Provided by: freeipa-server_4.7.0~pre1+git20180411-2ubuntu2_amd64 bug

NAME

       ipa-replica-install - Create an IPA replica

SYNOPSIS

   DOMAIN LEVEL 0
       ipa-replica-install [OPTION]... [replica_file]

   DOMAIN LEVEL 1
       ipa-replica-install [OPTION]...

DESCRIPTION

       Configures a new IPA server that is a replica of the server. Once it has been created it is an exact copy
       of  the  original  IPA  server  and  is  an  equal  master.  Changes made to any master are automatically
       replicated to other masters.

       To create a replica in a domain at domain level 0, you need to provide an replica file. The  replica_file
       is created using the ipa-replica-prepare utility.

       To  create a replica in a domain at domain level 1, you don't have to provide a replica file, the machine
       only needs to be enrolled in the FreeIPA domain first. This process of turning  the  IPA  client  into  a
       replica is also referred to as replica promotion.

       If you're starting with an existing IPA client, simply run ipa-replica-install to have it promoted into a
       replica.

       To promote a blank machine into a replica, you have two options, you can either run ipa-client-install in
       a  separate  step,  or pass the enrollment related options to the ipa-replica-install (see DOMAIN LEVEL 1
       CLIENT ENROLLMENT OPTIONS). In the latter case, ipa-replica-install will join  the  machine  to  the  IPA
       realm automatically and will proceed with the promotion step.

       If  the  installation  fails  you  may  need to run ipa-server-install --uninstall and ipa-client-install
       before running ipa-replica-install again.

       The installation will fail if the host you are installing the replica on exists as a host in  IPA  or  an
       existing replication agreement exists (for example, from a previously failed installation).

       A replica should only be installed on the same or higher version of IPA on the remote system.

OPTIONS

   DOMAIN LEVEL 1 OPTIONS
       -P, --principal
              The  user  principal which will be used to promote the client to the replica and enroll the client
              itself, if necessary.

       -w, --admin-password
              The Kerberos password for the given principal.

   DOMAIN LEVEL 1 CLIENT ENROLLMENT OPTIONS
       To install client and promote it to replica using a host keytab or One Time Password, the host  needs  to
       be  a member of ipaservers group. This requires to create a host entry and add it to the host group prior
       replica installation.

       --server, --domain, --realm  options are autodiscovered via DNS  records  by  default.  See  manual  page
       ipa-client-install(1) for further details about these options.

       -p PASSWORD, --password=PASSWORD
              One Time Password for joining a machine to the IPA realm.

       -k, --keytab
              Path to host keytab.

       --server
              The fully qualified domain name of the IPA server to enroll to.

       -n, --domain=DOMAIN
              The  primary  DNS  domain of an existing IPA deployment, e.g. example.com.  This DNS domain should
              contain the SRV records generated by the IPA server installer.

       -r, --realm=REALM_NAME
              The Kerberos realm of an existing IPA deployment.

       --hostname
              The hostname of this machine (FQDN). If specified,  the  hostname  will  be  set  and  the  system
              configuration will be updated to persist over reboot.

       --force-join
              Join the host even if it is already enrolled.

   DOMAIN LEVEL 0 OPTIONS
       -p PASSWORD, --password=PASSWORD
              Directory Manager (existing master) password

       -w, --admin-password
              Admin user Kerberos password used for connection check

   BASIC OPTIONS
       --ip-address=IP_ADDRESS
              The IP address of this server. If this address does not match the address the host resolves to and
              --setup-dns  is not selected the installation will fail. If the server hostname is not resolvable,
              a record for the hostname and IP_ADDRESS is added to /etc/hosts.  This option can be used multiple
              times to specify more IP addresses of the server (e.g. multihomed and/or dualstacked server).

       --mkhomedir
              Create home directories for users on their first login

       --ntp-server=NTP_SERVER
              Configure chronyd to use this NTP server. This option can be used multiple times and it is used to
              specify exactly one time server.

