The authconfig command automatically uses the pam_oddjob_mkhomedir.so library if it is available. Otherwise, it will default to using pam_mkhomedir.so . Make sure the oddjobd service is running. Open the authconfig UI, as in Section 2.2.3, “Launching the authconfig UI”. Open the Advanced Options tab. Select the algorithm to use in the Password Hashing Algorithm drop-down menu. Basic LDAP, Kerberos 5, and SMB (authentication) client configuration is also provided. If --test action is specified, authconfig can be run by users other then root, and any configuration changes are not saved but printed instead. DESCRIPTION authconfig provides a simple method of configuring /etc/sysconfig/network to handle NIS, as well as /etc/passwd and /etc/shadow, the files used for shadow password support. Basic LDAP, Kerberos 5, and Winbind client configuration is also provided. To connect to a central LDAP server for user information, Authconfig needs a number of settings: The host name of the LDAP server. The base DN (Distinguished Name) of the part of the LDAP tree where the system should look for users. This typically looks something like dc=example, dc=com.

ldap_tls_reqcert = never to /etc/sssd/sssd.conf. For some unknown reason, the server still using nslcd to authentication. If am inside root user and trying to. su - LDAPuser it works. However, when I am inside normal user (local user), and I am trying to su into LDAP user, I am getting: su: Authentication service cannot retrieve authentication info

# yum -y install authconfig krb5-workstation pam_krb5 samba-common oddjob-mkhomedir This will install everything you need to get up and running. There is two ways you can configure the authentication. From the command line (authconfig) or via a console GUI (authconfig-tui). It all works just depends on which version you are comfortable with. (01) Configure LDAP Server (02) Add LDAP User Accounts (03) Configure LDAP Client (04) Configure LDAP Client (AD) (05) LDAP over SSL/TLS (06) OpenLDAP Replication (07) OpenLDAP Multi-Master Replication (08) Install phpLDAPadmin Basic LDAP, Kerberos 5, and Winbind client configuration is also provided. If --test action is specified, the authconfig just reads the current settings from the various configuration files and prints their values. If --update action is specified, authconfig must be run by root (or through console helper), and configuration changes are saved On RHEL 6 LDAP client configuration involves editing multiple files such pam, nssswitch, authconfig etc. But “authconfig” command made it easier for us. I walk you through how it can be done in two steps. Step1. Install client packages. openldap-clients pam_ldap nss-pam-ldapd. Step2. This can be done in two ways.

To connect to a central LDAP server for user information, Authconfig needs a number of settings: The host name of the LDAP server. The base DN (Distinguished Name) of the part of the LDAP tree where the system should look for users. This typically looks something like dc=example, dc=com.

Sep 17, 2014 · Actual results: Authconfig now takes only one LDAP server in arguement. Expected results: authconfig should take multiple server in arguement. Comment 1 David Spurek 2014-09-17 14:03:19 UTC [root@localhost openldap]# authconfig --test caching is disabled nss_files is always enabled nss_compat is disabled nss_db is disabled nss_hesiod is disabled hesiod LHS = "" hesiod RHS = "" nss_ldap is enabled LDAP+TLS is disabled LDAP server = "ldap://192.168.150.105/" LDAP base DN = "dc=example,dc=com" nss_nis is disabled NIS server = "" NIS