mirror of
https://salsa.debian.org/freeipa-team/freeipa.git
synced 2024-12-28 01:41:14 -06:00
9cbb54db99
CA-less options were missing, as well as --allow-zone-overlap and --auto-reverse. Fix short option for --realm which was displayed as -d instead of -r. https://fedorahosted.org/freeipa/ticket/5835 Reviewed-By: Stanislav Laznicka <slaznick@redhat.com>
212 lines
8.3 KiB
Groff
212 lines
8.3 KiB
Groff
.\" A man page for ipa-replica-install
|
|
.\" Copyright (C) 2008-2012 Red Hat, Inc.
|
|
.\"
|
|
.\" This program is free software; you can redistribute it and/or modify
|
|
.\" it under the terms of the GNU General Public License as published by
|
|
.\" the Free Software Foundation, either version 3 of the License, or
|
|
.\" (at your option) any later version.
|
|
.\"
|
|
.\" This program is distributed in the hope that it will be useful, but
|
|
.\" WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
.\" MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
.\" General Public License for more details.
|
|
.\"
|
|
.\" You should have received a copy of the GNU General Public License
|
|
.\" along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
.\"
|
|
.\" Author: Rob Crittenden <rcritten@redhat.com>
|
|
.\"
|
|
.TH "ipa-replica-install" "1" "May 16 2012" "FreeIPA" "FreeIPA Manual Pages"
|
|
.SH "NAME"
|
|
ipa\-replica\-install \- Create an IPA replica
|
|
.SH "SYNOPSIS"
|
|
.SS "DOMAIN LEVEL 0"
|
|
.TP
|
|
ipa\-replica\-install [\fIOPTION\fR]... replica_file
|
|
.SS "DOMAIN LEVEL 1"
|
|
.TP
|
|
ipa\-replica\-install [\fIOPTION\fR]...
|
|
.SH "DESCRIPTION"
|
|
Configures a new IPA server that is a replica of the server. Once it has been created it is an exact copy of the original IPA server and is an equal master. Changes made to any master are automatically replicated to other masters.
|
|
|
|
To create a replica in a domain at domain level 0, you need to provide an replica file. The replica_file is created using the ipa\-replica\-prepare utility.
|
|
|
|
To create a replica in a domain at domain level 1, you don't have to provide a replica file, the machine only needs to be enrolled in the FreeIPA domain first. This process of turning the IPA client into a replica is also referred to as replica promotion.
|
|
|
|
If you're starting with an existing IPA client, simply run ipa\-replica\-install to have it promoted into a replica.
|
|
|
|
To promote a blank machine into a replica, you have two options, you can either run ipa\-client\-install in a separate step, or pass the enrollment related options to the ipa\-replica\-install (see DOMAIN LEVEL 1 CLIENT ENROLLMENT OPTIONS). In the latter case, ipa\-replica\-install will join the machine to the IPA realm automatically and will proceed with the promotion step.
|
|
|
|
If the installation fails you may need to run ipa\-server\-install \-\-uninstall and ipa\-client\-install before running ipa\-replica\-install again.
|
|
|
|
The installation will fail if the host you are installing the replica on exists as a host in IPA or an existing replication agreement exists (for example, from a previously failed installation).
|
|
|
|
A replica should only be installed on the same or higher version of IPA on the remote system.
|
|
.SH "OPTIONS"
|
|
.SS "DOMAIN LEVEL 1 OPTIONS"
|
|
.TP
|
|
\fB\-P\fR, \fB\-\-principal\fR
|
|
The user principal which will be used to promote the client to the replica and enroll the client itself, if necessary.
|
|
.TP
|
|
\fB\-w\fR, \fB\-\-admin\-password\fR
|
|
The Kerberos password for the given principal.
|
|
|
|
.SS "DOMAIN LEVEL 1 CLIENT ENROLLMENT OPTIONS"
|
|
To install client and promote it to replica using a host keytab or One Time Password, the host needs to be a member of ipaservers group. This requires to create a host entry and add it to the host group prior replica installation.
