From the course: Linux System Engineer: Authentication with LDAP and Kerberos

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Configure LDAP authentication on the CLI

Configure LDAP authentication on the CLI

From the course: Linux System Engineer: Authentication with LDAP and Kerberos

Start my 1-month free trial

Configure LDAP authentication on the CLI

- [Instructor] For this video, you'll need both your rhhost1 and rhhost2vm's running. Now log in to your rhhost2vm as user1 and open a terminal. Now let's use the authconfig command to configure our system to use our LDAP directory server. To configure the LDAP client, type in sudo authconfig --enableldap - -enableldapauth - -ldapserver=rhhost1.localnet.com - -ldapbasedn= "dc=localnet ,dc=com" - -enablemkhomedir - -update and hit Enter. Type in your password if prompted. You may see an SELinux security message here. To address the denial, then go to Applications, Sundry, and SELinux Troubleshooter and follow the suggestions. Now, let's restart the LDAP client service. Type in clear, and then type in sudo systemctl restart nslcd and hit Enter. Now to verify that our client is contacting the LDAP server, let's request LDAP entries from it. Type in sudo getent passwd rhuser and hit Enter. If it's successful, you should get user information from the LDAP server. The ultimate test…

Contents