Univention Corporate Server

Extended domain services documentation

Table of Contents

1. Integration of Ubuntu clients into a UCS domain
1.1. Integration into the LDAP directory and the SSL certificate authority
1.2. Configuration of the System Security Services Daemon (SSSD)
1.3. Configuring user logins
1.4. Kerberos integration
1.5. Limitations of the Ubuntu domain integration
1.6. Additional references
2. Integration of Linux/Unix systems into a UCS domain
2.1. Managing the systems in the Univention Management Console
2.2. Configuration of the name resolution
2.3. Configuration of the time server
2.4. Access to user and group information of the UCS domain
2.5. Integrating into Kerberos
2.6. Accessing a UCS print server
3. Advanced SSL certificate handling
3.1. Managing additional certificates with univention-certificate
3.1.1. Storage of the certificates
3.1.2. Displaying the certificates
3.1.3. Checking the validity of a certificate
3.1.4. Revoking a certificate
3.1.5. Creating a certificate
3.2. Signing of certificate signing requests by the UCS certificate authority

Chapter 1. Integration of Ubuntu clients into a UCS domain

Univention Corporate Server allows the integration of Ubuntu clients. Initially a standard Ubuntu installation needs to be performed. The following section describe the configuration changes, which need to be made to integrate the Ubuntu client into the UCS domain. After successful integration users can authenticate on the Ubuntu clients with their standard UCS domain password and user name.

This configuration has been tested with Ubuntu 14.04 LTS as well as Kubuntu 14.04 LTS.


In case a command fails or does not return the expected output, please make sure that all configuration options and files are entered and have been written as shown in this document. For example, some text editors do not preserve the indentation which is required for some config files.

1.1. Integration into the LDAP directory and the SSL certificate authority

After Ubuntu has been installed, some of it's configuration files need to be modified. To simplify the setup, the default configuration of the UCS master domain controller should be copied to the Ubuntu system, for example:

# Become root
sudo bash

# Set the IP address of the UCS DC Master, in this example
export MASTER_IP=

mkdir /etc/univention
ssh root@${MASTER_IP} ucr shell | 
 grep -v ^hostname= >/etc/univention/ucr_master
echo "master_ip=${MASTER_IP}" >>/etc/univention/ucr_master
chmod 660 /etc/univention/ucr_master
. /etc/univention/ucr_master

echo "${MASTER_IP} ${ldap_master}" >>/etc/hosts

# Exit sudo bash

In the default configuration of UCS only authenticated users can search in the LDAP directory. As such, the Ubuntu client needs an account in the UCS domain to gain read access to the LDAP directory:

# Become root
sudo bash

# Set some environment variables
. /etc/univention/ucr_master

# Download the SSL certificate
mkdir -p /etc/univention/ssl/ucsCA/
wget -O /etc/univention/ssl/ucsCA/CAcert.pem \

# Create an account and save the password
password="$(tr -dc A-Za-z0-9_ </dev/urandom | head -c20)"
if [ "$version_version" = 3.0 ] && [ "$version_patchlevel" -lt 2 ]
    ssh root@${ldap_master} udm computers/managedclient create \
        --position "cn=computers,${ldap_base}" \
        --set name=$(hostname) --set password="${password}"
    ssh root@${ldap_master} udm computers/ubuntu create \
        --position "cn=computers,${ldap_base}" \
        --set name=$(hostname) --set password="${password}" \
        --set operatingSystem="$(lsb_release -is)" \
        --set operatingSystemVersion="$(lsb_release -rs)"
printf '%s' "$password" >/etc/ldap.secret
chmod 0400 /etc/ldap.secret

# Create ldap.conf
cat >/etc/ldap/ldap.conf <<__EOF__
TLS_CACERT /etc/univention/ssl/ucsCA/CAcert.pem
URI ldap://$ldap_master:7389
BASE $ldap_base

# Exit sudo bash

1.2. Configuration of the System Security Services Daemon (SSSD)

SSSD provides a set of daemons to manage access to remote directories and authentication mechanisms.

