freeipa/ipa-server/ipa-install
Simo Sorce f5177e6b84 Install the ca.crt file early on so that we can always enforce SSL
protected connections to other LDAP servers
Fix error reporting on replica creation.
2008-08-13 15:36:57 -04:00
..
share Admin must be able to add/delete too 2008-07-09 16:50:54 -04:00
ipa-replica-install Install the ca.crt file early on so that we can always enforce SSL 2008-08-13 15:36:57 -04:00
ipa-replica-manage Fix import for version 2008-06-04 17:32:51 -04:00
ipa-replica-prepare Used the encrypt_file and decrypt_file utility functions to encrypt replica 2008-08-11 18:30:57 -04:00
ipa-server-certinstall Wrap up the raw_input() to user_input() for convenience and uniformity. 2008-07-23 10:05:06 -04:00
ipa-server-install Fix python syntax error: missing colon. 2008-08-06 11:27:30 -04:00
ipactl Start ntpd after FDS so that the ntp user can be found. 2008-03-24 11:02:49 -04:00
Makefile.am Add small script to start/stop all of the services that IPA requires in the 2008-02-28 11:37:06 -05:00
README Use Fedora package names for PyKerberos (python-kerberos) and pyasn1 2008-01-24 13:44:38 -05:00

Required packages:

krb5-server
fedora-ds-base
fedora-ds-base-devel
openldap-clients
openldap-devel
krb5-server-ldap
cyrus-sasl-gssapi
httpd
mod_auth_kerb
ntp
openssl-devel
nspr-devel
nss-devel
mozldap-devel
mod_python
gcc
python-ldap
TurboGears
python-kerberos
python-krbV
python-tgexpandingformwidget
python-pyasn1

Installation example:

TEMPORARY: until bug https://bugzilla.redhat.com/show_bug.cgi?id=248169 is
           fixed.

Please apply the fedora-ds.init.patch in freeipa/ipa-server/ipa-install/share/
to patch your init scripts before running ipa-server-install. This tells
FDS where to find its kerberos keytab.

Things done as root are denoted by #. Things done as a unix user are denoted
by %.

# cd freeipa
# patch -p0 < ipa-server/ipa-install/share/fedora-ds.init.patch

Now to do the installation.

# cd freeipa
# make install

To start an interactive installation use:
# /usr/sbin/ipa-server-install 

For more verbose output add the -d flag run the command with -h to see all options

You have a basic working system with one super administrator (named admin).

To create another administrative user:

% kinit admin@FREEIPA.ORG
% /usr/sbin/ipa-adduser -f Test -l User test
% ldappasswd -Y GSSAPI -h localhost -s password uid=test,cn=users,cn=accounts,dc=freeipa,dc=org
% /usr/sbin/ipa-groupmod -a test admins

An admin user is just a regular user in the group admin.

Now you can destroy the old ticket and log in as test:

% kdestroy
% kinit test@FREEIPA.ORG
% /usr/sbin/ipa-finduser test