Joining Linux (RHEL) to Active Directory
All new RHEL machines should use Active Directory for authentication and, potentially, authorization. This document outlines the process by which an RHEL 7 or 8 machine can be added to UConn's Active Directory if the user has the necessary permissions.
Install packages.
yum install sssd realmd oddjob oddjob-mkhomedir adcli samba-common samba-common-tools krb5-workstation openldap-clients policycoreutils-python
Set hostname to end with “grove.ad.uconn.edu.”
hostnamectl set-hostname somethingunique.grove.ad.uconn.edu
If on RHEL 8, re-enable some deprecated crypto versions AD still uses.
update-crypto-policies --set LEGACY
Join realm.
You can find the distinguished name of the OU by going into Active Directory Users and Computers, finding the destination OU, and viewing its attributes under Properties.
realm join grove.ad.uconn.edu --user your_admin_account --computer-ou=OU=Distinguished,OU=Name,DC=grove,DC=ad,DC=uconn,DC=edu
Modify the domain section of /etc/sssd/sssd.conf.
use_fully_qualified_names = False fallback_homedir = /home/%u # This is used to improve group member lookup speed ignore_group_members = true
Add to the domain section of /etc/sssd/sssd.conf.
Deny login for all.
Give login access to groups or users.
Give Sudo access to groups by adding to the sudoers file.