|
|
|
|
--server, --domain, --realm options are autodiscovered via DNS records by default.
|
|
|
|
.TP
|
|
\fB\-p\fR \fIPASSWORD\fR, \fB\-\-password\fR=\fIPASSWORD\fR
|
|
One Time Password for joining a machine to the IPA realm.
|
|
.TP
|
|
\fB\-k\fR, \fB\-\-keytab\fR
|
|
Path to host keytab.
|
|
.TP
|
|
\fB\-\-server\fR
|
|
The fully qualified domain name of the IPA server to enroll to.
|
|
.TP
|
|
\fB\-n\fR, \fB\-\-domain\fR=\fIDOMAIN\fR
|
|
Set the domain name to DOMAIN.
|
|
.TP
|
|
\fB\-r\fR, \fB\-\-realm\fR=\fIREALM_NAME\fR
|
|
Set the IPA realm name to REALM_NAME.
|
|
.TP
|
|
\fB\-\-hostname\fR
|
|
The hostname of this machine (FQDN). If specified, the hostname will be set and the system configuration will be updated to persist over reboot.
|
|
|
|
.SS "DOMAIN LEVEL 0 OPTIONS"
|
|
.TP
|
|
\fB\-p\fR \fIPASSWORD\fR, \fB\-\-password\fR=\fIPASSWORD\fR
|
|
Directory Manager (existing master) password
|
|
.TP
|
|
\fB\-w\fR, \fB\-\-admin\-password\fR
|
|
Admin user Kerberos password used for connection check
|
|
|
|
.SS "BASIC OPTIONS"
|
|
.TP
|
|
\fB\-\-ip\-address\fR=\fIIP_ADDRESS\fR
|
|
The IP address of this server. If this address does not match the address the host resolves to and \-\-setup\-dns is not selected the installation will fail. If the server hostname is not resolvable, a record for the hostname and IP_ADDRESS is added to /etc/hosts.
|
|
This this option can be used multiple times to specify more IP addresses of the server (e.g. multihomed and/or dualstacked server).
|
|
.TP
|
|
\fB\-\-mkhomedir\fR
|
|
Create home directories for users on their first login
|
|
.TP
|
|
\fB\-N\fR, \fB\-\-no\-ntp\fR
|
|
Do not configure NTP
|
|
.TP
|
|
\fB\-\-no\-ui\-redirect\fR
|
|
Do not automatically redirect to the Web UI.
|
|
.TP
|
|
\fB\-\-ssh\-trust\-dns\fR
|
|
Configure OpenSSH client to trust DNS SSHFP records.
|
|
.TP
|
|
\fB\-\-no\-ssh\fR
|
|
Do not configure OpenSSH client.
|
|
.TP
|
|
\fB\-\-no\-sshd\fR
|
|
Do not configure OpenSSH server.
|
|
.TP
|
|
\fB\-\-skip\-conncheck\fR
|
|
Skip connection check to remote master
|
|
.TP
|
|
\fB\-d\fR, \fB\-\-debug
|
|
Enable debug logging when more verbose output is needed
|
|
.TP
|
|
\fB\-U\fR, \fB\-\-unattended\fR
|
|
An unattended installation that will never prompt for user input
|
|
.TP
|
|
\fB\-\-dirsrv\-config\-file\fR
|
|
The path to LDIF file that will be used to modify configuration of dse.ldif during installation of the directory server instance
|
|
|
|
.SS "CERTIFICATE SYSTEM OPTIONS"
|
|
.TP
|
|
\fB\-\-setup\-ca\fR
|
|
Install and configure a CA on this replica. If a CA is not configured then
|
|
certificate operations will be forwarded to a master with a CA installed.
