |
|
| Does not create a reverse DNS zone when the DNS domain is set up. If a reverse DNS zone is already configured, then that existing reverse DNS zone is used.
If this option is not used, then the default value is |