ms_ad_key_concepts_schema
· One min read
$ sudo apt install sssd-ad sssd-tools realmd adcli sssd-tools sssd libnss-sss libpam-sss adcli packagekit
$ sudo realm discover -v $DOMAIN
$ sudo realm join $DOMAIN
/etc/sssd/sssd.conf
$ vim /etc/sssd/sssd.conf
[sssd]
domains = ad1.example.com
config_file_version = 2
services = nss, pam
[domain/ad1.example.com]
default_shell = /bin/bash
krb5_store_password_if_offline = True
cache_credentials = True
krb5_realm = AD1.EXAMPLE.COM
realmd_tags = manages-system joined-with-adcli
id_provider = ad
fallback_homedir = /home/%u@%d
ad_domain = ad1.example.com
use_fully_qualified_names = True
ldap_id_mapping = True
access_provider = ad
# the following is not shown in ubuntu documentation,
# but is necessary for version after 22
ad_gpo_ignore_unreadable = True
ad_gpo_access_control = permissive
$ sudo pam-auth-update --enable mkhomedir
$ getent passwd $USERNAME@$DOMAIN
$ sudo login
ad-client login: $USERNAME@$DOMAIN
Password:
Welcome to Ubuntu 20.04 LTS (GNU/Linux 5.4.0-24-generic x86_64)
...
Creating directory '/home/john@ad1.example.com'.
john@ad1.example.com@ad-client:~
$ sudo apt install realmd samba libnss-winbind samba-common-bin libpam-winbind winbind
/etc/resolv.conf
nameserver # BD server ip address
$ sudo realm discover
$ sudo realm join -v --membership-software=samba --client-software=winbind $DOMAIN REALM
/etc/nsswitch.conf
passwd: files systemd winbind
group: files systemd winbind
$ sudo pam-auth-update --enable mkhomedir