linux服务器加入AD域(sssd)~ 通过域用户ssh登录加域的linux服务器

搭建域控:参考 https://www.cnblogs.com/taosiyu/p/12009120.html

域控计算机全名: WIN-3PLKM2PLE6E.zhihu.test.com

域:zhihu.test.com

域控管理员:kingsoft

普通用户:zhangmingda

普通组:dev

IP:192.168.3.3

注: 域控同时做DNS服务器

 

Linux服务器:

[root@vm192-168-8-27 zhangmingda]# cat /etc/redhat-release 
CentOS Linux release 7.7.1908 (Core)

操作步骤:

安装所需包文件:

yum install -y krb5-workstation realmd sssd samba-common adcli oddjob oddjob-mkhomedir samba samba-common-tools

编辑/etc/resolve.conf文件,将DNS指向DC

[root@vm192-168-8-27 zhangmingda]# cat /etc/resolv.conf 
; generated by /usr/sbin/dhclient-script
nameserver 192.168.3.3
nameserver 198.18.254.31
[root@vm192-168-8-27 zhangmingda]# 

编辑/etc/hosts文件,添加DC的IP及域的对应关系

[root@vm192-168-8-27 zhangmingda]# cat /etc/hosts
127.0.0.1   localhost localhost.localdomain localhost4 localhost4.localdomain4
::1         localhost localhost.localdomain localhost6 localhost6.localdomain6
192.168.3.3 WIN-3PLKM2PLE6E.zhihu.test.com
[root@vm192-168-8-27 zhangmingda]# 

将Linux机器加入域

# realm join WIN-3PLKM2PLE6E.zhihu.test.com -U kingsoft
Password for kingsoft: 

发现可以成功发现域了

复制代码
[root@vm192-168-8-27 zhangmingda]# realm list
zhihu.test.com
  type: kerberos
  realm-name: ZHIHU.TEST.COM
  domain-name: zhihu.test.com
  configured: kerberos-member
  server-software: active-directory
  client-software: sssd
  required-package: oddjob
  required-package: oddjob-mkhomedir
  required-package: sssd
  required-package: adcli
  required-package: samba-common-tools
  login-formats: %U
  login-policy: allow-realm-logins
[root@vm192-168-8-27 zhangmingda]# 
复制代码

将组dev加入域

[root@vm192-168-8-27 zhangmingda]# realm permit -g dev@zhihu.test.com
[root@vm192-168-8-27 zhangmingda]# 

可以看到用户kingsoft,zhangmingda可以被成功发现

复制代码
[root@vm192-168-8-27 zhangmingda]# id zhangmingda@zhihu.test.com
uid=1724201104(zhangmingda) gid=1724200513(domain users) groups=1724200513(domain users)
[root@vm192-168-8-27 zhangmingda]# id zhudong@zhihu.test.com
uid=1724201108(zhudong) gid=1724200513(domain users) groups=1724200513(domain users)
[root@vm192-168-8-27 zhangmingda]# id kingsoft@zhihu.test.com
uid=1724201000(kingsoft) gid=1724200513(domain users) groups=1724200513(domain users)
[root@vm192-168-8-27 zhangmingda]# id administrator@zhihu.test.com
uid=1724200500(administrator) gid=1724200513(domain users) groups=1724200513(domain users),1724200520(group policy creator owners),1724200519(enterprise admins),1724200512(domain admins),1724200572(denied rodc password replication group),1724200518(schema admins)
[root@vm192-168-8-27 zhangmingda]#
复制代码

为使用户不需用带域名就可以被识别,需要修改配置文件/etc/sssd/sssd.conf,将use_fully_qualified_names行的True值修改为False

