CORRECT TEXT
Configure the verification mode of your host account and the password as LDAP. And it can
ldapuser40. The password is set as “password”. And the certificate login successfully through
can be downloaded from http://ip/dir/ldap.crt. After the user logs on , the user has no host directory
unless you configure the autofs in the following questions.
Answer: A
Explanation:
system-config-authentication
LDAP Server: ldap//instructor.example.com (In domain form, not write IP)
OR
# yum groupinstall directory-client (1.krb5-workstation 2.pam-krb5 3.sssd)
# system-config-authentication
1.User Account Database: LDAP
2.LDAP Search Base DN: dc=example,dc=com
3.LDAP Server: ldap://instructor.example.com (In domain form, not write IP) 4.Download CA
Certificate
5.Authentication Method: LDAP password
6.Apply
getent passwd ldapuser40
Will post Terminal Commands Version
# yum install -y nss-pam-ldapd
# authconfig –enableldap –enableldapauth –ldapserver= ldap://name of server.com –ldapbasedn=”dc=name of server,dc=com” –update
# authconfig-tui (this verifies the ldap settings)
# wget –O /etc/openldap/cacerts/filename.pem ftp://server.name of server.com/pub/filename.pem (copying of LDAP certificate)
# vim /etc/sysconfig/authconfig
>change FORCELEGACY=no to FORCELEGACY=yes (this tells system it OK to use non-TLS method)
>wq!
# authconfig –enableldap –enableldapauth –ldapserver= ldap://name of server.com –ldapbasedn=”dc=name of server,dc=com” –update (repeat of previous step restarts service)
# getent passwd (view the ldap users)
# authconfig –enablemkhomedir –update
# su – “ldapuser”