Using SSSD it’s relatively easy to bind a CentOS 7 or Red Hat Enteprise Linux 7 to Active Directory service.
Install the needed binaries:
yum install realmd sssd adcli
Discover the domain:
realm discover YOURDOMAIN
Join the domain:
realm join YOURDOMAIN
Check if the domain was correctly joined:
realm list
Configuration can be found in the SSSD configuration file:
/etc/sssd/sssd.conf
To set up security by allowing only a specific group to access the server with Active Directory, you can edit the configuration file and change the access provider like this:
access_provider = simple simple_allow_groups = YOUR-AD-GROUP
If you need to allow only specific users, you can do the same with this configuration:
access_provider = simple simple_allow_users = YOUR-USER1, YOUR-USER2,...
Many other ways can be used to restrict users, you can check the SSSD man page for more information.
thanks,
please can you tell me if this affect my ad dc in any way..i mean it will not corrupt any thing in my windows dc?
Thanks for your article .
is it safe for ad . i mean will if currupt my domain controller ?
i need to join on linux machine for squid proxy.
Thanks
Sorry for the delay I was really busy the past days. But yes it’s safe, you can check the official Red Hat documentation for more information:
https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7/pdf/Windows_Integration_Guide/Red_Hat_Enterprise_Linux-7-Windows_Integration_Guide-en-US.pdf