博客
关于我
强烈建议你试试无所不能的chatGPT,快点击我
Centos7LDAP LDAPadmin的完整部署记录(改良版,其它文档太多坑)
阅读量:5260 次
发布时间:2019-06-14

本文共 11193 字,大约阅读时间需要 37 分钟。

参考这篇文档的帮助对解决问题很有帮助:https://cloud.tencent.com/developer/article/1026304

复制的配置文件中前后若有空格必须删除!

开始部署!

1)安装openldap

[root@test-vm002 ~]# vim /root/ldap_install.sh

#!/bin/bashecho "install ldap rpm"wget http://dl.fedoraproject.org/pub/epel/epel-release-latest-7.noarch.rpmrpm -ivh epel-release-latest-7.noarch.rpmyum install -y openldap openldap-clients openldap-servers migrationtools openldap-devel compat-openldapcp /usr/share/openldap-servers/DB_CONFIG.example /var/lib/ldap/DB_CONFIGchown ldap. /var/lib/ldap/DB_CONFIGsystemctl start slapdsystemctl enable slapd

[root@test-vm002 ~]# sh -x ldap_install.sh

默认情况下,slapd服务监听的是389端口

[root@test-vm002 ~]# lsof -i:389

COMMAND  PID USER   FD   TYPE DEVICE SIZE/OFF NODE NAME

slapd   2940 ldap    8u  IPv4  23618      0t0  TCP *:ldap (LISTEN)

slapd   2940 ldap    9u  IPv6  23619      0t0  TCP *:ldap (LISTEN)

2) 配置ldap服务

首先要设置ldap的管理员密码。生成经处理后的明文密码(这里我输入明文密码"123456") 其中 {SSHA}xxxxxxxxxxxxxxxxxxxxxxxx 就是加密处理后的明文密码,之后会用到这个密码。

[root@test-vm002 ~]# slappasswd -s 123456

{SSHA}wfYgDRZdRyxTuwVg1bzpXjjgAWGNYeN3

 

导入chrootpw.ldif文件

[root@test-vm002 ~]# cd /etc/openldap/

[root@test-vm002 openldap]# vim chrootpw.ldif

# specify the password generated above for "olcRootPW" sectiondn: olcDatabase={
0}config,cn=configchangetype: modifyadd: olcRootPWolcRootPW: {SSHA}wfYgDRZdRyxTuwVg1bzpXjjgAWGNYeN3 #你自己的密码

[root@test-vm002 openldap]# ldapadd -Y EXTERNAL -H ldapi:/// -f chrootpw.ldif

SASL/EXTERNAL authentication started

SASL username: gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth

SASL SSF: 0

modifying entry "olcDatabase={0}config,cn=config"

 

导入基本Schema模式

[root@test-vm002 openldap]# ldapadd -Y EXTERNAL -H ldapi:/// -f /etc/openldap/schema/cosine.ldif

SASL/EXTERNAL authentication started

SASL username: gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth

SASL SSF: 0

adding new entry "cn=cosine,cn=schema,cn=config"

 

[root@test-vm002 openldap]# ldapadd -Y EXTERNAL -H ldapi:/// -f /etc/openldap/schema/nis.ldif

SASL/EXTERNAL authentication started

SASL username: gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth

SASL SSF: 0

adding new entry "cn=nis,cn=schema,cn=config"

 

[root@test-vm002 openldap]# ldapadd -Y EXTERNAL -H ldapi:/// -f /etc/openldap/schema/inetorgperson.ldif

SASL/EXTERNAL authentication started

SASL username: gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth

SASL SSF: 0

adding new entry "cn=inetorgperson,cn=schema,cn=config"

 

