Différences
Ci-dessous, les différences entre deux révisions de la page.
Les deux révisions précédentes Révision précédente Prochaine révision | Révision précédente | ||
reserves:serveurs [2019/10/09 10:41] – [Installation avec montage NFS] chabrol | reserves:serveurs [2019/10/09 10:44] (Version actuelle) – [Installation avec montage NFS] chabrol | ||
---|---|---|---|
Ligne 182: | Ligne 182: | ||
automount: | automount: | ||
</ | </ | ||
+ | |||
+ | On exécute la commande '' | ||
+ | |||
+ | Modification du fichier ''/ | ||
+ | < | ||
+ | # / | ||
+ | # nslcd configuration file. See nslcd.conf(5) | ||
+ | # for details. | ||
+ | |||
+ | # The user and group nslcd should run as. | ||
+ | uid nslcd | ||
+ | gid nslcd | ||
+ | |||
+ | # The location at which the LDAP server(s) should be reachable. | ||
+ | uri ldap:// | ||
+ | |||
+ | # The search base that will be used for all queries. | ||
+ | base dc=i2m, | ||
+ | |||
+ | # The LDAP protocol version to use. | ||
+ | ldap_version 3 | ||
+ | |||
+ | # The DN to bind with for normal lookups. | ||
+ | #binddn cn=annonymous, | ||
+ | #bindpw secret | ||
+ | |||
+ | # The DN used for password modifications by root. | ||
+ | # | ||
+ | |||
+ | # SSL options | ||
+ | ssl start_tls | ||
+ | tls_reqcert allow | ||
+ | tls_cacertfile / | ||
+ | |||
+ | # The search scope. | ||
+ | #scope sub | ||
+ | </ | ||
+ | |||
+ | On redémarre les services nslcd et nscd : '' | ||
+ | |||
+ | On lance la commande '' | ||
+ | |||
+ | On modifie le fichier ''/ | ||
+ | < | ||
+ | # | ||
+ | # / | ||
+ | # | ||
+ | # This file is included from other service-specific PAM config files, | ||
+ | # and should contain a list of modules that define tasks to be performed | ||
+ | # at the start and end of sessions of *any* kind (both interactive and | ||
+ | # non-interactive). | ||
+ | # | ||
+ | # As of pam 1.0.1-6, this file is managed by pam-auth-update by default. | ||
+ | # To take advantage of this, it is recommended that you configure any | ||
+ | # local modules either before or after the default block, and use | ||
+ | # pam-auth-update to manage selection of other modules. | ||
+ | # pam-auth-update(8) for details. | ||
+ | |||
+ | # here are the per-package modules (the " | ||
+ | session [default=1] | ||
+ | # here's the fallback if no module succeeds | ||
+ | session requisite | ||
+ | # prime the stack with a positive return value if there isn't one already; | ||
+ | # this avoids us returning an error just because nothing sets a success code | ||
+ | # since the modules above will each just jump around | ||
+ | session required | ||
+ | # The pam_umask module will set the umask according to the system default in | ||
+ | # / | ||
+ | # umask settings with different shells, display managers, remote sessions etc. | ||
+ | # See "man pam_umask" | ||
+ | session optional | ||
+ | # and here are more per-package modules (the " | ||
+ | session required | ||
+ | session optional | ||
+ | session [success=ok default=ignore] | ||
+ | session optional | ||
+ | # end of pam-auth-update config | ||
+ | </ | ||
+ |