# Become root
sudo bash

# Set some environment variables
. /etc/univention/ucr_master

# Install SSSD based configuration
DEBIAN_FRONTEND=noninteractive apt-get -y install sssd

# Create sssd.conf
cat >/etc/sssd/sssd.conf <<__EOF__
config_file_version = 2
reconnection_retries = 3
sbus_timeout = 30
services = nss, pam, sudo
domains = $kerberos_realm

reconnection_retries = 3

reconnection_retries = 3

auth_provider = krb5
krb5_kdcip = ${master_ip}
krb5_realm = ${kerberos_realm}
krb5_server = ${ldap_master}
krb5_kpasswd = ${ldap_master}
id_provider = ldap
ldap_uri = ldap://${ldap_master}:7389
ldap_search_base = ${ldap_base}
ldap_tls_reqcert = never
ldap_tls_cacert = /etc/univention/ssl/ucsCA/CAcert.pem
cache_credentials = true
enumerate = true
ldap_default_bind_dn = cn=$(hostname),cn=computers,${ldap_base}
ldap_default_authtok_type = password
ldap_default_authtok = $(cat /etc/ldap.secret)
chmod 600 /etc/sssd/sssd.conf

# Install auth-client-config
DEBIAN_FRONTEND=noninteractive apt-get -y install auth-client-config

# Create an auth config profile for sssd
cat >/etc/auth-client-config/profile.d/sss <<__EOF__
nss_passwd=   passwd:   compat sss
nss_group=    group:    compat sss
nss_shadow=   shadow:   compat
nss_netgroup= netgroup: nis

        auth [success=3 default=ignore] pam_unix.so nullok_secure try_first_pass
        auth requisite pam_succeed_if.so uid >= 500 quiet
        auth [success=1 default=ignore] pam_sss.so use_first_pass
        auth requisite pam_deny.so
        auth required pam_permit.so

        account required pam_unix.so
        account sufficient pam_localuser.so
        account sufficient pam_succeed_if.so uid < 500 quiet
        account [default=bad success=ok user_unknown=ignore] pam_sss.so
        account required pam_permit.so

        password sufficient pam_unix.so obscure sha512
        password sufficient pam_sss.so use_authtok
        password required pam_deny.so

        session required pam_mkhomedir.so skel=/etc/skel/ umask=0077
        session optional pam_keyinit.so revoke
        session required pam_limits.so
        session [success=1 default=ignore] pam_sss.so
        session required pam_unix.so
auth-client-config -n -a -p sss

# Restart sssd
restart sssd

# Exit sudo bash

The commands getent passwd and getent group should now also display all users and groups of the UCS domain.

1.3. Configuring user logins

The home directory of a user should be created automatically during login:

# Become root
sudo bash

cat >/usr/share/pam-configs/ucs_mkhomedir <<__EOF__
Name: activate mkhomedir
Default: yes
Priority: 900
Session-Type: Additional
    required    pam_mkhomedir.so umask=0022 skel=/etc/skel

DEBIAN_FRONTEND=noninteractive pam-auth-update


During login users should also be added to some system groups:

# Become root
sudo bash

echo '*;*;*;Al0000-2400;audio,cdrom,dialout,floppy,plugdev,adm' \

cat >>/usr/share/pam-configs/local_groups <<__EOF__
Name: activate /etc/security/group.conf
Default: yes
Priority: 900
Auth-Type: Primary
    required    pam_group.so use_first_pass

DEBIAN_FRONTEND=noninteractive pam-auth-update


By default the Ubuntu login manager only displays a list of local users during login. After adding the following lines an arbitrary user name can be used:

# Become root
sudo bash

# Add a field for a user name, disable user selection at the login screen
mkdir /etc/lightdm/lightdm.conf.d
cat >>/etc/lightdm/lightdm.conf.d/99-show-manual-userlogin.conf <<__EOF__


Kubuntu 14.04 uses AccountService, a D-Bus interface for use account management, which ignores the /etc/lightdm.conf file. Since there is no config file for AccountService the login theme needs to be changed to classic under System Settings -> Login Screen (LightDM).

With these settings the login for domain members should be possible after a restart of LightDM or a reboot.

