Red Hat LINUX VIRTUAL SERVER 4.6 - ADMINISTRATION Guida di Installazione Pagina 14

  • Scaricare
  • Aggiungi ai miei manuali
  • Stampa
Vedere la pagina 13
14
1. Open System > Administration > Authentication.
2. On Identity & Authentication tab, change User Account Database to Winbind.
3. Set the Security Model to ads.
4. Enter values for each of the following fields:
Winbind Domain - Enter the NetBIOS name of the AD domain, which may be
different from the Windows ADS Realm name.
Winbind ADS Realm - Enter the Kerberos realm name for the domain. This must be
specified in uppercase.
Windows Domain Controllers - Enter the FQDN of the AD domain controller.
5. Change Template Shell to /bin/bash.
6. Click Join Domain....
7. Save configuration when prompted.
8. When prompted, enter the credentials of a domain user with permission to add machines to
the domain. If successful, control will return the Authentication Configuration window.
9. Change to the Advanced Options tab.
10. Under Other Authentication Options, check Create home directories on the first login.
11. Click Apply.
4.6.1.5 Configure PAM for Winbind
By default, the configuration for the Winbind PAM module (pam_winbind) does not enable
Kerberos ticket caching and home directory creation. Open /etc/security/pam_winbind.conf and
add or change the following entries under the [Global] section:
krb5_auth = yes
krb5_ccache_type = FILE
mkhomedir = yes
These changes require restarting the Winbind daemon:
sudo service winbind restart
Note that the winbind process will only continue to run if the machine is joined to a domain.
4.6.1.6 Verify Domain Membership
The XenDesktop Controller requires that all VDA machines, whether Windows and Linux, have a
computer object in Active Directory.
Verify the machine is joined to a domain using Samba's net ads command:
sudo net ads testjoin
Additional domain and computer object information can be verified with:
sudo net ads info
4.6.1.7 Verify Kerberos Configuration
To verify Kerberos is configured correctly for use with the Linux VDA, check that the system keytab
file has been created and contains valid keys:
sudo klist -ke
Vedere la pagina 13
1 2 ... 9 10 11 12 13 14 15 16 17 18 19 ... 26 27

Commenti su questo manuale

Nessun commento