导入chdomain.ldif文件,这里我使用的域名是hex.com

[root@test-vm002 openldap]# vim chdomain.ldif

# replace to your own domain name for "dc=***,dc=***" section# specify the password generated above for "olcRootPW" sectiondn: olcDatabase={
1}monitor,cn=configchangetype: modifyreplace: olcAccessolcAccess: {
0}to * by dn.base="gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth" read by dn.base="cn=admin,dc=hex,dc=com" read by * nonedn: olcDatabase={
2}hdb,cn=configchangetype: modifyreplace: olcSuffixolcSuffix: dc=hex,dc=comdn: olcDatabase={
2}hdb,cn=configchangetype: modifyreplace: olcRootDNolcRootDN: cn=admin,dc=hex,dc=comdn: olcDatabase={
2}hdb,cn=configchangetype: modifyadd: olcRootPWolcRootPW: {SSHA} wfYgDRZdRyxTuwVg1bzpXjjgAWGNYeN3dn: olcDatabase={
2}hdb,cn=configchangetype: modifyadd: olcAccessolcAccess: {
0}to attrs=userPassword,shadowLastChange by dn="cn=admin,dc=hex,dc=com" write by anonymous auth by self write by * noneolcAccess: {
1}to dn.base="" by * readolcAccess: {
2}to * by dn="cn=admin,dc=hex,dc=com" write by * read

[root@test-vm002 openldap]# ldapmodify -Y EXTERNAL -H ldapi:/// -f chdomain.ldif

SASL/EXTERNAL authentication started

SASL username: gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth

SASL SSF: 0

modifying entry "olcDatabase={2}hdb,cn=config"

modifying entry "olcDatabase={2}hdb,cn=config"

modifying entry "olcDatabase={2}hdb,cn=config"

modifying entry "olcDatabase={2}hdb,cn=config"

 

然后导入basedomain.ldif文件

[root@test-vm002 openldap]# vim basedomain.ldif

# replace to your own domain name for "dc=***,dc=***" sectiondn: dc=hex,dc=comobjectClass: topobjectClass: dcObjectobjectclass: organizationo: comdc: hexdn: cn=admin,dc=hex,dc=comobjectClass: organizationalRolecn: Managerdescription: Directory Managerdn: ou=People,dc=hex,dc=comobjectClass: organizationalUnitou: Peopledn: ou=Group,dc=hex,dc=comobjectClass: organizationalUnitou: Group

如下导入basedomain.ldif文件时需要输入的密码是123456

[root@test-vm002 openldap]# ldapadd -x -D cn=admin,dc=hex,dc=com -W -f basedomain.ldif

Enter LDAP Password:                               

adding new entry "dc=hex,dc=com"

adding new entry "cn=admin,dc=hex,dc=com"

adding new entry "ou=People,dc=hex,dc=com"

adding new entry "ou=Group,dc=hex,dc=com"

 

4)添加一个ldap用户(如下,添加用户alex)

[root@test-vm002 openldap]# vim ldapuser.ldif

 

# create new# replace to your own domain name for "dc=***,dc=***" sectiondn: uid=alex,ou=People,dc=hex,dc=comobjectClass: inetOrgPersonobjectClass: posixAccountobjectClass: shadowAccountcn: alexsn: LinuxuserPassword: {SSHA} wfYgDRZdRyxTuwVg1bzpXjjgAWGNYeN3loginShell: /bin/bashuidNumber: 1000gidNumber: 1000homeDirectory: /home/alexdn: cn=alex,ou=Group,dc=hex,dc=comobjectClass: posixGroupcn: alexgidNumber: 1000memberUid: alex

[root@test-vm002 openldap]# ldapadd -x -D cn=admin,dc=hex,dc=com -W -f ldapuser.ldif

