Install and Configure Freeipa Server On Centos 8 / Rhel 8
Install and Configure Freeipa Server On Centos 8 / Rhel 8
Install and Configure Freeipa Server On Centos 8 / Rhel 8
10010010
Netmask: 255.255.255.0 = 24 11111111.11111111.11111111 .00000000
Wildcard: 0.0.0.255 00000000.00000000.00000000 .11111111
=>
Network: 10.10.10.0/24 00001010.00001010.00001010 .00000000
(Class A)
Broadcast: 10.10.10.255 00001010.00001010.00001010 .11111111
HostMin: 10.10.10.1 00001010.00001010.00001010 .00000001
HostMax: 10.10.10.254 00001010.00001010.00001010 .11111110
Hosts/Net: 254 (Private Internet)
TYPE=Ethernet
PROXY_METHOD=none
BROWSER_ONLY=no
BOOTPROTO=none
DEFROUTE=yes
IPV4_FAILURE_FATAL=no
IPV6INIT=yes
IPV6_AUTOCONF=yes
IPV6_DEFROUTE=yes
IPV6_FAILURE_FATAL=no
IPV6_ADDR_GEN_MODE=stable-privacy
NAME=ens160
UUID=1636d130-62bb-40ac-a812-83be45f75641
DEVICE=ens160
ONBOOT=no
IPADDR=172.25.10.20
PREFIX=24
GATEWAY=172.25.10.2
DNS1=127.0.0.1
DNS2=8.8.8.8
Linkedin
You can support us by downloading this article as PDF from the Link below. Download the
guide as PDF
Welcome to our guide on how to install and configure FreeIPA server on RHEL 8 / CentOS
8. FreeIPA is a free and open source identity management tool sponsored by Red Hat and it is
the upstream for the Red Hat Identity Manager(IdM). In this guide, we will discuss on how
to install and configure FreeIPA Server on CentOS 8 / RHEL 8 Linux server.
FreeIPA Identity management system aims to provide an easy way of centrally managing
Identity, Policy, and Audit for users and services. It is designed to provide an integrated
identity management service for a wide range of clients, including Linux, Mac, and even
Windows.
389 Directory Server – Main data store and provides a full multi-master LDAPv3
directory infrastructure.
MIT Kerberos KDC – Provides Single-Sign-on authentication.
Dogtag Certificate System – Provides CA & RA for certificate management
functions.
ISC Bind DNS server – for managing Domain names.
Web UI / ipa Command Line tool – Used to centrally manage access control, the
delegation of administrative tasks and other network administration tasks.
NTP Server
FreeIPA Server installation requirements
Server with 4gb ram – I got failed installations for 1GB and 2GB RAM
Fresh installation of RHEL / CentOS 8 server
2 vCPUs
Port 443 and 80 not used by another application
FQDN – Resolvable over the public or private DNS server
10 GB Disk space
$ free -h
total used free shared buff/cache
available
Mem: 3.7Gi 185Mi 3.3Gi 8.0Mi 196Mi
3.3Gi
Swap: 2.0Gi 0B 2.0Gi
$ lscpu
Architecture: x86_64
CPU op-mode(s): 32-bit, 64-bit
Byte Order: Little Endian
CPU(s): 2
On-line CPU(s) list: 0,1
Thread(s) per core: 1
Core(s) per socket: 1
Socket(s): 2
NUMA node(s): 1
Vendor ID: GenuineIntel
CPU family: 6
Model: 94
Model name: Intel Core Processor (Skylake, IBRS)
Stepping: 3
CPU MHz: 1800.000
BogoMIPS: 3600.00
Hypervisor vendor: KVM
Virtualization type: full
L1d cache: 32K
L1i cache: 32K
L2 cache: 4096K
L3 cache: 16384K
NUMA node0 CPU(s): 0,1
Flags: fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge
mca cmov pat pse36 clflush mmx fxsr sse sse2 ss syscall nx pdpe1gb rdtscp
lm constant_tsc rep_good nopl xtopology cpuid tsc_known_freq pni pclmulqdq
ssse3 fma cx16 pcid sse4_1 sse4_2 x2apic movbe popcnt tsc_deadline_timer
aes xsave avx f16c rdrand hypervisor lahf_lm abm 3dnowprefetch cpuid_fault
invpcid_single pti ssbd ibrs ibpb fsgsbase tsc_adjust bmi1 avx2 smep bmi2
erms invpcid mpx rdseed adx smap clflushopt xsaveopt xsavec xgetbv1 xsaves
arat umip
$ df -h | grep root
/dev/mapper/rhel-root 17G 2.3G 15G 14% /
The next section will discuss the steps you need to install and configure FreeIPA Server on
RHEL / CentOS 8.
Step 1: Set timezone and hostname
You need to have correct timezone and hostname on your server before you can proceed. The
FreeIPA server will also run NTP service and correct timezone will ensure you have correct
time on the server.
