mirror of
https://git.lapiole.org/dani/ansible-roles.git
synced 2025-07-26 15:55:56 +02:00
Update to 2021-12-01 19:13
This commit is contained in:
5
roles/sssd_ad_auth/templates/deb_pam_common_account.j2
Normal file
5
roles/sssd_ad_auth/templates/deb_pam_common_account.j2
Normal file
@@ -0,0 +1,5 @@
|
||||
account required pam_unix.so
|
||||
account sufficient pam_localuser.so
|
||||
account sufficient pam_succeed_if.so uid < 1000 quiet
|
||||
account [success=1 new_authtok_reqd=done default=ignore] pam_sss.so
|
||||
account required pam_permit.so
|
4
roles/sssd_ad_auth/templates/deb_pam_common_auth.j2
Normal file
4
roles/sssd_ad_auth/templates/deb_pam_common_auth.j2
Normal file
@@ -0,0 +1,4 @@
|
||||
auth [success=2 default=ignore] pam_unix.so nullok_secure
|
||||
auth [success=1 default=ignore] pam_sss.so use_first_pass
|
||||
auth requisite pam_deny.so
|
||||
auth required pam_permit.so
|
4
roles/sssd_ad_auth/templates/deb_pam_common_password.j2
Normal file
4
roles/sssd_ad_auth/templates/deb_pam_common_password.j2
Normal file
@@ -0,0 +1,4 @@
|
||||
password sufficient pam_sss.so
|
||||
password [success=1 default=ignore] pam_unix.so obscure try_first_pass sha512
|
||||
password requisite pam_deny.so
|
||||
password required pam_permit.so
|
9
roles/sssd_ad_auth/templates/deb_pam_common_session.j2
Normal file
9
roles/sssd_ad_auth/templates/deb_pam_common_session.j2
Normal file
@@ -0,0 +1,9 @@
|
||||
session [default=1] pam_permit.so
|
||||
session requisite pam_deny.so
|
||||
session required pam_permit.so
|
||||
{% if ansible_service_mgr == 'systemd' %}
|
||||
session optional pam_systemd.so
|
||||
{% endif %}
|
||||
session optional pam_oddjob_mkhomedir.so skel=/etc/skel umask=0077
|
||||
session optional pam_sss.so
|
||||
session required pam_unix.so
|
8
roles/sssd_ad_auth/templates/krb5.conf
Normal file
8
roles/sssd_ad_auth/templates/krb5.conf
Normal file
@@ -0,0 +1,8 @@
|
||||
[libdefaults]
|
||||
default_realm = {{ ad_realm | upper }}
|
||||
dns_lookup_realm = false
|
||||
dns_lookup_kdc = true
|
||||
rdns = false
|
||||
ticket_lifetime = 24h
|
||||
renew_lifetime = 7d
|
||||
forwardable = true
|
5
roles/sssd_ad_auth/templates/krb5.conf.j2
Normal file
5
roles/sssd_ad_auth/templates/krb5.conf.j2
Normal file
@@ -0,0 +1,5 @@
|
||||
[libdefaults]
|
||||
default_realm = {{ ad_realm | upper }}
|
||||
dns_lookup_realm = false
|
||||
dns_lookup_kdc = true
|
||||
rdns = true
|
66
roles/sssd_ad_auth/templates/sssd.conf.j2
Normal file
66
roles/sssd_ad_auth/templates/sssd.conf.j2
Normal file
@@ -0,0 +1,66 @@
|
||||
[sssd]
|
||||
services = nss, pam, pac
|
||||
config_file_version = 2
|
||||
domains = {{ ad_realm | upper }}{% for domain in ad_trusted_domains %}, {{ domain.name | upper }}{% endfor %}
|
||||
|
||||
default_domain_suffix = {{ ad_realm | upper }}
|
||||
|
||||
[nss]
|
||||
shell_fallback = /bin/false
|
||||
|
||||
[pam]
|
||||
|
||||
[domain/{{ ad_realm | upper }}]
|
||||
id_provider = ad
|
||||
access_provider = ad
|
||||
ad_hostname = {{ ansible_hostname }}.{{ ad_realm | lower }}
|
||||
fallback_homedir = /home/%d/%u
|
||||
default_shell = {{ ad_default_shell }}
|
||||
cache_credentials = true
|
||||
krb5_store_password_if_offline = true
|
||||
ad_access_filter = {{ ad_access_filter }}
|
||||
{% if ad_ldap_user_search_base is defined %}
|
||||
ldap_user_search_base = {{ ad_ldap_user_search_base }}
|
||||
{% endif %}
|
||||
{% if ad_ldap_group_search_base is defined %}
|
||||
ldap_group_search_base = {{ ad_ldap_group_search_base }}
|
||||
{% endif %}
|
||||
{% if ad_samba_secrets.stat.exists %}
|
||||
# Membership password is updated with net ads
|
||||
ad_maximum_machine_account_password_age = 0
|
||||
{% endif %}
|
||||
{% if ad_enumerate %}
|
||||
enumerate = true
|
||||
{% endif %}
|
||||
ad_gpo_access_control = {{ ad_gpo_access_control }}
|
||||
{% if not ad_dyndns_update %}
|
||||
dyndns_update = false
|
||||
{% endif %}
|
||||
{% if ad_private_groups %}
|
||||
auto_private_groups = true
|
||||
{% endif %}
|
||||
|
||||
{% for domain in ad_trusted_domains %}
|
||||
|
||||
|
||||
[domain/{{ domain.name | upper }}]
|
||||
id_provider = ad
|
||||
access_provider = ad
|
||||
fallback_homedir = /home/%d/%u
|
||||
default_shell = /bin/false
|
||||
cache_credentials = true
|
||||
krb5_store_password_if_offline = true
|
||||
ldap_krb5_keytab = /var/lib/sss/keytabs/{{ domain.name | upper }}.keytab
|
||||
krb5_keytab = /var/lib/sss/keytabs/{{ domain.name | upper }}.keytab
|
||||
{% if domain.enumerate %}
|
||||
enumerate = true
|
||||
{% endif %}
|
||||
ad_access_filter = {{ domain.access_filter }}
|
||||
{% if domain.ldap_user_search_base is defined and domain.ldap_user_search_base %}
|
||||
ldap_user_search_base = {{ domain.ldap_user_search_base }}
|
||||
{% endif %}
|
||||
{% if domain.ldap_group_search_base is defined and domain.ldap_group_search_base %}
|
||||
ldap_group_search_base = {{ domain.ldap_group_search_base }}
|
||||
{% endif %}
|
||||
ad_gpo_access_control = {{ domain.ad_gpo_access_control | default(ad_gpo_access_control) }}
|
||||
{% endfor %}
|
Reference in New Issue
Block a user