添加本机的系统上创建的用户和群组到ldap目录

[root@test-vm002 openldap]# vim ldapuser.sh 

# extract local users and groups who have 1000-9999 digit UID# replace "SUFFIX=***" to your own domain name# this is an example #!/bin/bashSUFFIX='dc=hex,dc=com'LDIF='ldapuser.ldif'echo -n > $LDIFGROUP_IDS=()grep "x:[1-9][0-9][0-9][0-9]:" /etc/passwd | (while read TARGET_USERdo    USER_ID="$(echo "$TARGET_USER" | cut -d':' -f1)"    USER_NAME="$(echo "$TARGET_USER" | cut -d':' -f5 | cut -d' ' -f1,2)"    [ ! "$USER_NAME" ] && USER_NAME="$USER_ID"    LDAP_SN="$(echo "$USER_NAME" | cut -d' ' -f2)"    [ ! "$LDAP_SN" ] && LDAP_SN="$USER_NAME"    LASTCHANGE_FLAG="$(grep "${USER_ID}:" /etc/shadow | cut -d':' -f3)"    [ ! "$LASTCHANGE_FLAG" ] && LASTCHANGE_FLAG="0"    SHADOW_FLAG="$(grep "${USER_ID}:" /etc/shadow | cut -d':' -f9)"    [ ! "$SHADOW_FLAG" ] && SHADOW_FLAG="0"    GROUP_ID="$(echo "$TARGET_USER" | cut -d':' -f4)"    [ ! "$(echo "${GROUP_IDS[@]}" | grep "$GROUP_ID")" ] && GROUP_IDS=("${GROUP_IDS[@]}" "$GROUP_ID")    echo "dn: uid=$USER_ID,ou=People,$SUFFIX" >> $LDIF    echo "objectClass: inetOrgPerson" >> $LDIF    echo "objectClass: posixAccount" >> $LDIF    echo "objectClass: shadowAccount" >> $LDIF    echo "sn: $LDAP_SN" >> $LDIF    echo "givenName: $(echo "$USER_NAME" | awk '{print $1}')" >> $LDIF    echo "cn: $USER_NAME" >> $LDIF    echo "displayName: $USER_NAME" >> $LDIF    echo "uidNumber: $(echo "$TARGET_USER" | cut -d':' -f3)" >> $LDIF    echo "gidNumber: $(echo "$TARGET_USER" | cut -d':' -f4)" >> $LDIF    echo "userPassword: {crypt}$(grep "${USER_ID}:" /etc/shadow | cut -d':' -f2)" >> $LDIF    echo "gecos: $USER_NAME" >> $LDIF    echo "loginShell: $(echo "$TARGET_USER" | cut -d':' -f7)" >> $LDIF    echo "homeDirectory: $(echo "$TARGET_USER" | cut -d':' -f6)" >> $LDIF    echo "shadowExpire: $(passwd -S "$USER_ID" | awk '{print $7}')" >> $LDIF    echo "shadowFlag: $SHADOW_FLAG" >> $LDIF    echo "shadowWarning: $(passwd -S "$USER_ID" | awk '{print $6}')" >> $LDIF    echo "shadowMin: $(passwd -S "$USER_ID" | awk '{print $4}')" >> $LDIF    echo "shadowMax: $(passwd -S "$USER_ID" | awk '{print $5}')" >> $LDIF    echo "shadowLastChange: $LASTCHANGE_FLAG" >> $LDIF    echo >> $LDIFdonefor TARGET_GROUP_ID in "${GROUP_IDS[@]}"do    LDAP_CN="$(grep ":${TARGET_GROUP_ID}:" /etc/group | cut -d':' -f1)"    echo "dn: cn=$LDAP_CN,ou=Group,$SUFFIX" >> $LDIF    echo "objectClass: posixGroup" >> $LDIF    echo "cn: $LDAP_CN" >> $LDIF    echo "gidNumber: $TARGET_GROUP_ID" >> $LDIF    for MEMBER_UID in $(grep ":${TARGET_GROUP_ID}:" /etc/passwd | cut -d':' -f1,3)    do        UID_NUM=$(echo "$MEMBER_UID" | cut -d':' -f2)        [ $UID_NUM -ge 1000 -a $UID_NUM -le 9999 ] && echo "memberUid: $(echo "$MEMBER_UID" | cut -d':' -f1)" >> $LDIF    done    echo >> $LDIFdone)
[root@test-vm002 openldap]# chmod 755 ldapuser.sh
[root@test-vm002 openldap]# sh ldapuser.sh
 下面输入的密码仍然是123456
[root@test-vm002 openldap]# ldapadd -x -D cn=admin,dc=hex,dc=com -W -f ldapuser.ldif
Enter LDAP Password:

adding new entry "uid=zhangsan,ou=People,dc=hex,dc=com"

 

adding new entry "cn=zhangsan,ou=Group,dc=hex,dc=com"

 

5)安装phpLDAPadmin来web配置LDAP

安装和配置httpd

[root@test-vm002 ~]# yum -y install httpd

[root@test-vm002 ~]# rm -f /etc/httpd/conf.d/welcome.conf

[root@test-vm002 ~]# vim /etc/httpd/conf/httpd.conf         //修改下面几行内容

ServerName www.example.com:80                               //第96行AllowOverride All                                           //第151行DirectoryIndex index.html index.cgi index.php               //第164行# add follows to the end                                    //上面164行下添加这几行# server's response headerServerTokens Prod# keepalive is ONKeepAlive On

[root@test-vm002 ~]# systemctl start httpd

[root@test-vm002 ~]# systemctl enable httpd

Created symlink from /etc/systemd/system/multi-user.target.wants/httpd.service to /usr/lib/systemd/system/httpd.service.

