Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/mahdi22/linux_joindomain
Role Ansible for automatically Join Domain Active Directory using sssd for Linux RHEL/CentOS 7 and 8, Debian , Ubuntu and samba winbind for RHEL/CentOS 6
https://github.com/mahdi22/linux_joindomain
active-directory ansible ansible-role centos debian linux realm redhat role-ansible samba sssd ubuntu winbind
Last synced: 7 days ago
JSON representation
Role Ansible for automatically Join Domain Active Directory using sssd for Linux RHEL/CentOS 7 and 8, Debian , Ubuntu and samba winbind for RHEL/CentOS 6
- Host: GitHub
- URL: https://github.com/mahdi22/linux_joindomain
- Owner: mahdi22
- License: apache-2.0
- Created: 2020-09-25T13:44:49.000Z (over 4 years ago)
- Default Branch: master
- Last Pushed: 2024-07-20T21:58:58.000Z (5 months ago)
- Last Synced: 2024-12-11T17:11:13.836Z (15 days ago)
- Topics: active-directory, ansible, ansible-role, centos, debian, linux, realm, redhat, role-ansible, samba, sssd, ubuntu, winbind
- Language: Jinja
- Homepage: https://galaxy.ansible.com/mahdi22/linux_joindomain
- Size: 30.3 KB
- Stars: 36
- Watchers: 2
- Forks: 23
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
linux_joindomain
This is an ansible role to automaticaly join Linux Machine CentOS and Redhat using sssd, realm, samba and winbind. This role is tested on RedHat/CentOS 7.x, 8.x 6.6 and Ubuntu 24 22 20 18 16 and Debian 10 9# Requirements
- source.list configured and updated for debian servers
- Ansible >= 2.7# Installation
ansible-galaxy install mahdi22.linux_joindomain
# Role Configuration
file: defaults/main.yml
```yaml
#set this variable to True if the managed hosts are bihind a web proxy... default False
use_proxy: False
```
```yaml
proxy_env: []
#Set environmenet variable for web proxy sexample:
# proxy_env:
# http_proxy: http://proxy.local:8080/
# https_proxy: http://proxy.local:8080/
```# Role Variables
file: vars/main.yml
```yaml
Join_User: ADMDOMAIN # Replace ADMDOMAIN with the username domain admin
DomainName: linuxlab.local # Replace linuxlab.local with the domainname
Join_User_Pass: admdomainpassword # Replace admdomainpassword with the username domain admin password
realm: LINUXLAB.LOCAL # replace this value with by Domaine Name
server: linuxlab.local # replace this value with by active directory server
```
file: vars/RedHat-6.yml
```yaml
workgroup: LAB # replace this value with by WORKGROUP
kdc:
- kerberos-1.linuxlab.local:88 # replace this value with by firt Kerberos server name
- kerberos-2.linuxlab.local:88 # replace this value with by second Kerberos server name
- kerberos-3.linuxlab.local:88 # replace this value with by third Kerberos server name
domain_realms:
- .linuxlab.local # replace this value with by domaine name
- linuxlab.local # replace this value with by domaine name
fallback_homedir: '/home/%u'
use_fully_qualified_names: False
```
# Example Playbook
```yaml
- hosts: servers
roles:
- role: mahdi22.linux_joindomain
become: yes
```## Testing
This role is tested on Linux distributions:
- RHEL/CentOS 8
- RHEL/CentOS 7
- RHEL/CentOS 6
- Debian 10
- Debian 9
- Debian 8
- Ubuntu 24.04
- Ubuntu 22.04
- Ubuntu 20.04
- Ubuntu 19.10
- Ubuntu 18.04
- Ubuntu 16.04