ldap-sysaccount
Name :
ldap-sysaccount
Category : service
Type : docker
Channel : community
Creates LDAP system users (used by service to connect to LDAP, to access LDAP service and search for application users)
Command
ldap-sysaccounts
role is called in context of a particular <service>
to establish LDAP system user which is later on used to connect to LDAP
athena-services <service>
Infrastructure requirements
Preconditions
athena-infrastructure backoffice
Service Requirements
Preconditions
athena-services freeipa
Parameters
ldap_user
- LDAP system user name (for example: gateway.ldap)
Secrets
Please see platform secrets for more details.
passwords/users/<owner>-<env>-<ldap_user>
-<ldap_user>
password (for example~/git/athena/ansible-data-nft/passwords/users/athena-nft-gateway.ldap
)
Example
In Backoffice host play before installing gateway:
-
role: ldap-sysaccount
ldap_user: "{{gateway_ldap_user}}"
tags:
- gateway
Testing conenctivity
Substitute <service>
, <owner>
, <environment>
and <route53domain>
as necessary.
In Athena client console:
PASS=$(cat $ANSIBLE_DATA/passwords/users/<owner>-<environment>-<service>.ldap) && ldapsearch -h ldap.service.consul -p 20389 -c -x -D "uid=<service>.ldap,cn=sysaccounts,cn=etc,dc=<route53domain1>,dc=<route53domain2>" -w "$PASS" -b "cn=users,cn=accounts,dc=<route53domain1>,dc=<route53domain2>" -o ldif-wrap=512
For example:
PASS=$(cat $ANSIBLE_DATA/passwords/users/athena-nft-gateway.ldap) && ldapsearch -h ldap.service.consul -p 20389 -c -x -D "uid=gateway.ldap,cn=sysaccounts,cn=etc,dc=athenapaas,dc=com" -w "$PASS" -b "cn=users,cn=accounts,dc=athenapaas,dc=com" -o ldif-wrap=512