|
|
.TP
|
|
\fB\-\-no\-pkinit\fR
|
|
Disables pkinit setup steps
|
|
.TP
|
|
\fB\-\-dirsrv\-cert\-file\fR=FILE
|
|
File containing the Directory Server SSL certificate and private key
|
|
.TP
|
|
\fB\-\-http\-cert\-file\fR=FILE
|
|
File containing the Apache Server SSL certificate and private key
|
|
.TP
|
|
\fB\-\-pkinit\-cert\-file\fR=FILE
|
|
File containing the Kerberos KDC SSL certificate and private key
|
|
.TP
|
|
\fB\-\-dirsrv\-pin\fR=PIN
|
|
The password to unlock the Directory Server private key
|
|
.TP
|
|
\fB\-\-http\-pin\fR=PIN
|
|
The password to unlock the Apache Server private key
|
|
.TP
|
|
\fB\-\-pkinit\-pin\fR=PIN
|
|
The password to unlock the Kerberos KDC private key
|
|
.TP
|
|
\fB\-\-dirsrv\-cert\-name\fR=NAME
|
|
Name of the Directory Server SSL certificate to install
|
|
.TP
|
|
\fB\-\-http\-cert\-name\fR=NAME
|
|
Name of the Apache Server SSL certificate to install
|
|
.TP
|
|
\fB\-\-pkinit\-cert\-name\fR=NAME
|
|
Name of the Kerberos KDC SSL certificate to install
|
|
.TP
|
|
\fB\-\-skip\-schema\-check\fR
|
|
Skip check for updated CA DS schema on the remote master
|
|
|
|
.SS "DNS OPTIONS"
|
|
.TP
|
|
\fB\-\-setup\-dns\fR
|
|
Generate a DNS zone if it does not exist already and configure the DNS server.
|
|
This option requires that you either specify at least one DNS forwarder through
|
|
the \fB\-\-forwarder\fR option or use the \fB\-\-no\-forwarders\fR option.
|
|
.TP
|
|
\fB\-\-forwarder\fR=\fIIP_ADDRESS\fR
|
|
Add a DNS forwarder to the DNS configuration. You can use this option multiple
|
|
times to specify more forwarders, but at least one must be provided, unless
|
|
the \fB\-\-no\-forwarders\fR option is specified.
|
|
.TP
|
|
\fB\-\-no\-forwarders\fR
|
|
Do not add any DNS forwarders. Root DNS servers will be used instead.
|
|
.TP
|
|
\fB\-\-auto\-forwarders\fR
|
|
Add DNS forwarders configured in /etc/resolv.conf to the list of forwarders used by IPA DNS.
|
|
.TP
|
|
\fB\-\-forward\-policy\fR=\fIfirst|only\fR
|
|
DNS forwarding policy for global forwarders specified using other options.
|
|
Defaults to first if no IP address belonging to a private or reserved ranges is
|
|
detected on local interfaces (RFC 6303). Defaults to only if a private
|
|
IP address is detected.
|
|
.TP
|
|
\fB\-\-reverse\-zone\fR=\fIREVERSE_ZONE\fR
|
|
The reverse DNS zone to use. This option can be used multiple times to specify multiple reverse zones.
|
|
.TP
|
|
\fB\-\-no\-reverse\fR
|
|
Do not create new reverse DNS zone. If a reverse DNS zone already exists for the subnet, it will be used.
|
|
.TP
|
|
\fB\-\-auto-reverse\fR
|
|
Create necessary reverse zones
|
|
.TP
|
|
\fB\-\-allow-zone-overlap\fR
|
|
Create DNS zone even if it already exists
|
|
.TP
|
|
\fB\-\-no\-host\-dns\fR
|
|
Do not use DNS for hostname lookup during installation
|
|
.TP
|
|
\fB\-\-no\-dns\-sshfp\fR
|
|
Do not automatically create DNS SSHFP records.
|
|
.TP
|
|
\fB\-\-no\-dnssec\-validation\fR
|
|
Disable DNSSEC validation on this server.
|
|
|
|
.SH "EXIT STATUS"
|
|
0 if the command was successful
|
|
|
|
1 if an error occurred
|
|
|
|
3 if the host exists in the IPA server or a replication agreement to the remote master already exists
|