SETTING LDAP CLIENT
- Click YAST | Network Services | LDAP Client
- Click Use LDAP pada User Authentication
- Fill in Address with server IP or by using 127.0.0.1 as default address
- Mark LDAP TLS/SSL option checked if you choose to
use TLS/SSL on previous tutorial, or vice versa, leave it unchecked if
you choose to not use TLS on previous tutorial
- Fill in LDAP Base DN (dc=namadomain, dc=tld, ex : dc=vavai,dc=co,dc=id). You may also get the LDAP Base DN by clicking Fetch DN button
- Leave others option as is
`
- Click Advanced Configuration
- Change Password Change Protocol to MD5
- Leave option Group Member Attribute = Member unchanged
`
- Click Administration Setting
- Fill in cn=Administrator on Administrator DN. Don’t forget to give a check on Append Base DN option
- Mark a check on Create Default Configuration Objects option
`
- Click OK
- Click OK
SETTING SAMBA SERVER PRIMARY DOMAIN CONTROLLER (PDC)
- Open YAST | Network Services | Samba Server
- Fill in workgroup/domain name on first wizard. I’m usingdomain vavai.co.id as my workgroup name. Click Next
`
- On Samba Server Type option, choose Primary Domain Controller (PDC). Click Next
- On start-up tab, choose Service Start During Boot option, so Samba will automatically started on boot. Don’t forget to click Open Port in Firewall if you use firewall on intranet zone
`
- Move to LDAP Setting tab.
- Click on Use LDAP Password Back-End
- Fill in Administrator DN and password setting (cn=Administrator,dc=vavai,dc=co,dc=id, adjust it with your domain name). Click Test Connection to test LDAP server connection. If test result is failed, recheck your configuration setting.
`
- Click OK and then fill in Samba root /Administrator password
`
- Click on YAST | Security and Users | User & Group Management
- Click Expert Options | LDAP User & Group Configuration option on bottom-right-corner menu
- Fill in LDAP Admin password (see whether your bind DN configuration has setup correctly)
- Move to Configuration Module, and then choose userconfiguration
`
- Change susemaxpasswordlength with your maximum password length
- Change suseminpasswordlength with your minimum password length
- Change susepasswordhash from SSHA to SMD5
- Click OK
- Click on Set Filter option on top-right-corner menu and choose LDAP Users. This will display all LDAP user list, currently are empty because we have create any user yet
- Click Add
- Fill in user profile and password
`
- Click OK
No comments:
Post a Comment