[root@test-vm002 ~]# vim /var/www/html/index.html

this is test page for httpd!!!

访问

 

有页面就可以安装php

[root@test-vm002 ~]# yum -y install php php-mbstring php-pear

[root@test-vm002 ~]# vim /etc/php.ini

date.timezone = "Asia/Shanghai"       //第878行

[root@test-vm002 ~]# systemctl restart httpd

 

[root@test-vm002 ~]# vim /var/www/html/index.php

访问

 

安装phpLDAP admin

[root@test-vm002 ~]# wget http://dl.fedoraproject.org/pub/epel/epel-release-latest-7.noarch.rpm

[root@test-vm002 ~]# rpm -ivh epel-release-latest-7.noarch.rpm

[root@test-vm002 ~]# yum repolist                     #检查是否已添加至源列表

[root@test-vm002 ~]# yum --enablerepo=epel -y install phpldapadmin

 

登陆设置

[root@test-vm002 ~]# vim /etc/phpldapadmin/config.php

 

$servers->setValue('login','attr','dn');                    //,打开这行的注释.使用用户名登陆// $servers->setValue('login','attr','uid');                //注释掉这行。禁止使用uid登陆

[root@test-vm002 ~]# vim /etc/httpd/conf.d/phpldapadmin.conf

##  Web-based tool for managing LDAP servers#Alias /phpldapadmin /usr/share/phpldapadmin/htdocsAlias /ldapadmin /usr/share/phpldapadmin/htdocs
# Apache 2.4 Require local Require ip 192.168.0.0/24 //添加访问权限,由于我本地ip是192.168.0.55,所以这里设置这个网段的访问权限
# Apache 2.2 Order Deny,Allow Deny from all Allow from 127.0.0.1 Allow from ::1

[root@test-vm002 ~]# systemctl restart httpd

[root@test-vm002 share]# ps -ef|grep httpd

root       4150      1  0 01:13 ?        00:00:00 /usr/sbin/httpd -DFOREGROUND

apache     4151   4150  0 01:13 ?        00:00:00 /usr/sbin/httpd -DFOREGROUND

apache     4152   4150  0 01:13 ?        00:00:00 /usr/sbin/httpd -DFOREGROUND

apache     4153   4150  0 01:13 ?        00:00:00 /usr/sbin/httpd -DFOREGROUND

apache     4154   4150  0 01:13 ?        00:00:00 /usr/sbin/httpd -DFOREGROUND

apache     4155   4150  0 01:13 ?        00:00:00 /usr/sbin/httpd -DFOREGROUND

apache     4177   4150  0 01:13 ?        00:00:00 /usr/sbin/httpd -DFOREGROUND

apache     4184   4150  0 01:13 ?        00:00:00 /usr/sbin/httpd -DFOREGROUND

root       4188   3000  0 01:14 pts/1    00:00:00 grep --color=auto httpd

 

[root@test-vm002 share]# chown -R apache.apache /usr/share/phpldapadmin

访问 登陆用户名:cn=admin,dc=hex,dc=com 密码是上面的123456

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

转载于:https://www.cnblogs.com/wenxingxu/p/10795594.html

你可能感兴趣的文章
分段控件UISegmentedControl
查看>>
【Q2D】 2048设计
查看>>
161017、SQL必备知识点
查看>>
hdu 1541Stars
查看>>
王小花爱学习
查看>>
HTML DIV+CSS
查看>>
TFS增加dataserver
查看>>
kill新号专题
查看>>
新人报道
查看>>
UML学习-状态图
查看>>
第四届 Rescue The Princess
查看>>
网络操作系统第三章习题
查看>>
jquery datepicker 只显示年月
查看>>
MVC学习系列——Model验证扩展
查看>>
C# GC 垃圾回收机制
查看>>
Displaying SharePoint Lists or Libraries in other sites 显示其他站点的List
查看>>
iOS9新特性之泛型
查看>>
JavaScript定时器越走越快的问题
查看>>
11--Python 备份文件程序
查看>>
python的xml模块
查看>>