freeipa/install/tools
Rob Crittenden ff4ddbbb72 Better customize the message regarding the CA based on the install options.
There are now 3 cases:

- Install a dogtag CA and issue server certs using that
- Install a selfsign CA and issue server certs using that
- Install using either dogtag or selfsign and use the provided PKCS#12 files
  for the server certs. The installed CA will still be used by the cert
  plugin to issue any server certs.
2010-03-19 04:55:33 -06:00
..
man Add A and PTR records during ipa-replica-prepare 2010-02-09 16:30:25 -05:00
ipa-compat-manage Set default log level in the *-manage utilities to ERROR and not NOTSET 2010-02-04 11:36:54 -05:00
ipa-dns-install Add ipa-dns-install script 2010-02-09 15:45:35 -05:00
ipa-fix-CVE-2008-3274 Rename ipa-python directory to ipapython so it is a real python library 2009-02-09 14:35:15 -05:00
ipa-ldap-updater Rename ipa-python directory to ipapython so it is a real python library 2009-02-09 14:35:15 -05:00
ipa-nis-manage Set default log level in the *-manage utilities to ERROR and not NOTSET 2010-02-04 11:36:54 -05:00
ipa-replica-install Get rid of ipapython.config in ipa-replica-prepare 2010-02-09 16:30:06 -05:00
ipa-replica-manage Add force option to ipa-replica-manage to allow forcing deletion of a replica 2009-12-11 22:34:58 -07:00
ipa-replica-prepare Make CA PKCS#12 location arg for ipa-replica-prepare, default /root/cacert.p12 2010-03-19 04:45:41 -06:00
ipa-server-certinstall Initialize the api so imports work, trust all CAs included in the PKCS#12. 2010-03-19 04:41:05 -06:00
ipa-server-install Better customize the message regarding the CA based on the install options. 2010-03-19 04:55:33 -06:00
ipa-upgradeconfig Better upgrade detection so we don't print spurious errors 2009-09-15 17:42:36 -04:00
ipactl Add status option to ipactl 2010-02-09 04:07:33 -07:00
Makefile.am Add ipa-dns-install script 2010-02-09 15:45:35 -05:00
README Mass tree reorganization for IPAv2. To view previous history of files use: 2009-02-03 15:27:14 -05:00

Required packages:

krb5-server
fedora-ds-base
fedora-ds-base-devel
openldap-clients
openldap-devel
krb5-server-ldap
cyrus-sasl-gssapi
httpd
mod_auth_kerb
ntp
openssl-devel
nspr-devel
nss-devel
mozldap-devel
mod_python
gcc
python-ldap
TurboGears
python-kerberos
python-krbV
python-tgexpandingformwidget
python-pyasn1

Installation example:

TEMPORARY: until bug https://bugzilla.redhat.com/show_bug.cgi?id=248169 is
           fixed.

Please apply the fedora-ds.init.patch in freeipa/ipa-server/ipa-install/share/
to patch your init scripts before running ipa-server-install. This tells
FDS where to find its kerberos keytab.

Things done as root are denoted by #. Things done as a unix user are denoted
by %.

# cd freeipa
# patch -p0 < ipa-server/ipa-install/share/fedora-ds.init.patch

Now to do the installation.

# cd freeipa
# make install

To start an interactive installation use:
# /usr/sbin/ipa-server-install 

For more verbose output add the -d flag run the command with -h to see all options

You have a basic working system with one super administrator (named admin).

To create another administrative user:

% kinit admin@FREEIPA.ORG
% /usr/sbin/ipa-adduser -f Test -l User test
% ldappasswd -Y GSSAPI -h localhost -s password uid=test,cn=users,cn=accounts,dc=freeipa,dc=org
% /usr/sbin/ipa-groupmod -a test admins

An admin user is just a regular user in the group admin.

Now you can destroy the old ticket and log in as test:

% kdestroy
% kinit test@FREEIPA.ORG
% /usr/sbin/ipa-finduser test