       --ntp-pool=NTP_SERVER_POOL
              Configure chronyd to use this NTP server pool. This option is meant to be pool of multiple servers
              resolved as one host name. This pool's servers may vary but pool address will be  still  same  and
              chrony will choose only one server from this pool.

       -N, --no-ntp
              Do not configure NTP client (chronyd).

       --no-ui-redirect
              Do not automatically redirect to the Web UI.

       --ssh-trust-dns
              Configure OpenSSH client to trust DNS SSHFP records.

       --no-ssh
              Do not configure OpenSSH client.

       --no-sshd
              Do not configure OpenSSH server.

       --skip-conncheck
              Skip connection check to remote master

       -d, --debug
              Enable debug logging when more verbose output is needed

       -U, --unattended
              An unattended installation that will never prompt for user input

       --dirsrv-config-file
              The path to LDIF file that will be used to modify configuration of dse.ldif during installation of
              the directory server instance

   CERTIFICATE SYSTEM OPTIONS
       --setup-ca
              Install  and configure a CA on this replica. If a CA is not configured then certificate operations
              will be forwarded to a master with a CA installed.

       --no-pkinit
              Disables pkinit setup steps. This is the default and only allowed behavior on domain level 0.

       --dirsrv-cert-file=FILE
              File containing the Directory Server SSL certificate and private key

       --http-cert-file=FILE
              File containing the Apache Server SSL certificate and private key

       --pkinit-cert-file=FILE
              File containing the Kerberos KDC SSL certificate and private key

       --dirsrv-pin=PIN
              The password to unlock the Directory Server private key

       --http-pin=PIN
              The password to unlock the Apache Server private key

       --pkinit-pin=PIN
              The password to unlock the Kerberos KDC private key

       --dirsrv-cert-name=NAME
              Name of the Directory Server SSL certificate to install

       --http-cert-name=NAME
              Name of the Apache Server SSL certificate to install

       --pkinit-cert-name=NAME
              Name of the Kerberos KDC SSL certificate to install

       --skip-schema-check
              Skip check for updated CA DS schema on the remote master

   SECRET MANAGEMENT OPTIONS
       --setup-kra
              Install and configure a KRA on this replica. If a KRA is not configured then vault operations will
              be forwarded to a master with a KRA installed.

   DNS OPTIONS
       --setup-dns
              Configure  an integrated DNS server, create a primary DNS zone  (name  specified  by  --domain  or
              taken from an existing deployment), and fill it with service records necessary for IPA deployment.
              In cases where the IPA server name does not belong to the primary DNS domain and is not resolvable
              using DNS, create a DNS zone containing the IPA server name as well.

              This  option  requires  that you either specify at least one DNS forwarder through the --forwarder
              option or use the --no-forwarders option.

              Note that you can set up a DNS at any time after the initial IPA server install  by  running  ipa-
              dns-install (see ipa-dns-install(1)).  IPA DNS cannot be uninstalled.

       --forwarder=IP_ADDRESS
              Add  a  DNS  forwarder to the DNS configuration. You can use this option multiple times to specify
              more forwarders, but at  least  one  must  be  provided,  unless  the  --no-forwarders  option  is
              specified.

       --no-forwarders
              Do not add any DNS forwarders. Root DNS servers will be used instead.

       --auto-forwarders
              Add DNS forwarders configured in /etc/resolv.conf to the list of forwarders used by IPA DNS.

       --forward-policy=first|only
              DNS  forwarding  policy for global forwarders specified using other options.  Defaults to first if
              no IP address belonging to a private or reserved ranges  is  detected  on  local  interfaces  (RFC
              6303). Defaults to only if a private IP address is detected.

       --reverse-zone=REVERSE_ZONE
              The  reverse  DNS  zone to use. This option can be used multiple times to specify multiple reverse
              zones.

       --no-reverse
              Do not create new reverse DNS zone. If a reverse DNS zone already exists for the subnet,  it  will
              be used.

