I know I'm way late on this, but since people are talking LPIC-2 again, if I might add something for Sections 210.x?
Instead of getting detailed into installing a LDAP server, which can vary greatly, based on implementation (e.g., 389 v. OpenLDAP -- let alone 389/Kerberos-based IPA) ... Why no cover the more _practical_ experience if configuring System Security Services Daemon (SSSD)? SSSD replaces a lot of legacy (sometimes broken or very non-compliant with various programs these days) PAM, NSS and other services. In fact, it uses newer OpenLDAP libraries than older pam_ldap and related modules and projects. It's really a modern, single concentrator for network authentication and object access and caching. In fact, when I talk to more Windows admins, I relate SSSD as Linux's implementation of a Local Security Authority (LSA) subsystem and related Security Service Providers (SSPs). SSSD has built-in, and more deterministic caching than nscd, and it is superior to Samba's Winbindd now (especially for multi-domain support). And one of SSSD's most powerful features is it's ability to directly use the IETF RFC2307 schema if IdM for UNIX is configured and attributes actually populated in AD (i.e., Windows admins populate both Windows and POSIX-UNIX/Linux attributes), removing the need for "remapping" via Winbindd, let alone countless all those countless proprietary add-ons (Centrify, Qwest, etc...). When the discussion is around _client_ services, SSSD really should be in LPIC-2. I have yet to find anyone who hasn't deployed SSSD, including on Debian or Ubuntu (although old, broken versions are always an issue), that doesn't sing it's praises. It just concentrates everything. What normally "trips people up" is when they try to paint SSSD as Red Hat-centric or related to sister projects. It's not. Yes, SSSD is typically used _with_ authconfig (a tool for auto-configuring PAM, NSS and SSSD) in the Fedora/RHEL sphere, but SSSD is completely separate. And while SSSD is required for the IPA client, it is separate from IPA, and can be used with AD, LDAP, Kerberos, etc... services unrelated to IPA. -- bjs P.S. On the LPIC-3/Samba4 end, I hope everyone recognizes that Red Hat is going a completely different route than the samba4-dc approach, and has patched Samba4's file and other services to support a multi-domain, multi-trust model. Instead of trying to emulate Windows attributes in an AD forest with its own, Windows-centric schema, Red Hat is using a separate, POSIX (UNIX/Linux) schema and domain model in IdM (IPA). It then establishes an AD Forest Trust when AD interoperability is required. That way the "IPA Domain" (POSIX domain) has its own schema and attributes (where "UNIX/Linux" groups and servers "live"), and the "AD Forest(s)" (Windows domains) have their own schema and attributes (where "Windows" groups and services "live") I.e., all IPA does is leverage the existing AD Forest model, because even AD admins cannot all agree on what schema and attributes Windows domains should have either, including trusts and related "best practices". E.g., AD Forest1 "security group" (with users) is added to AD Forest2 "domain local group" which is applied as an access control entry on the actual resource in AD Forest2 they wish to access. In the same regard, the AD Forest2 could actually be an IPA Domain with a group that is assigned to a Samba resource, and vice-versa. -- Bryan J Smith - UCF '97 Engr - http://www.linkedin.com/in/bjsmith ----------------------------------------------------------------- "In a way, Bortles is the personification of the UCF football program. Each has many of the elements that everyone claims to want, and yet they are nobody's first choice. Coming out of high school, Bortles had the size and the arm to play at a more prestigious program. UCF likewise has the market size and the talent base to play in a more prestigious conference than the American Athletic. But timing and circumstances conspired to put both where they are now." -- Andy Staples, CNN-Sports Illustrated On Sat, Aug 3, 2013 at 4:57 AM, Harald Maaßen <har...@nwa-net.de> wrote: > Hi everyone, > > I know, that it is a little bit late for changes to LPIC-2 Version 4, > but wouldn't it be usefull to change the order under Topic 210 like this: > > Topic 210: Network Client Management > 210.1 DHCP configuration (weight: 2) > 210.2 Configuring an OpenLDAP server (weight: 4) > 210.3 LDAP client usage (weight: 2) > 210.4 PAM authentication (weight: 3) > > That would give some didactic advantage for books and other > coursematerials, because: > 1. Install the LDAP-Server > 2. Use it for practice with LDAP-Client > 3. Integrate 1. and 2. with PAM > > What do you think? > > Best regards > Harald > > > _______________________________________________ > lpi-examdev mailing list > lpi-examdev@lpi.org > http://list.lpi.org/cgi-bin/mailman/listinfo/lpi-examdev >
_______________________________________________ lpi-examdev mailing list lpi-examdev@lpi.org http://list.lpi.org/cgi-bin/mailman/listinfo/lpi-examdev