freeipa/ipa-server/ipa-install
2008-02-19 11:40:27 -05:00
..
share Fix misspelling of the word indices. 2008-01-25 13:29:49 -05:00
ipa-replica-install Use file to store the current CA serial number 2008-02-05 12:23:53 -05:00
ipa-replica-manage Set the license uniformly to GPLv2 only. 2008-02-04 15:15:52 -05:00
ipa-replica-prepare Don't create a backup of the PKCS#12 cert on replicas 2008-02-14 17:39:06 -08:00
ipa-server-certinstall Set the license uniformly to GPLv2 only. 2008-02-04 15:15:52 -05:00
ipa-server-install Display the path to the PKCS#12 password file at the end of installation 2008-02-19 11:40:27 -05:00
Makefile.am - Enable ssl for replication. 0001-01-01 00:00:00 +00:00
README Use Fedora package names for PyKerberos (python-kerberos) and pyasn1 2008-01-24 13:44:38 -05:00

Required packages:

krb5-server
fedora-ds-base
fedora-ds-base-devel
openldap-clients
openldap-devel
krb5-server-ldap
cyrus-sasl-gssapi
httpd
mod_auth_kerb
ntp
openssl-devel
nspr-devel
nss-devel
mozldap-devel
mod_python
gcc
python-ldap
TurboGears
python-kerberos
python-krbV
python-tgexpandingformwidget
python-pyasn1

Installation example:

TEMPORARY: until bug https://bugzilla.redhat.com/show_bug.cgi?id=248169 is
           fixed.

Please apply the fedora-ds.init.patch in freeipa/ipa-server/ipa-install/share/
to patch your init scripts before running ipa-server-install. This tells
FDS where to find its kerberos keytab.

Things done as root are denoted by #. Things done as a unix user are denoted
by %.

# cd freeipa
# patch -p0 < ipa-server/ipa-install/share/fedora-ds.init.patch

Now to do the installation.

# cd freeipa
# make install

To start an interactive installation use:
# /usr/sbin/ipa-server-install 

For more verbose output add the -d flag run the command with -h to see all options

You have a basic working system with one super administrator (named admin).

To create another administrative user:

% kinit admin@FREEIPA.ORG
% /usr/sbin/ipa-adduser -f Test -l User test
% ldappasswd -Y GSSAPI -h localhost -s password uid=test,cn=users,cn=accounts,dc=freeipa,dc=org
% /usr/sbin/ipa-groupmod -a test admins

An admin user is just a regular user in the group admin.

Now you can destroy the old ticket and log in as test:

% kdestroy
% kinit test@FREEIPA.ORG
% /usr/sbin/ipa-finduser test