The software described in this documentation is either in Extended Support or Sustaining Support. See https://www.oracle.com/us/support/library/enterprise-linux-support-policies-069172.pdf for more information.
Oracle recommends that you upgrade the software described by this documentation as soon as possible.
To configure an SSSD server:
Install the
sssdandsssd-clientpackages:#
yum install sssd sssd-clientEdit the
/etc/sssd/sssd.confconfiguration file and configure the sections to support the required services, for example:[sssd] config_file_version = 2 domains = LDAP services = nss, pam [domain/LDAP] id_provider = ldap ldap_uri = ldap://ldap.mydom.com ldap_search_base = dc=mydom,dc=com auth_provider = krb5 krb5_server = krbsvr.mydom.com krb5_realm = MYDOM.COM cache_credentials = true min_id = 5000 max_id = 25000 enumerate = false [nss] filter_groups = root filter_users = root reconnection_retries = 3 entry_cache_timeout = 300 [pam] reconnection_retries = 3 offline_credentials_expiration = 2 offline_failed_login_attempts = 3 offline_failed_login_delay = 5
The
[sssd]section contains configuration settings for SSSD monitor options, domains, and services. The SSSD monitor service manages the services that SSSD provides.The
servicesentry defines the supported services, which should includenssfor the Name Service Switch andpamfor Pluggable Authentication Modules.The
domainsentry specifies the name of the sections that define authentication domains.The
[domain/LDAP]section defines a domain for an LDAP identity provider that uses Kerberos authentication. Each domain defines where user information is stored, the authentication method, and any configuration options. SSSD can work with LDAP identity providers such as OpenLDAP, Red Hat Directory Server, IPA, and Microsoft Active Directory, and it can use either native LDAP or Kerberos authentication.The
id_providerentry specifies the type of provider (in this example, LDAP).ldap_urispecifies a comma-separated list of the Universal Resource Identifiers (URIs) of the LDAP servers, in order of preference, to which SSSD can connect.ldap_search_basespecifies the base distinguished name (dn) that SSSD should use when performing LDAP user operations on a relative distinguished name (RDN) such as a common name (cn).The
auth_providerentry specifies the authentication provider (in this example, Kerberos).krb5_serverspecifies a comma-separated list of Kerberos servers, in order of preference, to which SSSD can connect.krb5_realmspecifies the Kerberos realm.cache_credentialsspecifies if SSSD caches user credentials such as tickets, session keys, and other identifying information to support offline authentication and single sign-on.NoteTo allow SSSD to use Kerberos authentication with an LDAP server, you must configure the LDAP server to use both Simple Authentication and Security Layer (SASL) and the Generic Security Services API (GSSAPI). For more information about configuring SASL and GSSAPI for OpenLDAP, see http://www.openldap.org/doc/admin24/sasl.html.
The
min_idandmax_identries specify upper and lower limits on the values of user and group IDs.enumeratespecifies whether SSSD caches the complete list of users and groups that are available on the provider. The recommended setting isFalseunless a domain contains relatively few users or groups.The
[nss]section configures the Name Service Switch (NSS) module that integrates the SSS database with NSS. Thefilter_usersandfilter_groupsentries prevent NSS retrieving information about the specified users and groups being retrieved from SSS.reconnection_retriesspecifies the number of times that SSSD should attempt to reconnect if a data provider crashes.enum_cache_timeoutspecifies the number of seconds for which SSSD caches user information requests.The
[pam]section configures the PAM module that integrates SSS with PAM. Theoffline_credentials_expirationentry specifies the number of days for which to allow cached logins if the authentication provider is offline.offline_failed_login_attemptsspecifies how many failed login attempts are allowed if the authentication provider is offline.offline_failed_login_delayspecifies how many minutes afteroffline_failed_login_attemptsfailed login attempts that a new login attempt is permitted.Change the mode of
/etc/sssd/sssd.confto 0600:#
chmod 0600 /etc/sssd/sssd.confEnable the SSSD service:
#
authconfig --update --enablesssd --enablesssdauthNoteIf you edit
/etc/sssd/sssd.conf, use this command to update the service.The --enablesssd option updates
/etc/nsswitch.confto support SSS.The --enablesssdauth option updates
/etc/pam.d/system-authto include the requiredpam_sss.soentries to support SSSD.

