在 CentOS 中使用 /etc/resolv.conf 解析 AD 域

2024-02-14

我已使用 Realm 配置 SSSD,以使用 AD 凭据登录 centOS VM。请参考设置here https://stackoverflow.com/questions/63705156/sssd-integration-with-microsoft-ad-for-ssh-key-based-login

我不得不修改/etc/resolv.conf将 namserver 指向 AD 域的文件

原来的/etc/resolv.conf file:

# Generated by NetworkManager
search ap-south-1.compute.internal
nameserver 172.31.0.2

Updated /etc/resolv.conf file:

# Generated by NetworkManager
search test.com
nameserver 172.31.12.38

随着更新的/etc/resolv.conf文件用户能够使用 AD 凭据登录,但原始域未解析

我想要一种方法来解析指向不同域名服务器的两个域

# Generated by NetworkManager
nameserver 172.31.0.2
nameserver 172.31.12.38
search ap-south-1.compute.internal test.com

我也尝试了多种方法来使用已弃用的标签来解析域

# Generated by NetworkManager
domain ap-south-1.compute.internal
nameserver 172.31.0.2

domain test.com
nameserver 172.31.12.38

我什至尝试过旋转选项

# Generated by NetworkManager
options rotate
options timeout:1
nameserver 172.31.0.2
nameserver 172.31.12.38
search ap-south-1.compute.internal test.com

有没有办法使用以下方法解析指向不同名称服务器的多个域/etc/resolv.conf


要解析 AD 林域,我们可以在中配置 ad_server 参数SSD配置文件 file

参考链接:手册页_sssd https://linux.die.net/man/5/sssd-ad[参考ad_server部分]

/etc/sssd/sssd.conf参考文件:

原始文件:

[sssd]
domains = test.com
config_file_version = 2
services = nss, pam, sudo, ssh

[nss]
debug_level = 10

[domain/test.com]
ad_domain = test.com
krb5_realm = TEST.COM
realmd_tags = manages-system joined-with-adcli 
cache_credentials = True
id_provider = ad
krb5_store_password_if_offline = True
default_shell = /bin/bash
ldap_id_mapping = True
use_fully_qualified_names = False
fallback_homedir = /home/%u
access_provider = simple
ldap_user_extra_attrs = altSecurityIdentities:altSecurityIdentities
ldap_user_ssh_public_key = altSecurityIdentities
ldap_use_tokengroups = True

更新后的文件:

[sssd]
domains = test.com
config_file_version = 2
services = nss, pam, sudo, ssh

[nss]
debug_level = 10

[domain/test.com]
ad_domain = test.com
ad_server = 172.31.12.38, 172.31.12.48
krb5_realm = TEST.COM
realmd_tags = manages-system joined-with-adcli 
cache_credentials = True
id_provider = ad
krb5_store_password_if_offline = True
default_shell = /bin/bash
ldap_id_mapping = True
use_fully_qualified_names = False
fallback_homedir = /home/%u
access_provider = simple
ldap_user_extra_attrs = altSecurityIdentities:altSecurityIdentities
ldap_user_ssh_public_key = altSecurityIdentities
ldap_use_tokengroups = True

这样我们就可以避免在/etc/resolv.conf file

本文内容由网友自发贡献,版权归原作者所有,本站不承担相应法律责任。如您发现有涉嫌抄袭侵权的内容,请联系:hwhale#tublm.com(使用前将#替换为@)

在 CentOS 中使用 /etc/resolv.conf 解析 AD 域 的相关文章

随机推荐