realmrealm — Manage enrollment in realms |
realm discover
[realm-name]
realm join
[-U user] [realm-name]
realm leave
[-U user] [realm-name]
realm list
realm permit
[-ax] [-R realm] {user@domain...}
realm deny
-a [-R realm]
realm is a command line tool that can be used to manage enrollment in kerberos realms, like Active Directory domains or IPA domains.
See the various sub commands below. The following global options can be used:
|
Run in install mode. This makes realmd chroot into the directory specified by an absolute path and place files in appropriate locations for use during an installer. No packages will be installed or services will be started when running in this mode. |
|
Run in unattended mode without prompting for input. |
|
Display verbose diagnostics while doing running commands. |
Discover a realm and its capabilities.
$ realm discover
$ realm discover domain.example.com
After discovering a realm, its name, type and capabilities are displayed.
If no domain is specified, then the domain assigned through DHCP is used as a default.
The following options can be used:
|
Show all discovered realms (in various configurations). |
|
Only discover realms for which we can
use the given client software. Possible values include
|
|
Only show the names of the discovered realms. |
|
Only discover realms which run the
given server software. Possible values include
|
|
Only discover realms for which the given
membership software can be used to subsequently perform enrollment.
Possible values include |
|
See option description in the section called “Join”. |
Configure the local machine for use with a realm.
$ realm join domain.example.com
$ realm join --user=admin --computer-ou=OU=Special domain.example.com
The realm is first discovered, as we would with the
discover
command. If no domain is specified, then the
domain assigned through DHCP is used as a default.
After a successful join, the computer will be in a state where it is able to resolve remote user and group names from the realm. For kerberos realms, a computer account and host keytab is created.
Joining arbitrary kerberos realms is not supported. The realm must have a supported mechanism for joining from a client machine, such as Active Directory or IPA.
If the domain has been preconfigured, and unless --user
is explicitly specified, an automatic join is attempted first.
Note that the --user
, --no-password
,
and --one-time-password
options are mutually exclusive.
At most one of them can be specified.
It is generally possible to use kerberos credentials to perform
a join operation. Use the kinit command to
acquire credentials prior to starting the join. Do not specify the
--user
argument, the user will be selected automatically
from the credential cache. The realm respects the
KRB5_CCACHE
environment variable, but uses the default
kerberos credential cache if it's not present. Not all types of servers
can be joined using kerberos credentials, some (like IPA) insist on
prompting for a password.
The following options can be used:
|
Do not perform UID/GID mapping for users and groups, but expect these identifiers to be present in the domain already. |
|
Only join realms for which we can
use the given client software. Possible values include
|
|
The distinguished name of an organizational unit to create the computer account. The exact format of the distinguished name depends on the client software and membership software. You can usually omit the root DSE portion of distinguished name. This is an Active Directory specific option. |
|
The software to use when joining to the
realm. Possible values include |
|
This option only applies to Active Directory realms. Specify this option to override the default name used when creating the computer account. The system's FQDN will still be saved in the dNSHostName attribute. Specify the name as a string of 15 or fewer characters that is a valid NetBIOS computer name. |
|
Perform the join automatically without a password. |
|
Perform the join using a one time password specified on the command line. This is not possible with all types of realms. |
|
The name of the operation system of the client. When joining an AD domain the value is store in the matching AD attribute. |
|
The version of the operation system of the client. When joining an AD domain the value is store in the matching AD attribute. |
|
Only join realms for run the
given server software. Possible values include
|
|
The user name to be used to authenticate with when joining the machine to the realm. You will be prompted for a password. |
|
Set the
AD makes a distinction between user and service
principals. Only with user principals you can request a
Kerberos Ticket-Granting-Ticket (TGT), i.e. only user
principals can be used with the kinit
command. By default the user principal and the canonical
principal name of an AD computer account is
If there are applications which are not aware of
the AD default and are using a hard-coded default
principal the |
|
Use the ldaps port when connecting to AD where possible. In general this option is not needed because realmd itself only read public information from the Active Directory domain controller which is available anonymously. The supported membership software products will use encrypted connections protected with GSS-SPNEGO/GSSAPI which offers a comparable level of security than ldaps. This option is only needed if the standard LDAP port (389/tcp) is blocked by a firewall and only the LDAPS port (636/tcp) is available. Given that and to lower the initial effort to discover a remote domain realmd does not require a strict certificate check. If the validation of the LDAP server certificate fails realmd will continue to setup the encrypted connection to the LDAP server. If this option is set to
|
|
Run the join operation but do not touch the local configuration of the client except adding new Kerberos keys to the keytab. The purpose of this option is to synchronize the keytab entries with the ones stored in AD or recreate the computer object in AD without changing the local configuration which might contain changes which would get overwritten by a fully leave/join cycle. If running realm join with this options does not help to fix issues it is recommended to call realm leave followed by realm join to enforce a fresh configuration with default settings. Since this might overwrite manual changes to the related configuration files it is recommend to save those change before running the commands. This options is only available when joining AD domains. |
Deconfigure the local machine for use with a realm.
$ realm leave
$ realm leave domain.example.com
If no realm name is specified, then the first configured realm will be used.
The following options can be used:
|
Only leave the realm which is using
the given client software. Possible values include
|
|
Only leave the realm which is using the
given server software. Possible values include
|
|
Remove or disable computer account from the directory while leaving the realm. This will usually prompt for a pasword. |
|
The user name to be used to authenticate
with when leaving the realm. You will be prompted for a
password. Implies |
|
See option description in the section called “Join”. |
List all the discovered and configured realms.
$ realm list
By default, realms that have been discovered, but not configured (using
the join
command), are not displayed. Also, by default, the
list of realm details displayed is verbose. The options below can be used to
change this default behavior
The following options can be used:
|
Show all discovered realms (whether or not they have been configured). |
|
Display only realm names (as opposed to verbose output). |
Permit local login by users of the realm.
$ realm permit --all $ realm permit user@example.com $ realm permit DOMAIN\\User2 $ realm permit --withdraw user@example.com
The current login policy and format of the user names can be seen by using the realm list command.
The following options can be used:
|
Permit logins using realm accounts on the local machine according to the realm policy.This usually defaults to allowing any realm user to log in. |
|
Treat the specified names as groups rather than user login names. Permit login by users in the specified groups. |
|
Specify the of the realm to change login policy for. |
|
Remove a login from the list of realm accounts permitted to log into the machine. |
Deny local login by realm accounts.
$ realm deny --all
This command prevents realm accounts from logging into the local machine. Use realm permit to restrict logins to specific accounts.
The following options can be used:
|
This option should be specified |
|
Specify the name of the realm to deny users login to. |