       --auto-reverse
              Create necessary reverse zones

       --allow-zone-overlap
              Create DNS zone even if it already exists

       --no-host-dns
              Do not use DNS for hostname lookup during installation

       --no-dns-sshfp
              Do not automatically create DNS SSHFP records.

       --no-dnssec-validation
              Disable DNSSEC validation on this server.

   AD TRUST OPTIONS
       --setup-adtrust
              Configure AD Trust capability on a replica.

       --netbios-name=NETBIOS_NAME
              The  NetBIOS name for the IPA domain. If not provided then this is determined based on the leading
              component of the DNS domain name. Running ipa-adtrust-install for a second time with  a  different
              NetBIOS name will change the name. Please note that changing the NetBIOS name might break existing
              trust relationships to other domains.

       --add-sids
              Add  SIDs  to  existing  users  and groups as on of final steps of the ipa-adtrust-install run. If
              there a many existing users and groups and a couple of replicas in the environment this  operation
              might  lead  to a high replication traffic and a performance degradation of all IPA servers in the
              environment. To avoid this the SID generation can be run  after  ipa-adtrust-install  is  run  and
              scheduled independently. To start this task you have to load an edited version of ipa-sidgen-task-
              run.ldif with the ldapmodify command info the directory server.

       --add-agents
              Add  IPA  masters  to  the list that allows to serve information about users from trusted forests.
              Starting with FreeIPA 4.2, a regular IPA master can provide this information to SSSD clients.  IPA
              masters  aren't  added to the list automatically as restart of the LDAP service on each of them is
              required. The host where ipa-adtrust-install is being run is added automatically.

              Note that IPA masters where ipa-adtrust-install wasn't run, can serve information about users from
              trusted forests only if they are enabled via ipa-adtrust-install run on any other IPA  master.  At
              least SSSD version 1.13 on IPA master is required to be able to perform as a trust agent.

       --rid-base=RID_BASE
              First  RID  value  of the local domain. The first Posix ID of the local domain will be assigned to
              this RID, the second to RID+1 etc. See the online help of the idrange CLI for details.

       --secondary-rid-base=SECONDARY_RID_BASE
              Start value of the secondary RID range, which is only used in the case a user and  a  group  share
              numerically the same Posix ID. See the online help of the idrange CLI for details.

       --enable-compat
              Enables  support  for  trusted  domains users for old clients through Schema Compatibility plugin.
              SSSD supports trusted domains natively starting with version 1.9. For platforms that lack SSSD  or
              run  older  SSSD version one needs to use this option. When enabled, slapi-nis package needs to be
              installed and schema-compat-plugin will be configured to provide lookup of users and  groups  from
              trusted  domains  via  SSSD  on  IPA  server.  These  users  and  groups  will  be available under
              cn=users,cn=compat,$SUFFIX and cn=groups,cn=compat,$SUFFIX trees.  SSSD will  normalize  names  of
              users and groups to lower case.

              In  addition  to  providing  these  users  and groups through the compat tree, this option enables
              authentication over LDAP for trusted domain users with DN under compat tree, i.e.  using  bind  DN
              uid=administrator@ad.domain,cn=users,cn=compat,$SUFFIX.

              LDAP  authentication  performed  by  the  compat tree is done via PAM 'system-auth' service.  This
              service  exists  by  default  on   Linux   systems   and   is   provided   by   pam   package   as
              /etc/pam.d/system-auth.   If your IPA install does not have default HBAC rule 'allow_all' enabled,
              then make sure to define in IPA special service called 'system-auth' and create an  HBAC  rule  to
              allow access to anyone to this rule on IPA masters.

              As  'system-auth'  PAM service is not used directly by any other application, it is safe to use it
              for trusted domain users via compatibility path.

EXIT STATUS

       0 if the command was successful

       1 if an error occurred

       3 if the host exists in the IPA server or a replication agreement to the remote master already exists

FreeIPA                                            Dec 19 2016                            ipa-replica-install(1)