复制代码
[root@vm192-168-8-27 zhangmingda]# cat /etc/sssd/sssd.conf 

[sssd]
domains = zhihu.test.com
config_file_version = 2
services = nss, pam

[domain/zhihu.test.com]
ad_server = win-3plkm2ple6e.zhihu.test.com
ad_domain = zhihu.test.com
krb5_realm = ZHIHU.TEST.COM
realmd_tags = manages-system joined-with-adcli 
cache_credentials = True
id_provider = ad
krb5_store_password_if_offline = True
default_shell = /bin/bash
ldap_id_mapping = True
use_fully_qualified_names = False 
fallback_homedir = /home/%u@%d
access_provider = simple
simple_allow_groups = dev@zhihu.test.com, ops@zhihu.test.com
[root@vm192-168-8-27 zhangmingda]# 
复制代码

重启sssd服务,重新列出预控信息

复制代码
[root@vm192-168-8-27 zhangmingda]# systemctl restart sssd
[root@vm192-168-8-27 zhangmingda]# realm list
[root@vm192-168-8-27 zhangmingda]# realm list
zhihu.test.com
  type: kerberos
  realm-name: ZHIHU.TEST.COM
  domain-name: zhihu.test.com
  configured: kerberos-member
  server-software: active-directory
  client-software: sssd
  required-package: oddjob
  required-package: oddjob-mkhomedir
  required-package: sssd
  required-package: adcli
  required-package: samba-common-tools
  login-formats: %U
  login-policy: allow-permitted-logins
  permitted-logins: 
  permitted-groups: dev@zhihu.test.com, ops@zhihu.test.com
[root@vm192-168-8-27 zhangmingda]#
复制代码

发现不加域信息,Linux服务器也可以识别域用户

[root@vm192-168-8-27 zhangmingda]# id zhangmingda
uid=1724201104(zhangmingda) gid=1724200513(domain users) groups=1724200513(domain users)
[root@vm192-168-8-27 zhangmingda]#

使用域用户ssh登录服务器

复制代码
[root@vm192-168-8-27 zhangmingda]# ssh zhangmingda@192.168.8.27
zhangmingda@192.168.8.27's password: 
Last login: Tue Nov 17 13:07:03 2020 from 192.168.8.27
[zhangmingda@vm192-168-8-27 ~]$ ls
[zhangmingda@vm192-168-8-27 ~]$  sudo su - root  

We trust you have received the usual lecture from the local System
Administrator. It usually boils down to these three things:

    #1) Respect the privacy of others.
    #2) Think before you type.
    #3) With great power comes great responsibility.

[sudo] password for zhangmingda: 
zhangmingda is not in the sudoers file.  This incident will be reported.
[zhangmingda@vm192-168-8-27 ~]$
复制代码

编辑 /etc/sudoers.d/waagent 文件,将需要root权限的用户加入到其下

[zhangmingda@vm192-168-8-27 ~]$ sudo cat /etc/sudoers.d/waagent
ltsstone ALL=(ALL) ALL
zhangmingda ALL=(ALL) ALL
[zhangmingda@vm192-168-8-27 ~]$
[zhangmingda@vm192-168-8-27 ~]$ sudo su - root
Last login: Tue Nov 17 14:28:41 CST 2020 on pts/1
[root@vm192-168-8-27 ~]# 

 

posted on   zhangmingda  阅读(6455)  评论(0编辑  收藏  举报

编辑推荐:
· 开发者必知的日志记录最佳实践
· SQL Server 2025 AI相关能力初探
· Linux系列:如何用 C#调用 C方法造成内存泄露
· AI与.NET技术实操系列(二):开始使用ML.NET
· 记一次.NET内存居高不下排查解决与启示
阅读排行:
· 阿里最新开源QwQ-32B,效果媲美deepseek-r1满血版,部署成本又又又降低了!
· 开源Multi-agent AI智能体框架aevatar.ai,欢迎大家贡献代码
· Manus重磅发布:全球首款通用AI代理技术深度解析与实战指南
· 被坑几百块钱后,我竟然真的恢复了删除的微信聊天记录!
· AI技术革命,工作效率10个最佳AI工具
< 2025年3月 >
23 24 25 26 27 28 1
2 3 4 5 6 7 8
9 10 11 12 13 14 15
16 17 18 19 20 21 22
23 24 25 26 27 28 29
30 31 1 2 3 4 5

导航

统计

点击右上角即可分享
微信分享提示