1.4. Kerberos integration

Every UCS domain provides a Kerberos domain. Since Kerberos relies on DNS, the Ubuntu client should use a UCS domain controller as its DNS server. The following steps provide an example configuration for Kerberos:

# Become root
sudo bash

# Set some environment variables
. /etc/univention/ucr_master

# Install required packages
DEBIAN_FRONTEND=noninteractive apt-get install -y heimdal-clients

# Default krb5.conf
cat >/etc/krb5.conf <<__EOF__
    default_realm = $kerberos_realm
    kdc_timesync = 1
    ccache_type = 4
    forwardable = true
    proxiable = true

$kerberos_realm = {
   kdc = $master_ip $ldap_master
   admin_server = $master_ip $ldap_master

# Stop and disable the avahi daemon
stop avahi-daemon
sed -i 's|start on (|start on (never and |' /etc/init/avahi-daemon.conf

# Synchronize the time with the UCS system
ntpdate -bu $ldap_master

# Test Kerberos
kinit Administrator

# Requires domain password
krsh Administrator@$ldap_master ls /etc/univention

# Destroy the kerberos ticket


1.5. Limitations of the Ubuntu domain integration

It is currently not possible to change the user password at the LightDM login manager. Instead, the password can be changed via the kpasswd command after login or via the UMC module Change password.

Chapter 2. Integration of Linux/Unix systems into a UCS domain

These are general instructions for the integration of Unix/Linux-based non-UCS systems - referred to in the following simply as Unix systems - in the trust context of the UCS domain.

The integration of Ubuntu clients is documented with example step-by-step instructions in Chapter 1.

The integration of Mac OS X clients is documented with example step-by-step instructions in the UCS manual. Mac OS systems use a deviating domain integration based on Samba 4.

Not all integration steps need to be performed. In this way, for example, a Unix system can merely be integrated in the IP management and access the NTP server without integrating the system in the UCS user management (e.g., if it is a database server on which no user login is performed anyway).

2.1. Managing the systems in the Univention Management Console

A Computer: Linux object can be created in the UMC computer management. This allows the integration of the Unix system in the DNS/DHCP and network administration of the Univention Management Console

If the Nagios support is enabled under [Options], remote Nagios checks can also be applied against the system.

2.2. Configuration of the name resolution

The Unix system should use a name server from the UCS domain: All UCS domain controllers (i.e., master domain controller, backup domain controller and slave domain controller) operate a DNS server. One or more of these UCS system should be entered in the /etc/resolv.conf, e.g.:

domain  example.com

2.3. Configuration of the time server

All UCS domain controllers (i.e., master domain controller, backup domain controller and slave domain controller) operate a NTP server.

The configuration differs depending on the NTP software used, but is set under /etc/ntp.conf on most Linux systems, e.g.:

server master.example.com
server backup.example.com

2.4. Access to user and group information of the UCS domain

The Name Service Switch (NSS) is an interface for configuring the data sources for users, groups and computers. NSS is present on all Linux versions and most Unix systems.

If the Unix system used provides support for an NSS module for LDAP access - as is the case in most Linux distributions - user and group information can be read out of the UCS LDAP directory.

The configuration files of the NSS LDAP module differ depending on the Linux/Unix version.

As a general rule, the following settings must be set there:

  • The DN of the LDAP base of the UCS domain (saved in the Univention Configuration Registry variable ldap/base on UCS servers) needs to be configured on the system.
  • The LDAP server, ports and authentication credentials to be used. The fully qualified domain names of one or more UCS domain controllers should be entered here. In the default setting, UCS LDAP servers only allow authenticated LDAP access.
  • In the standard setting, only TLS-secured access is possible on UCS-LDAP servers. The accessing Unix system must therefore use the root certificate of the UCS-CA. The certificate can be found on the master domain controller in the file /etc/univention/ssl/ucsCA/CAcert.pem and can be copied into any directory, e.g., /etc/ucs-ssl/. The UCS root certificate must then be configured in the LDAP configuration files. If the Unix system uses OpenLDAP as the LDAP implementation, it is usually the file /etc/openldap/ldap.conf or /etc/ldap/ldap.conf. The line for OpenLDAP is as follows:

    TLS_CACERT /etc/ucs-ssl/CAcert.pem

If the NSS LDAP service has been set up correctly, the following two commands should output all users and groups:

getent passwd
getent group

2.5. Integrating into Kerberos

UCS employs the Kerberos implementation Heimdal. For this reason, Heimdal should also be used to access the Kerberos realm on the Unix system. Only the Heimdal client libraries need to be installed on the Unix system.

Kerberos requires correct time synchronisation, see Section 2.2.

