Sponsored Content
Operating Systems Solaris Configure Solaris to accept Active Directory user logins Post 302780555 by os2mac on Thursday 14th of March 2013 04:37:51 PM
Old 03-14-2013
It IS called "services for Unix"

it's an AD plugin, that I believe is free. This is the same plugin you would use to do LDAP authentication to an MS AD server.
 

7 More Discussions You Might Find Interesting

1. Solaris

Connecting Solaris 9 to Windows Active Directory

Hi Everyone, Is it possible to for Solaris 9 box to join a Windows 2000 Active Directory Domain using Samba 3.X. If so are there any How To's out there or does anyone have experience with this. I have successfully done it with RHEL 3. Things that I configured in REDHAt to get it to... (0 Replies)
Discussion started by: morphous
0 Replies

2. Cybersecurity

configure apache to accept request form specific IP

Hi, What should I change in the httpd.conf so that the apache will accept request from page from specific IP and deny all the rest IP. I am reading the document of the apache but it is very long (700 pages) and I searched but I could not find something about this. So if someone can explain... (0 Replies)
Discussion started by: programAngel
0 Replies

3. Solaris

solaris samba configuration without wins service from authentication window server/Active directory

Hi All, We are using solaris samba server for our company project to provide access to code to our development team.Recently our ICT has disabled wins service on Active directory due which user are not able to connect to samba share and they are getting error "No logon server available" as samba... (2 Replies)
Discussion started by: sahil_shine
2 Replies

4. Proxy Server

Solaris 11.1 login authenticate with windows active directory

Hi, is that possible to login to solaris 11.1 authenticate with windows active directory? the user id is created in the windows active directory. Environment: Solaris 11.1 Windows 2012 Active Directory (3 Replies)
Discussion started by: freshmeat
3 Replies

5. Solaris

Join Solaris 11 server to Active Directory using smbadm?

We are having a hard time joining our organizations Active Directory using this guide. Keep getting hit with syntax and authentication errors. Has anyone here joined a Solaris 11 to an Active Directory using smbadm as detailed in this example? I understand that the example I cited is mainly... (0 Replies)
Discussion started by: LittleLebowski
0 Replies

6. Solaris

Authenticating UNIX (Solaris 11) to Windows 2012R2 / Active Directory

Gentleman, i am trying to setup Authentication for my Solaris 11 Server through Active Directory (Server 2012 R2). At least some things are already working, for example a getent passwd mydomainuser and ldapsearch command comes back with a correct result. So not everything i did was wrong. ... (1 Reply)
Discussion started by: bahnhasser83
1 Replies

7. UNIX for Beginners Questions & Answers

Disable multiple ssh logins for an OS user in Solaris

Hi folks, I am fairly a beginner when it comes to Solaris OS administration, but part of my job somehow has scope to provide L1-level of OS administration over a few solaris servers. Now, we have a requirement to limit the number of simultaneous ssh logins/sessions to the server, sort of... (0 Replies)
Discussion started by: engrcha
0 Replies
ipa-server-install(1)						 IPA Manual Pages					     ipa-server-install(1)

NAME
ipa-server-install - Configure an IPA server SYNOPSIS
ipa-server-install [OPTION]... DESCRIPTION
Configures the services needed by an IPA server. This includes setting up a Kerberos Key Distribution Center (KDC) and a Kadmin daemon with an LDAP back-end, configuring Apache, configuring NTP and optionally configuring and starting an LDAP-backed DNS server. By default a dog- tag-based CA will be configured to issue server certificates. OPTIONS
BASIC OPTIONS -r REALM_NAME, --realm=REALM_NAME The Kerberos realm name for the IPA server. You will not be able to estabilish trust with Active Directory unless the realm name is uppercased domain name. -n DOMAIN_NAME, --domain=DOMAIN_NAME Your DNS domain name -p DM_PASSWORD, --ds-password=DM_PASSWORD The password to be used by the Directory Server for the Directory Manager user -P MASTER_PASSWORD, --master-password=MASTER_PASSWORD The kerberos master password (normally autogenerated) -a ADMIN_PASSWORD, --admin-password=ADMIN_PASSWORD The password for the IPA admin user --mkhomedir Create home directories for users on their first login --hostname=HOST_NAME The fully-qualified DNS name of this server. If the hostname does not match system hostname, the system hostname will be updated accordingly to prevent service failures. --ip-address=IP_ADDRESS The IP address of this server. If this address does not match the address the host resolves to and --setup-dns is not selected the installation will fail. If the server hostname is not resolvable, a record for the hostname and IP_ADDRESS is added to /etc/hosts. -N, --no-ntp Do not configure NTP --idstart=IDSTART The starting user and group id number (default random) --idmax=IDMAX The maximum user and group id number (default: idstart+199999). If set to zero, the default value will be used. --no_hbac_allow Don't install allow_all HBAC rule. This rule lets any user from any host access any service on any other host. It is expected that users will remove this rule before moving to production. --no-ui-redirect Do not automatically redirect to the Web UI. --ssh-trust-dns Configure OpenSSH client to trust DNS SSHFP records. --no-ssh Do not configure OpenSSH client. --no-sshd Do not configure OpenSSH server. -d, --debug Enable debug logging when more verbose output is needed -U, --unattended An unattended installation that will never prompt for user input CERTIFICATE SYSTEM OPTIONS --external-ca Generate a CSR to be signed by an external CA --external_cert_file=FILE PEM file containing a certificate signed by the external CA. Must be given with --external_ca_file. --external_ca_file=FILE PEM file containing the external CA chain --dirsrv_pkcs12=FILE PKCS#12 file containing the Directory Server SSL Certificate --http_pkcs12=FILE PKCS#12 file containing the Apache Server SSL Certificate --dirsrv_pin=DIRSRV_PIN The password of the Directory Server PKCS#12 file --http_pin=HTTP_PIN The password of the Apache Server PKCS#12 file --subject=SUBJECT The certificate subject base (default O=REALM.NAME) DNS OPTIONS --setup-dns Generate a DNS zone if it does not exist already and configure the DNS server. This option requires that you either specify at least one DNS forwarder through the --forwarder option or use the --no-forwarders option. Note that you can set up a DNS at any time after the initial IPA server install by running ipa-dns-install (see ipa-dns-install(1)). --forwarder=IP_ADDRESS Add a DNS forwarder to the DNS configuration. You can use this option multiple times to specify more forwarders, but at least one must be provided, unless the --no-forwarders option is specified. --no-forwarders Do not add any DNS forwarders. Root DNS servers will be used instead. --reverse-zone=REVERSE_ZONE The reverse DNS zone to use --no-reverse Do not create reverse DNS zone --zonemgr The e-mail address of the DNS zone manager. Defaults to hostmaster@DOMAIN --no-host-dns Do not use DNS for hostname lookup during installation --no-dns-sshfp Do not automatically create DNS SSHFP records. UNINSTALL OPTIONS --uninstall Uninstall an existing IPA installation -U, --unattended An unattended uninstallation that will never prompt for user input EXIT STATUS
0 if the (un)installation was successful 1 if an error occurred SEE ALSO
ipa-dns-install(1) IPA
Jun 28 2012 ipa-server-install(1)
All times are GMT -4. The time now is 05:08 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy