SETTING LDAP CLIENT
- Click YAST | Network Services | LDAP Client
 - Click Use LDAP pada User Authentication
 - Fill in Address with server IP or by using 127.0.0.1 as default address
 - Mark  LDAP TLS/SSL option checked if you choose to 
use TLS/SSL on previous tutorial, or vice versa, leave it unchecked if 
you choose to not use TLS on previous tutorial  
 - Fill in LDAP Base DN (dc=namadomain, dc=tld, ex : dc=vavai,dc=co,dc=id). You may also get the LDAP Base DN by clicking Fetch DN button
 - Leave others option as is
`
 - Click Advanced Configuration
 - Change Password Change Protocol to MD5
 - Leave option Group Member Attribute = Member unchanged
`
 - Click Administration Setting
 - Fill in cn=Administrator on Administrator DN. Don’t forget to give a check on Append Base DN option
 - Mark a check on Create Default Configuration Objects option
`
 - Click OK
 - Click OK
 
SETTING SAMBA SERVER PRIMARY DOMAIN CONTROLLER (PDC)
- Open YAST | Network Services | Samba Server
 - Fill in workgroup/domain name on first wizard. I’m usingdomain vavai.co.id as my workgroup name. Click Next
`
 - On Samba Server Type option, choose Primary Domain Controller (PDC). Click Next
 - On start-up tab, choose Service Start During Boot option, so Samba will automatically started on boot. Don’t forget to click Open Port in Firewall if you use firewall on intranet zone
`
 - Move to LDAP Setting tab.
 - Click on Use LDAP Password Back-End
 - Fill in  Administrator DN and password setting (cn=Administrator,dc=vavai,dc=co,dc=id, adjust it with your domain name). Click Test Connection to test LDAP server connection. If test result is failed, recheck your configuration setting.
`
 - Click OK and then fill in Samba root /Administrator password
`
 
- Click on YAST | Security and Users | User & Group Management
 - Click Expert Options | LDAP User & Group Configuration option on bottom-right-corner menu
 - Fill in LDAP Admin password (see whether your bind DN configuration has setup correctly)
 - Move to Configuration Module, and then choose  userconfiguration
`
 - Change susemaxpasswordlength with your maximum password length
 - Change suseminpasswordlength with your minimum password length
 - Change susepasswordhash from SSHA to SMD5
 - Click OK
 - Click on Set Filter option on top-right-corner menu and choose LDAP Users. This will display all LDAP user list, currently are empty because we have create any user yet
 - Click Add
 - Fill in user profile and password
`
 - Click OK
 
No comments:
Post a Comment