The configuration is performed in the /etc/krb5.conf file on most systems. Here is an example configuration:

  • KERBEROSREALM must be replaced by the name of the UCS Kerberos realm (saved in the Univention Configuration Registry variable kerberos/realm).
  • MASTERIP must be replaced by the IP address of the master domain controller.
  • MASTERFQDN must be replaced by the fully qualified domain name of the master domain controller.

    default_realm = KERBEROSREALM
    default_tkt_enctypes = arcfour-hmac-md5 des-cbc-md5 des3-hmac-sha1 \
       des-cbc-crc des-cbc-md4 des3-cbc-sha1 aes128-cts-hmac-sha1-96   \
    permitted_enctypes = des3-hmac-sha1 des-cbc-crc des-cbc-md4 \
       des-cbc-md5 des3-cbc-sha1 arcfour-hmac-md5               \
       aes128-cts-hmac-sha1-96 aes256-cts-hmac-sha1-96
    kdc_timesync = 1
    ccache_type = 4
    forwardable = true
    proxiable = true
    kdc_timesync = 1

   admin_server = MASTERIP MASTERFQDN
   kpasswd_server = MASTERIP MASTERFQDN

The Heimdal PAM module then needs to be installed. In general, the installation of the module should adapt the PAM configuration automatically.

Then Kerberos authentication during login should work via PAM and password changes should be possible via kpasswd.

To allow SSH logins via Kerberos, the options GSSAPIAuthentication and GSSAPIKeyExchange should be set to yes in the configuration file of the SSH daemon (typically /etc/ssh/sshd_config).

2.6. Accessing a UCS print server

UCS uses the Common Unix Printing System (CUPS) to implement print services. The Unix system can use the UCS print servers by installing the CUPS client programs. In addition the CUPS server needs to be configured for the clients, typically in the configuration file /etc/cups/client.conf, e.g.:

ServerName printserver.example.com

Chapter 3. Advanced SSL certificate handling

3.1. Managing additional certificates with univention-certificate

Every UCS domain has its own SSL certificate authority. The SSL certificates are created automatically for all UCS systems during the installation (master domain controller) or during the domain join (all other system roles).

The command univention-certificate can be used to manage these certificates, e.g., if it proves necessary to create a certificate for the integration of an external system.

3.1.1. Storage of the certificates

The certificates are stored in the directory /etc/univention/ssl/ on the master domain controller and synchronised on all backup domain controller systems. A subdirectory with the name of the certificate is kept in the directory /etc/univention/ssl/ for every certificate, which contains the following files:

This file contains the original request with which the certificate was created.
This file contains the OpenSSL configuration at the time the certificate was created.
The file represents the actual certificate.
The file contains the private key for the certificate.

3.1.2. Displaying the certificates

The following command is used to display a list of all the available, valid certificates:

univention-certificate list

An individual SSL certificate can be displayed with the following command:

univention-certificate dump -name fullyqualifiedhostname

3.1.3. Checking the validity of a certificate

This command checks whether a certificate is valid or invalid:

univention-certificate check -name fullyqualifiedhostname

A certificate may be invalid because it has either been revoked or has expired.

3.1.4. Revoking a certificate

The following command is used to revoke a certificate:

univention-certificate revoke -name fullyqualifiedhostname

It is then no longer valid, but remains stored in the file system. Certificates of UMC computer objects do not need to be revoked manually.

3.1.5. Creating a certificate

The following command can be used to create a new certificate:

univention-certificate new -name fullyqualifiedhostname

The fully qualified domain name of the computer should be given as the name. In the default setting the certificate is valid for five years. The standard value can be changed by setting the Univention Configuration Registry variable ssl/default/days.

3.2. Signing of certificate signing requests by the UCS certificate authority

A certificate signing request (CSR) is a request submitted to a certificate authority (CA) to create a digital signature. A CSR typically occurs in the form of a file. This section describes how a CSR is signed by the UCS CA.

CERTIFICATE is the file name of the certificate to be created.

REQUEST is the file with the CSR in either PEM or DER format. A file in PEM format is a text file containing a Base64-encoded block enclosed between BEGIN CERTIFICATE and END CERTIFICATE. A request in binary DER format must be first converted to the PEM format with the following command:

openssl req \
  -inform  der -in  request.der \
  -outform pem -out req.pem

The following command then processes the CSR and creates the certificate:

openssl ca -batch -config /etc/univention/ssl/openssl.cnf \
  -passin file:/etc/univention/ssl/password