Oct 25, 2018 · To remember the different options, I found this tip helping. Just type authconfig | grep ldap. It’ll show all the required ldap options. Helps a lot to remember.

The command authconfig --test shows me the line : pam_pwquality is enabled (try_first_pass local_users_only retry=3 authtok_type=) local_users_only is disturbing me but may wrong. What's the right option to give at the authconfig command. Thanks for your help I use ldap with a manual config, not using authconfig. Note this is not redhat/centos, but ubuntu and debian, but the config many be similar. (I use pam_ldap and nss_ldap) I have a line in the ldap.conf which looks like this : nss_base_group ou=group, o=Mydirectory Dec 24, 2016 · In order to test a LDAP client configuration, you will need to configure a LDAP directory service. The LDAP server is called instructor.example.com in this procedure. LDAP Client Configuration. As the authconfig-tui is deprecated, to configure the LDAP client side, there are two available options: nslcd and sssd. Oct 02, 2013 · LDAP, or Lightweight Directory Access Protocol, is one way of keeping authentication information in a single centralized location. In a previous article, we discussed how to set up an LDAP server on an Ubuntu 12.04 VPS. This explained the actual server configuration. LDAP Server configuration. In order to test a LDAP client configuration, you will need to configure a LDAP directory service. The LDAP server is called instructor.example.com in this procedure. LDAP Client configuration. Install the following packages: # yum install -y openldap-clients nss-pam-ldapd. Run the authentication menu: # authconfig-tui

Instead authconfig-gtk properly create the hash link. Then I think is better to configure ldap authentication using authconfig-gtk. If you want to configure ldap/kerberos authentication using authconfig-tui, without disabling tls, you need to: Configure authentication ldap/kerberos using authconfig-tui.

Mar 22, 2013 · We use the PXE boot method with kickstart files to provision our computers. For LDAP authentication setup in CentOS 5.x, the kickstart authconfig line simply was: [code]authconfig --enableshadow --passalgo=md5 --enableldap --enableldapauth --ldapserver=server.company.site --ldapbasedn=dc=company,dc=site[/code]

Mar 22, 2013 · We use the PXE boot method with kickstart files to provision our computers. For LDAP authentication setup in CentOS 5.x, the kickstart authconfig line simply was: [code]authconfig --enableshadow --passalgo=md5 --enableldap --enableldapauth --ldapserver=server.company.site --ldapbasedn=dc=company,dc=site[/code]

The 389DS access log doesn't show me anything, probably because authconfig/sssd/whatever isn't updating its cache. I haven't managed to catch an actual lookup in the log. (I do see in the log that authconfig/sssd/something is still trying to make anonymous binds, despite my putting a ldap_default_bind_dn and ldap_default_authtok in sssd.conf.) This option sets # the domain's source of identity information. #auth_provider = ldap # As with identity providers, SSSD can authenticate in a variety of ways. # By default, SSSD will use the value of id_provider. access_provider = ldap # The access provider controls the source for determining who is allowed # to access the system. authconfig Equivalent for Solaris 10 (for LDAP client) Hello, Just wondering if any of you knew off the top of your head what the equivalent of the authconfig on Sun Solaris 10?