Sponsored Content
Operating Systems Solaris Solaris 10 as a Red Hat IPA Client Post 302958510 by gregsih on Friday 23rd of October 2015 04:34:06 AM
Old 10-23-2015
Solaris 10 as a Red Hat IPA Client

Hi

We have IPA v3 setup on a Red Hat RHEL6 server and are trying to interface our Solaris servers to it.

There is a slight complication in that we are using krb5 for authentication and IPA as a user and access repository (not sure if that makes a difference). The problem is that we cannot get the Solaris Client to bind to the IPA LDAP server.

Log files have proved little help. We know that the servers are communicating but the bind fails with various errors.

Has anybody successfully interfaced Solaris to RHEL IPA? and if so how?

Thanks

Greg
 

9 More Discussions You Might Find Interesting

1. Linux

red hat ee 2.6.9-42

hello. I would be greatfull if someone could tell me how will i see what dns server and gateway my red hat server uses. I tryied to find out by typing ifconfig command but i got : -bash: ifconfig: command not found , although man ifonconfig gives output with info about using that command. Is... (3 Replies)
Discussion started by: tonijel
3 Replies

2. UNIX for Advanced & Expert Users

Unusual NFS mount problem on only ONE client: Red Hat WS Rel 3

This is an unusual situation where I have an NFS server currently serving out MULTIPLE clients over several variants of Linux and UNIX successfully (world permissions) except for a SINGLE client. Even the other Linux (SuSE) clients in the same room are mounting successfully with defaults without... (6 Replies)
Discussion started by: neelpert1
6 Replies

3. Solaris

Windows,Solaris, Red Hat triple boot issues

I have a pentium IV with 512 MB ram and 80 GB HDD. I first installed windows XP on the first primary partition, then Solaris on the second with 20 GB for the solaris partition, and when rebooted , the grub menu functioned as expected giving me the options to dual boot, so next I wanted to install... (3 Replies)
Discussion started by: saagar
3 Replies

4. Red Hat

Oracle client for Red Hat linux on IBM PPC64

Hi , Am trying to install oracle 10g client on Red Hat Linux in an IBM PPC machine. when i try to install during linking am getting the below error My software details : Oracle Version : 10.2.0 Red Hat Version : 5.5 Server Hardware : PPC 64 Error from the logs : /usr/bin/make -f... (7 Replies)
Discussion started by: mugunthanvh
7 Replies

5. Red Hat

x-win client connect red hat

Hi, I use red hat linux ES 5.5 32 bit . There is x win(startx) installed. I wan to use XP at another computer and connect the x-win(startx) through IP network . Which software/freeware I can use ??? Please advice .. Is it free ??? (0 Replies)
Discussion started by: chuikingman
0 Replies

6. UNIX for Dummies Questions & Answers

how to know if i use "Red Hat Enterprise Linux" or "Red Hat Desktop" ?

how to know if i use "Red Hat Enterprise Linux" or "Red Hat Desktop" ? (2 Replies)
Discussion started by: ahmedamer12
2 Replies

7. Solaris

Installing Solaris 11.1 on Red Hat system?

I'm wanting to install Solaris 11.1 on a system that already has Windows and Red Hat and a boot system managed by GRUB. From what I've read, the Solaris 11.1 install will recognize Windows fine and account for it with GRUB 2. But it doesn't mention any other OS. It talks about installing... (2 Replies)
Discussion started by: JWH
2 Replies

8. Solaris

Solaris for a Red Hat admin

Hello Solaris gurus Recently I was assigned to work on the company's Oracle Solaris 10 servers. Actually this is the first time I lay eyes on a Solaris machine... like ever! I've spent my career dealing with Red Hat run servers (I am an RHCE). I've also worked for a while on IBM AIX. The question... (4 Replies)
Discussion started by: abohmeed
4 Replies

9. Solaris

Instructions for Solaris 10 RedHat RHEL7 IPA for LDAP authentication?

