Commit f04ec469b2f08da79e24d1b79f8e10f236eb7e8f
1 parent
76631894
Exists in
master
and in
1 other branch
Adicionando script de instalacao ldap
Showing
1 changed file
with
196 additions
and
0 deletions
Show diff stats
| ... | ... | @@ -0,0 +1,196 @@ |
| 1 | +#!/bin/sh | |
| 2 | + | |
| 3 | +DC="dc=sei,dc=com" | |
| 4 | +PASSWORD="cfl5OcVJ" | |
| 5 | + | |
| 6 | +sudo yum install openldap-servers openldap-clients sssd perl-LDAP.noarch -y | |
| 7 | + | |
| 8 | +sudo cp /usr/share/openldap-servers/DB_CONFIG.example /var/lib/ldap/DB_CONFIG | |
| 9 | + | |
| 10 | +sudo chown -R ldap:ldap /var/lib/ldap | |
| 11 | +cd /etc/openldap | |
| 12 | +sudo mv slapd.d slapd.d.original | |
| 13 | + | |
| 14 | +PASS=`slappasswd -s ${PASSWORD}` | |
| 15 | + | |
| 16 | +sudo service slapd start | |
| 17 | +sudo chkconfig slapd on | |
| 18 | + | |
| 19 | +sudo cp ldap.conf ldap.conf.original | |
| 20 | + | |
| 21 | +echo "escrevendo arquivo em /etc/openldap/slapd.conf" | |
| 22 | + | |
| 23 | +echo "# See slapd.conf(5) for details on configuration options. | |
| 24 | +# This file should NOT be world readable. | |
| 25 | +# | |
| 26 | +include /etc/openldap/schema/core.schema | |
| 27 | +include /etc/openldap/schema/cosine.schema | |
| 28 | +include /etc/openldap/schema/inetorgperson.schema | |
| 29 | +include /etc/openldap/schema/nis.schema | |
| 30 | + | |
| 31 | +# Added for policy | |
| 32 | +include /etc/openldap/schema/ppolicy.schema | |
| 33 | + | |
| 34 | +# Allow LDAPv2 client connections. This is NOT the default. | |
| 35 | +allow bind_v2 | |
| 36 | + | |
| 37 | +# Do not enable referrals until AFTER you have a working directory | |
| 38 | +# service AND an understanding of referrals. | |
| 39 | +#referral ldap://root.openldap.org | |
| 40 | + | |
| 41 | +pidfile /var/run/openldap/slapd.pid | |
| 42 | +argsfile /var/run/openldap/slapd.args | |
| 43 | + | |
| 44 | +# Load dynamic backend modules: | |
| 45 | +# modulepath /usr/lib64/openldap | |
| 46 | + | |
| 47 | +# Modules available in openldap-servers-overlays RPM package | |
| 48 | +# Module syncprov.la is now statically linked with slapd and there | |
| 49 | +# is no need to load it here | |
| 50 | +# moduleload accesslog.la | |
| 51 | +# moduleload auditlog.la | |
| 52 | +# moduleload denyop.la | |
| 53 | +# moduleload dyngroup.la | |
| 54 | +# moduleload dynlist.la | |
| 55 | +# moduleload lastmod.la | |
| 56 | +# moduleload pcache.la | |
| 57 | + | |
| 58 | +moduleload ppolicy.la | |
| 59 | + | |
| 60 | +# moduleload refint.la | |
| 61 | +# moduleload retcode.la | |
| 62 | +# moduleload rwm.la | |
| 63 | +# moduleload smbk5pwd.la | |
| 64 | +# moduleload translucent.la | |
| 65 | +# moduleload unique.la | |
| 66 | +# moduleload valsort.la | |
| 67 | + | |
| 68 | +# modules available in openldap-servers-sql RPM package: | |
| 69 | +# moduleload back_sql.la | |
| 70 | + | |
| 71 | +# The next three lines allow use of TLS for encrypting connections using a | |
| 72 | +# dummy test certificate which you can generate by changing to | |
| 73 | +# /etc/pki/tls/certs, running \"make slapd.pem\", and fixing permissions on | |
| 74 | +# slapd.pem so that the ldap user or group can read it. Your client software | |
| 75 | +# may balk at self-signed certificates, however. | |
| 76 | +# TLSCACertificateFile /etc/pki/tls/certs/ca-bundle.crt | |
| 77 | +# TLSCertificateFile /etc/pki/tls/certs/slapd.pem | |
| 78 | +# TLSCertificateKeyFile /etc/pki/tls/certs/slapd.pem | |
| 79 | + | |
| 80 | +# Sample security restrictions | |
| 81 | +# Require integrity protection (prevent hijacking) | |
| 82 | +# Require 112-bit (3DES or better) encryption for updates | |
| 83 | +# Require 63-bit encryption for simple bind | |
| 84 | +# security ssf=1 update_ssf=112 simple_bind=64 | |
| 85 | + | |
| 86 | +# Sample access control policy: | |
| 87 | +# Root DSE: allow anyone to read it | |
| 88 | +# Subschema (sub)entry DSE: allow anyone to read it | |
| 89 | +# Other DSEs: | |
