Join in Windows Active Directory Domain with Realmd.This tutorial needs Windows Active Directory Domain Service in your Local Network.
This example is based on the environment like follows.
Domain Server : Windows Server 2019 NetBIOS Name : FD3S01 Domain Name : srv.world Realm : SRV.WORLD Hostname : fd3s.srv.world [1] Install some required packages.
[root@dlp ~]# dnf -y install realmd sssd oddjob oddjob-mkhomedir adcli samba-common-tools
[2] Join in Windows Active Directory Domain.
# change DNS setting to refer to AD[root@dlp ~]#
nmcli connection modify enp1s0 ipv4.dns 10.0.0.100[root@dlp ~]#
nmcli connection down enp1s0; nmcli connection up enp1s0Connection successfully activated (D-Bus active path: /org/freedesktop/NetworkManager/ActiveConnection/2)
# discover Active Directory domain[root@dlp ~]#
realm discover SRV.WORLDsrv.world type: kerberos realm-name: SRV.WORLD domain-name: srv.world configured: no server-software: active-directory client-software: sssd required-package: oddjob required-package: oddjob-mkhomedir required-package: sssd required-package: adcli required-package: samba-common-tools# join in Active Directory domain[root@dlp ~]#
realm join SRV.WORLDPassword for Administrator:
# AD Administrator password# verify possible to get an AD user info[root@dlp ~]#
id Serverworld@srv.worlduid=919201103(serverworld@srv.world) gid=919200513(domain users@srv.world) groups=919200513(domain users@srv.world)
# verify possible to login with AD user[root@dlp ~]#
exitlogout Fedora 31 (Server Edition) Kernel 5.3.7-301.fc31.x86_64 on an x86_64 (ttyS0) Web console: https://dlp.srv.world:9090/ or https://10.0.0.30:9090/ dlp login: Serverworld@srv.world Password: [serverworld@srv.world@dlp ~]$ # logined
[3] If you’d like to omit domain name for AD user, configure like follows.
[root@dlp ~]#vi /etc/sssd/sssd.conf# line 16: changeuse_fully_qualified_names =
False[root@dlp ~]#systemctl restart sssd[root@dlp ~]#
id Administratoruid=919200500(administrator) gid=919200513(domain users) groups=919200513(domain users),919200572(denied rodc password replication group),919200518(schema admins),919200519(enterprise admins),919200512(domain admins),919200520(group policy creator owners)
Pages: 1 2