====== Créer un Bind DN pour Foreman ====== FIXME À traduire et mettre en forme For setting up freeIPA authentication for Foreman I liked to have a seperate system account binddn. In order to do this you first need to create a file like this: cat <foreman-binddn.update dn: uid=foreman,cn=sysaccounts,cn=etc,dc=example,dc=com add:objectclass:account add:objectclass:simplesecurityobject add:uid:foreman add:userPassword:averysecurepassword add:passwordExpirationTime:20380119031407Z add:nsIdleTimeout:0 EOF and then you import it into the freeIPA (as root) like this: ipa-ldap-updater foreman-binddn.update You can check if the new user is present running: ldapsearch -D "cn=Directory Manager" -x uid=foreman -W Optional you can also add a group in freeIPA where you put all Foreman admins inside: ipa group-add --desc="Foreman Admins" foreman_admins This one is used below as the optional LDAP filter. On the Foreman you supply the following information: LDAP Server Server: port: 389 Server type: FreeIPA Account Account Username: uid=foreman,cn=sysaccounts,cn=etc,dc=example,dc=com Account Password: averysecurepassword Base DN: cn=users,cn=accounts,dc=example,dc=com Groups Base DN: cn=groups,cn=accounts,dc=example,dc=com LDAP filter: (memberOf=cn=foreman_admins,cn=groups,cn=accounts,dc=example,dc=com) Check both boxes of: Automatically create accounts in Foreman Usergroup sync Atrribute mappings Login name attribue: uid First name attribute: givenName Surname attribute: sn Email address attribute: mail ===== Liens ===== * https://www.freeipa.org/page/Creating_a_binddn_for_Foreman * https://nikhilkathole.wordpress.com/2018/12/16/freeipa-integration-with-foreman/ * https://cstan.io/?p=8960&lang=en * https://cstan.io/?p=8444&lang=en * https://computingforgeeks.com/how-to-subscribe-centos-server-to-katello-foreman/