이 콘텐츠는 선택한 언어로 제공되지 않습니다.

29.3. Scenario 1: Using SSSD as Part of Migration


Important

This is a general migration procedure, but it may not work in every environment.
It is strongly recommended that you set up a test LDAP environment and test the migration process before attempting to migrate the real LDAP environment.
  1. Set up SSSD. Using SSSD allows the required Kerberos keys and server certificates to be delivered to the clients.
    1. Install SSSD on every client machine:
      # yum install sssd
      Copy to Clipboard Toggle word wrap
    2. Configure an LDAP identity provider in SSSD to use the existing Directory Server for all functions (authentication, identity lookups, access, and password changes). This ensures every client works properly with the existing directory service.
  2. Install Identity Management, including any custom LDAP directory schema[11], on a different machine from the existing LDAP directory.
  3. Enable the IdM server to allow migration:
    # ipa config-mod --enable-migration=TRUE
    Copy to Clipboard Toggle word wrap
  4. Disable the compat plug-in.
    # ipa-compat-manage disable
    Copy to Clipboard Toggle word wrap
  5. Restart the IdM Directory Server instance.
    # service dirsrv restart
    Copy to Clipboard Toggle word wrap
  6. Run the IdM migration script, ipa migrate-ds. At its most basic, this requires only the LDAP URL of the LDAP directory instance to migrate:
    # ipa migrate-ds ldap://ldap.example.com:389
    Copy to Clipboard Toggle word wrap
    Simply passing the LDAP URL migrates all of the directory data using common default settings. The user and group data can be selectively migrated by specifying other options, as covered in Section 29.2, “Examples for Using migrate-ds”.
    Once the information is exported, the script adds all required IdM object classes and attributes and converts DNs in attributes to match the IdM directory tree.
  7. Re-enable the compat plug-in.
    # ipa-compat-manage enable
    Copy to Clipboard Toggle word wrap
  8. Restart the IdM Directory Server instance.
    # service dirsrv restart
    Copy to Clipboard Toggle word wrap
  9. Move clients that have SSSD installed from the LDAP backend to the Identity Management backend and enroll them as client with IdM. This downloads the required keys and certificates.
    On Red Hat Enterprise Linux clients, this can be done using the ipa-client-install command. For example:
    # ipa-client-install --enable-dns-updates
    Copy to Clipboard Toggle word wrap
  10. Have users log into a machine with SSSD and Identity Management backend. This generates the required Kerberos keys for the user.
    To monitor the user migration process, query the existing LDAP directory to see which user accounts have a password but do not yet have a Kerberos principal key.
    $ ldapsearch -LL -x -D 'cn=Directory Manager' -w secret -b 'ou=people,dc=example,dc=com' '(&(!(krbprincipalkey=*))(userpassword=*))' uid
    Copy to Clipboard Toggle word wrap

    Note

    Include the quotes around the filter so that it is not interpreted by the shell.
  11. Once users have been migrated over, configure non-SSSD clients to use the IdM domain, as required.
  12. When the migration of all clients and users is complete, decommission the LDAP directory.


[11] There is limited support for custom user and group schema in Identity Management.
Red Hat logoGithubredditYoutubeTwitter

자세한 정보

평가판, 구매 및 판매

커뮤니티

Red Hat 문서 정보

Red Hat을 사용하는 고객은 신뢰할 수 있는 콘텐츠가 포함된 제품과 서비스를 통해 혁신하고 목표를 달성할 수 있습니다. 최신 업데이트를 확인하세요.

보다 포괄적 수용을 위한 오픈 소스 용어 교체

Red Hat은 코드, 문서, 웹 속성에서 문제가 있는 언어를 교체하기 위해 최선을 다하고 있습니다. 자세한 내용은 다음을 참조하세요.Red Hat 블로그.

Red Hat 소개

Red Hat은 기업이 핵심 데이터 센터에서 네트워크 에지에 이르기까지 플랫폼과 환경 전반에서 더 쉽게 작업할 수 있도록 강화된 솔루션을 제공합니다.

Theme

© 2026 Red Hat
맨 위로 이동