I had failed installation with SELinux in enforcing mode, I recommend you set it to
permissive or disabled.
sudo setenforce 0
sudo sed -i 's/^SELINUX=.*/SELINUX=permissive/g' /etc/selinux/config
FreeIPA Server and client packages are distributed through AppStream repository in RHEL /
CentOS 8. You can check IdM modules available.
From the output, you can see we have DL1 and client streams. For more information about
the Server module, run:
Since this is FreeIPA Server installation, install DL1 stream and then freeipa-server.
If you want to include DNS service, also install ipa-server-dns, bind and bind-dyndb-ldap:
Integrated DNS – if your DNS zone and SRV records are properly set on your system,
you may proceed by selecting the default value “no”.
Host name – by default obtained using reverse DNS
Domain name – by default based on the host name
Realm name – by default based on the host name
Password for Directory Manager – an administrator account for Directory Server
Password for IPA administrator – a superuser for the IdM Server
If you don’t have DNS server to resolve server hostname, modify /etc/hosts file to include
hostname and IP address.
Confirm
export HNAME="ipa.example.com"
sudo hostnamectl set-hostname $HNAME --static
sudo hostname $HNAME
Then run ipa-server-install command to configure IPA server. Run as a user with sudo
privileges or as a root user.
sudo ipa-server-install
$ sudo ipa-server-install
The log file for this installation can be found in /var/log/ipaserver-
install.log
This program will set up the IPA Server.
Version 4.7.1
This includes:
Configure a stand-alone CA (dogtag) for certificate management
Configure the NTP client (chronyd)
Create and configure an instance of Directory Server
Create and configure a Kerberos Key Distribution Center (KDC)
Configure Apache (httpd)
Configure the KDC to enable PKINIT
To accept the default shown in brackets, press the Enter key.
Do you want to configure integrated DNS (BIND)? [no]: <yes/no>
Enter the fully qualified domain name of the computer
on which you're setting up server software. Using the form
.
Example: master.example.com.
Server host name [ipa.example.com]: <Set/Confirm Hostname>
The domain name has been determined based on the host name.
Please confirm the domain name [example.com]: <Confirm domain name>
The kerberos protocol requires a Realm name to be defined.
This is typically the domain name converted to uppercase.
Please provide a realm name [EXAMPLE.COM]: <Confirm Real name>
Certain directory server operations require an administrative user.
This user is referred to as the Directory Manager and has full access
to the Directory for system management tasks and will be added to the
instance of directory server created for IPA.
The password must be at least 8 characters long.
Directory Manager password: <Enter Password>
Password (confirm): <Confirm Password>
The IPA server requires an administrative user, named 'admin'.
This user is a regular system account used for IPA server administration.
IPA admin password: <Enter Password>
Password (confirm): <Confirm Password>
The IPA Master Server will be configured with:
Hostname: ipa.example.com
IP address(es): 192.168.122.198
Domain name: example.com
Realm name: EXAMPLE.COM
The CA will be configured with:
Subject DN: CN=Certificate Authority,O=EXAMPLE.COM
Subject base: O=EXAMPLE.COM
Chaining: self-signed
Continue to configure the system with these values? [no]: yes
The following operations may take some minutes to complete.
Please wait until the prompt is returned.
.....
This will:
....
Restarting the KDC
Configuring client side components
This program will set up IPA client.
Version 4.7.1
Login with admin username and IPA admin password provided during installation.
FreeIPA Administrative dashboard should be presented to you. Administration of the
FreeIPA server can be done from the web UI or from the command line.
$ klist
Ticket cache: KCM:0
Default principal: [email protected]
Valid starting Expires Service principal
03/24/2019 11:48:06 03/25/2019 11:48:04 krbtgt/[email protected]
Password:
Enter Password again to verify:
-------------------
Added user "test"
-------------------
User login: test
First name: Test
Last name: User
Full name: Test User
Display name: Test User
Initials: TU
Home directory: /home/test
GECOS: Test User
Login shell: /bin/bash
Principal name: [email protected]
Principal alias: [email protected]
User password expiration: 20190324085532Z
Email address: [email protected]
UID: 1201400001
GID: 1201400001
Password: True
Member of groups: ipausers
Kerberos keys available: True
Try to login as testuser. On your first log in, you’ll be asked to change your password:
$ ssh test@localhost
Password:
Password expired. Change your password now.
Current Password:
New password: <Set new passwoird
Retype new password:
Activate the web console with: systemctl enable --now cockpit.socket
[test1@ipa ~]$ id
uid=1201400003(test1) gid=1201400003(test1) groups=1201400003(test1)
context=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023
This is a NON REVERSIBLE operation and will delete all data and
configuration!
It is highly recommended to take a backup of existing data and
configuration using ipa-backup utility before proceeding.
Are you sure you want to continue with the uninstall procedure? [no]: yes
Are you sure you want to continue with the uninstall procedure? [no]: yes
Shutting down all IPA services
Unconfiguring CA
Unconfiguring web server
Unconfiguring krb5kdc
Unconfiguring kadmin
Unconfiguring directory server
.......
You have successfully installed FreeIPA Server on CentOS / RHEL 8. Next reading is on