This shows you the differences between two versions of the page.
| Both sides previous revision Previous revision Next revision | Previous revision | ||
|
решение_freeipa [2026/02/13 10:51] val |
решение_freeipa [2026/02/19 15:14] (current) val [Создание ключа и сертификата для стороннего сервиса] |
||
|---|---|---|---|
| Line 26: | Line 26: | ||
| <code> | <code> | ||
| # cat /etc/docker/daemon.json | # cat /etc/docker/daemon.json | ||
| - | { "userns-remap": "default" } | + | </code><code> |
| + | { | ||
| + | "userns-remap": "default" | ||
| + | } | ||
| + | </code><code> | ||
| # service docker restart | # service docker restart | ||
| Line 104: | Line 107: | ||
| Около 20 минут | Около 20 минут | ||
| </code> | </code> | ||
| - | * !!! не резолвит имя server (иногда :) и рекурсивные запросы из других сетей, помогает: | + | ==== Настройка доступа для клиентов DNS ==== |
| <code> | <code> | ||
| server# cat /opt/freeipa-data/etc/named/ipa-options-ext.conf | server# cat /opt/freeipa-data/etc/named/ipa-options-ext.conf | ||
| Line 129: | Line 132: | ||
| <code> | <code> | ||
| # apt update && apt install freeipa-client | # apt update && apt install freeipa-client | ||
| - | 2 минуты | + | ... |
| + | Default Kerberos version 5 realm: CORPX.UN | ||
| + | ... | ||
| # #kinit admin | # #kinit admin | ||
| Line 149: | Line 154: | ||
| # systemctl status sssd | # systemctl status sssd | ||
| + | # cat /etc/resolv.conf | ||
| [root@server ~]# ipa host-show gate|client1 | [root@server ~]# ipa host-show gate|client1 | ||
| Line 220: | Line 226: | ||
| ipa dnsrecord-add corpX.un keycloak --a-rec="192.168.X.64" | ipa dnsrecord-add corpX.un keycloak --a-rec="192.168.X.64" | ||
| - | sleep 5 | ||
| ipa host-add keycloak.corpX.un | ipa host-add keycloak.corpX.un | ||
| Line 228: | Line 233: | ||
| openssl req -new -key /data/keycloak.key -subj '/CN=keycloak.corpX.un/O=CORPX.UN' -addext 'subjectAltName=DNS:keycloak.corpX.un' -out /data/keycloak.req | openssl req -new -key /data/keycloak.key -subj '/CN=keycloak.corpX.un/O=CORPX.UN' -addext 'subjectAltName=DNS:keycloak.corpX.un' -out /data/keycloak.req | ||
| ipa cert-request /data/keycloak.req --principal=HTTP/keycloak.corpX.un --certificate-out=/data/keycloak.crt | ipa cert-request /data/keycloak.req --principal=HTTP/keycloak.corpX.un --certificate-out=/data/keycloak.crt | ||
| + | |||
| server# scp /opt/freeipa-data/keycloak.* kube1:/tmp/ | server# scp /opt/freeipa-data/keycloak.* kube1:/tmp/ | ||
| Line 266: | Line 272: | ||
| [root@freeipa-server ~]# tsig-keygen cert-manager | tee /data/etc/named/cert-manager.key | [root@freeipa-server ~]# tsig-keygen cert-manager | tee /data/etc/named/cert-manager.key | ||
| - | server.corp13.un:~# cat /opt/freeipa-data/etc/named/ipa-ext.conf | + | server# cat /opt/freeipa-data/etc/named/ipa-ext.conf |
| ... | ... | ||
| include "/data/etc/named/cert-manager.key"; | include "/data/etc/named/cert-manager.key"; | ||
| Line 278: | Line 284: | ||
| server 127.0.0.1 | server 127.0.0.1 | ||
| zone corpX.un | zone corpX.un | ||
| - | update add _acme-challenge.gitlab.corp13.un. 30 IN TXT "your_txt_record_data 1" | + | update add _acme-challenge.gitlab.corpX.un. 30 IN TXT "your_txt_record_data 1" |
| send | send | ||
| </code> | </code> | ||
| Line 287: | Line 293: | ||
| <code> | <code> | ||
| [root@freeipa-server /]# find /data/var/log/ -mmin -2 -type f -ls | [root@freeipa-server /]# find /data/var/log/ -mmin -2 -type f -ls | ||
| + | |||
| + | server# find /opt/freeipa-data/var/log/ -mmin -2 -type f -ls | ||
| </code> | </code> | ||