Différences
Ci-dessous, les différences entre deux révisions de la page.
| Les deux révisions précédentes Révision précédente Prochaine révision | Révision précédente | ||
| reserves:serveurs [2019/10/09 08:41] – [Installation avec montage NFS] chabrol | reserves:serveurs [2019/10/09 08:44] (Version actuelle) – [Installation avec montage NFS] chabrol | ||
|---|---|---|---|
| Ligne 182: | Ligne 182: | ||
| automount: | automount: | ||
| </ | </ | ||
| + | |||
| + | On exécute la commande '' | ||
| + | |||
| + | Modification du fichier ''/ | ||
| + | < | ||
| + | # / | ||
| + | # nslcd configuration file. See nslcd.conf(5) | ||
| + | # for details. | ||
| + | |||
| + | # The user and group nslcd should run as. | ||
| + | uid nslcd | ||
| + | gid nslcd | ||
| + | |||
| + | # The location at which the LDAP server(s) should be reachable. | ||
| + | uri ldap:// | ||
| + | |||
| + | # The search base that will be used for all queries. | ||
| + | base dc=i2m, | ||
| + | |||
| + | # The LDAP protocol version to use. | ||
| + | ldap_version 3 | ||
| + | |||
| + | # The DN to bind with for normal lookups. | ||
| + | #binddn cn=annonymous, | ||
| + | #bindpw secret | ||
| + | |||
| + | # The DN used for password modifications by root. | ||
| + | # | ||
| + | |||
| + | # SSL options | ||
| + | ssl start_tls | ||
| + | tls_reqcert allow | ||
| + | tls_cacertfile / | ||
| + | |||
| + | # The search scope. | ||
| + | #scope sub | ||
| + | </ | ||
| + | |||
| + | On redémarre les services nslcd et nscd : '' | ||
| + | |||
| + | On lance la commande '' | ||
| + | |||
| + | On modifie le fichier ''/ | ||
| + | < | ||
| + | # | ||
| + | # / | ||
| + | # | ||
| + | # This file is included from other service-specific PAM config files, | ||
| + | # and should contain a list of modules that define tasks to be performed | ||
| + | # at the start and end of sessions of *any* kind (both interactive and | ||
| + | # non-interactive). | ||
| + | # | ||
| + | # As of pam 1.0.1-6, this file is managed by pam-auth-update by default. | ||
| + | # To take advantage of this, it is recommended that you configure any | ||
| + | # local modules either before or after the default block, and use | ||
| + | # pam-auth-update to manage selection of other modules. | ||
| + | # pam-auth-update(8) for details. | ||
| + | |||
| + | # here are the per-package modules (the " | ||
| + | session [default=1] | ||
| + | # here's the fallback if no module succeeds | ||
| + | session requisite | ||
| + | # prime the stack with a positive return value if there isn't one already; | ||
| + | # this avoids us returning an error just because nothing sets a success code | ||
| + | # since the modules above will each just jump around | ||
| + | session required | ||
| + | # The pam_umask module will set the umask according to the system default in | ||
| + | # / | ||
| + | # umask settings with different shells, display managers, remote sessions etc. | ||
| + | # See "man pam_umask" | ||
| + | session optional | ||
| + | # and here are more per-package modules (the " | ||
| + | session required | ||
| + | session optional | ||
| + | session [success=ok default=ignore] | ||
| + | session optional | ||
| + | # end of pam-auth-update config | ||
| + | </ | ||
| + | |||