Hi, does anyone have instructions on how to connect a Solaris 10 (Sparc) machine to Redhat RHEL7 IPA server for LDAP authentication, I have gone through the usual search results on Google, but nothing is working so far, but to be fair, not sure which source is the best and have NOT rewound... (3 Replies)
Discussion started by: ckmehta
3 Replies
ipa-adtrust-install(1)						 IPA Manual Pages					    ipa-adtrust-install(1)

NAME
ipa-adtrust-install - Prepare an IPA server to be able to establish trust relationships with AD domains SYNOPSIS
ipa-adtrust-install [OPTION]... DESCRIPTION
Adds all necessary objects and configuration to allow an IPA server to create a trust to an Active Directory domain. This requires that the IPA server is already installed and configured. Please note you will not be able to estabilish an trust to an Active Directory domain unless the realm name of the IPA server matches its domain name. ipa-adtrust-install can be run multiple times to reinstall deleted objects or broken configuration files. E.g. a fresh samba configuration (smb.conf file and registry based configuration can be created. Other items like e.g. the configuration of the local range cannot be changed by running ipa-adtrust-install a second time because with changes here other objects might be affected as well. OPTIONS
-d, --debug Enable debug logging when more verbose output is needed --ip-address=IP_ADDRESS The IP address of the IPA server. If not provided then this is determined based on the hostname of the server. --netbios-name=NETBIOS_NAME The NetBIOS name for the IPA domain. If not provided then this is determined based on the leading component of the DNS domain name. Running ipa-adtrust-install for a second time with a different NetBIOS name will change the name. Please note that changing the Net- BIOS name might break existing trust relationships to other domains. --no-msdcs Do not create DNS service records for Windows in managed DNS server. Since those DNS service records are the only way to discover domain controllers of other domains they must be added manually to a different DNS server to allow trust realationships work prop- erly. All needed service records are listed when ipa-adtrust-install finishes and either --no-msdcs was given or no IPA DNS service is configured. Typically service records for the following service names are needed for the IPA domain which should point to all IPA servers: o _ldap._tcp o _kerberos._tcp o _kerberos._udp o _ldap._tcp.dc._msdcs o _kerberos._tcp.dc._msdcs o _kerberos._udp.dc._msdcs o _ldap._tcp.Default-First-Site-Name._sites.dc._msdcs o _kerberos._tcp.Default-First-Site-Name._sites.dc._msdcs o _kerberos._udp.Default-First-Site-Name._sites.dc._msdcs --add-sids Add SIDs to existing users and groups as a final step of the ipa-adtrust-install run. If there a many existing users and groups and a couple of replicas in the environment this operation might lead to a high replication traffic and a performance degradation of all IPA servers in the environment. To avoid this the SID generation can be run after ipa-adtrust-install is run and scheduled indepen- dently. To start this task you have to load an edited version of ipa-sidgen-task-run.ldif with the ldapmodify command info the directory server. -U, --unattended An unattended installation that will never prompt for user input -U, --rid-base=RID_BASE First RID value of the local domain. The first Posix ID of the local domain will be assigned to this RID, the second to RID+1 etc. See the online help of the idrange CLI for details. -U, --secondary-rid-base=SECONDARY_RID_BASE Start value of the secondary RID range, which is only used in the case a user and a group share numerically the same Posix ID. See the online help of the idrange CLI for details. -A, --admin-name=ADMIN_NAME The name of the user with administrative privileges for this IPA server. Defaults to 'admin'. -a, --admin-password=password The password of the user with administrative privileges for this IPA server. Will be asked interactively if -U is not specified. The credentials of the admin user will be used to obtain Kerberos ticket before configuring cross-realm trusts support and afterwards, to ensure that the ticket contains MS-PAC information required to actually add a trust with Active Directory domain via 'ipa trust-add --type=ad' command. --enable-compat Enables support for trusted domains users for old clients through Schema Compatibility plugin. SSSD supports trusted domains natively starting with version 1.9. For platforms that lack SSSD or run older SSSD version one needs to use this option. When enabled, slapi-nis package needs to be installed and schema-compat-plugin will be configured to provide lookup of users and groups from trusted domains via SSSD on IPA server. These users and groups will be available under cn=users,cn=compat,$SUFFIX and cn=groups,cn=compat,$SUFFIX trees. SSSD will normalize names of users and groups to lower case. In addition to providing these users and groups through the compat tree, this option enables authentication over LDAP for trusted domain users with DN under compat tree, i.e. using bind DN uid=administrator@ad.domain,cn=users,cn=compat,$SUFFIX. LDAP authentication performed by the compat tree is done via PAM 'system-auth' service. This service exists by default on Linux systems and is provided by pam package as /etc/pam.d/system-auth. If your IPA install does not have default HBAC rule 'allow_all' enabled, then make sure to define in IPA special service called 'system-auth' and create an HBAC rule to allow access to anyone to this rule on IPA masters. As 'system-auth' PAM service is not used directly by any other application, it is safe to use it for trusted domain users via com- patibility path. EXIT STATUS 0 if the installation was successful 1 if an error occurred IPA
Aug 23 2011 ipa-adtrust-install(1)
All times are GMT -4. The time now is 05:03 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy