# openssl pkcs7 -print_certs -in eternalcenter.p7b -out eternalcenter.crt
(补充:这里以将 SSL 证书公钥 eternalcenter.p7b 转换为 SSL 证书公钥 eternalcenter.crt 为例)
# openssl pkcs7 -print_certs -in eternalcenter.p7b -out eternalcenter.crt
(补充:这里以将 SSL 证书公钥 eternalcenter.p7b 转换为 SSL 证书公钥 eternalcenter.crt 为例)
> cat /proc/cmdline
BOOT_IMAGE=/vmlinuz-6.4.0-150600.23.50-default root=/dev/mapper/vg-lv resume=/dev/disk/by-uuid/52g36p8s-29l6-2g4l-meqo-5o30l48s4839 splash=silent quiet mitigations=auto audit_backlog_limit=8192 audit=1 rd.shell=0 showopts LANG=C crashkernel=186M,high
# loginctl -a
SESSION UID USER SEAT TTY
27 1001 mingyuzhu pts/0
(
补充:从输出结果可以看出
1) 会话\进程的 SESSION 号码为 27
2) 创建会话\进程的用户 UID 是 1001
3) 创建会话\进程的用户是 mingyuzhu
4) 创建会话\进程的 SEAT TTY 是 pts/0
)
# loginctl terminate-session 27
(补充:这里以关闭 SESSION 号码是 27 的会话\进程为例)
# loginctl -a | grep mingyuzhu| awk '{print "loginctl terminate-session "$1;system("loginctl terminate-session "$1"")}'
# loginctl -a | grep mingyuzhu| awk '{print "loginctl terminate-session "$1;system("loginctl terminate-session "$1"")}' > /dev/null
或者:
# loginctl -a | grep mingyuzhu| `awk '{print "loginctl terminate-session "$1;system("loginctl terminate-session "$1"")}'`
# hostname -f
node0.eternalcenter.com
(补充:从这里可以看出本服务器已经使用了全域名 node1.eternalcenter.com)
# yum install sssd
# realm join eternalcenter.com -U eternalcenter
(补充:这里以通过认证域账号 eternalcenter 加入域 eternalcenter.com 为例)
# cat /var/log/sssd/sssd_ad001.siemens.net.log | tail -200
(
补充:当出现类似以下的信息时,则代表 Security Services Daemon (SSSD) 已设置成功
......
......All data has been sent!
......
......Sending nsupdate data complete
......
)
# vim /etc/sssd/sssd.conf
将部分内容修改如下:
......
access_provider = simple
simple_allow_users = acount1@eternalcenter.com, acount2@eternalcenter.com, acount3@eternalcenter.com
......
(补充:这里以只让域账号 acount1@eternalcenter.com、acount2@eternalcenter.com 和 acount3@eternalcenter.com 登录本服务器为例)
# systemctl restart sssd
# cat /etc/crypto-policies/back-ends/krb5.config
aes128-cts-hmac-sha256-128 aes256-cts-hmac-sha384-192
(补充:从这里的输出结果可以看出,目前使用的后台加密方式有 aes128-cts-hmac-sha256-128 aes256-cts-hmac-sha384-192)
# vi /etc/crypto-policies/back-ends/krb5.config