How to join a domain from Fedora 31

Join in Windows Active Directory Domain with Realmd.
This tutorial needs Windows Active Directory Domain Service in your Local Network.
This example is based on the environment like follows.
Domain Server: Windows Server 2019
NetBIOS Name: FD3S01
Domain Name: srv.world
Realm: SRV.WORLD
Hostname: fd3s.srv.world
[1]Install some required packages.
[root@dlp ~]#

dnf -y install realmd sssd oddjob oddjob-mkhomedir adcli samba-common-tools
[2]Join in Windows Active Directory Domain.
# change DNS setting to refer to AD

[root@dlp ~]#

nmcli connection modify enp1s0 ipv4.dns 10.0.0.100

[root@dlp ~]#

nmcli connection down enp1s0; nmcli connection up enp1s0

Connection successfully activated (D-Bus active path: /org/freedesktop/NetworkManager/ActiveConnection/2)

# discover Active Directory domain

[root@dlp ~]#

realm discover SRV.WORLD

srv.world
  type: kerberos
  realm-name: SRV.WORLD
  domain-name: srv.world
  configured: no
  server-software: active-directory
  client-software: sssd
  required-package: oddjob
  required-package: oddjob-mkhomedir
  required-package: sssd
  required-package: adcli
  required-package: samba-common-tools

# join in Active Directory domain

[root@dlp ~]#

realm join SRV.WORLD

Password for Administrator:

# AD Administrator password
# verify possible to get an AD user info

[root@dlp ~]#

id Serverworld@srv.world

uid=919201103(serverworld@srv.world) gid=919200513(domain users@srv.world) groups=919200513(domain users@srv.world)

# verify possible to login with AD user

[root@dlp ~]#

exit

logout

Fedora 31 (Server Edition)
Kernel 5.3.7-301.fc31.x86_64 on an x86_64 (ttyS0)

Web console: https://dlp.srv.world:9090/ or https://10.0.0.30:9090/

dlp login: Serverworld@srv.world 
Password:
[serverworld@srv.world@dlp ~]$   # logined
[3]If you’d like to omit domain name for AD user, configure like follows.
[root@dlp ~]#

vi /etc/sssd/sssd.conf
# line 16: change

use_fully_qualified_names =

False
[root@dlp ~]#

systemctl restart sssd

[root@dlp ~]#

id Administrator

uid=919200500(administrator) gid=919200513(domain users) groups=919200513(domain users),919200572(denied rodc password replication group),919200518(schema admins),919200519(enterprise admins),919200512(domain admins),919200520(group policy creator owners)

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.