| 90 | +# Allow self write access | |
| 91 | +# Allow authenticated users read access | |
| 92 | +# Allow anonymous users to authenticate | |
| 93 | +# Directives needed to implement policy: | |
| 94 | +# access to dn.base="" by * read | |
| 95 | +# access to dn.base=\"cn=Subschema\" by * read | |
| 96 | +# access to * | |
| 97 | +# by self write | |
| 98 | +# by users read | |
| 99 | +# by anonymous auth | |
| 100 | +# | |
| 101 | +# if no access controls are present, the default policy | |
| 102 | +# allows anyone and everyone to read anything but restricts | |
| 103 | +# updates to rootdn. (e.g., "access to * by * read") | |
| 104 | +# | |
| 105 | +# rootdn can always read and write EVERYTHING! | |
| 106 | + | |
| 107 | +####################################################################### | |
| 108 | +# ldbm and/or bdb database definitions | |
| 109 | +####################################################################### | |
| 110 | + | |
| 111 | +database bdb | |
| 112 | +suffix "${DC}" | |
| 113 | +rootdn "cn=admin,${DC}" | |
| 114 | +rootpw $PASS | |
| 115 | + | |
| 116 | +# PPolicy Configuration | |
| 117 | +overlay ppolicy | |
| 118 | +ppolicy_default \"cn=default,ou=policies,${DC}\" | |
| 119 | +ppolicy_use_lockout | |
| 120 | +ppolicy_hash_cleartext | |
| 121 | + | |
| 122 | + | |
| 123 | + | |
| 124 | +# The database directory MUST exist prior to running slapd AND | |
| 125 | +# should only be accessible by the slapd and slap tools. | |
| 126 | +# Mode 700 recommended. | |
| 127 | +directory /var/lib/ldap | |
| 128 | + | |
| 129 | +# Indices to maintain for this database | |
| 130 | +index objectClass eq,pres | |
| 131 | +index ou,cn,mail,surname,givenname eq,pres,sub | |
| 132 | +index uidNumber,gidNumber,loginShell eq,pres | |
| 133 | +index uid,memberUid eq,pres,sub | |
| 134 | +index nisMapName,nisMapEntry eq,pres,sub " > /etc/openldap/slapd.conf | |
| 135 | + | |
| 136 | +echo "escrevendo em /etc/openldap/ppolicy.ldif" | |
| 137 | + | |
| 138 | +echo "dn: ou = policies,${DC} | |
| 139 | +objectClass: organizationalUnit | |
| 140 | +objectClass: top | |
| 141 | +ou: policies | |
| 142 | + | |
| 143 | +# default, policies, example.com | |
| 144 | +dn: cn=default,ou=policies,${DC} | |
| 145 | +objectClass: top | |
| 146 | +objectClass: pwdPolicy | |
| 147 | +objectClass: person | |
| 148 | +cn: default | |
| 149 | +sn: dummy value | |
| 150 | +pwdAttribute: userPassword | |
| 151 | +pwdMaxAge: 7516800 | |
| 152 | +pwdExpireWarning: 14482463 | |
| 153 | +pwdMinLength: 2 | |
| 154 | +pwdMaxFailure: 10 | |
| 155 | +pwdLockout: TRUE | |
| 156 | +pwdLockoutDuration: 60 | |
| 157 | +pwdMustChange: FALSE | |
| 158 | +pwdAllowUserChange: FALSE | |
| 159 | +pwdSafeModify: FALSE " > /etc/openldap/ppolicy.ldif | |
| 160 | + | |
| 161 | +sudo service slapd restart | |
| 162 | + | |
| 163 | +echo "gerando arquivos /tmp/ldap" | |
| 164 | +sudo mkdir -p /tmp/ldap | |
| 165 | +cd /tmp/ldap | |
| 166 | + | |
| 167 | +echo "dn: ${DC} | |
| 168 | +objectClass: dcObject | |
| 169 | +objectClass: organization | |
| 170 | +dc: sei | |
| 171 | +o: Sei | |
| 172 | +description: SEI | |
| 173 | + | |
| 174 | +dn: cn=admin,${DC} | |
| 175 | +objectClass: organizationalRole | |
| 176 | +cn: Admin | |
| 177 | +description: System Manager | |
| 178 | + | |
| 179 | +dn: ou=users,${DC} | |
| 180 | +objectClass: organizationalUnit | |
| 181 | +ou: users | |
| 182 | + | |
| 183 | +dn: ou=oldusers,${DC} | |
| 184 | +objectClass: organizationalUnit | |
| 185 | +ou: oldusers " > base.ldif | |
| 186 | + | |
| 187 | +cd /tmp/ldap | |
| 188 | + | |
| 189 | +echo "alimentando lda" | |
| 190 | +sleep 10 | |
| 191 | +echo "ldapadd -x -D \"cn=admin,${DC}\" -w ${PASSWORD} -f base.ldif" | |
| 192 | +ldapadd -x -D "cn=admin,${DC}" -w ${PASSWORD} -f base.ldif | |
| 193 | + | |
| 194 | +echo "Pronto foi instalado a ldap na maquina local" | |
| 195 | +echo "admin = cn=admin,${DC}" | |
| 196 | +echo "senha: ${PASSWORD}" | ... | ... |