标签:
Log in to the oVirt User Portal directly from your web browser.
Procedure 1.1. Logging in to the User Portal
Enter the provided User Portal URL in the address bar of your web browser. The address must be in the format of https://server.example.com/UserPortal
. The login screen displays.
Alternately, enter the provided server address into the web browser, to access the welcome screen. Click User Portal to be directed to the User Portal.
?
Figure 1.1. The User Portal Login Selection Screen
Enter your User Name and Password. Use the Domain drop-down menu to select the correct domain.
?
Figure 1.2. The User Portal Login Screen
Click Login. The list of virtual machines assigned to you displays.
?
Figure 1.3. User Portal
?
Logging out of the User Portal:
Summary
The first time you access the User Portal, you must install the certificate used by oVirt to avoid security warnings.
?
Procedure 1.2. Installing oVirt Certificate in Firefox
Result
You have installed the certificate used by the Red hat Enterprise Virtualization Manager and security warnings no longer appear when you access the User Portal.
A console is a graphical window that allows you to view the start up screen, shut down screen and desktop of a virtual machine, and to interact with that virtual machine in a similar way to a physical machine. In oVirt, the default application for opening a console to a virtual machine is Remote Viewer, which must be installed on the client machine prior to use.
Remote Viewer is an application for opening a graphical console to virtual machines. Remote Viewer is a SPICE client that is included the virt-viewer package provided by the Red Hat Enterprise Linux Workstation (v. 6 for x86_64)
channel.
Procedure 2.1. Installing Remote Viewer on Linux
Run the following command to install the spice-xpi package and dependencies:
# yum install spice-xpi
Run the following command to check whether the virt-viewer package has already been installed on your system:
# rpm -q virt-viewer virt-viewer-0.5.2-18.el6_4.2.x86_64
If the virt-viewer package has not been installed, run the following command to install the package and its dependencies:
# yum install virt-viewer
The SPICE plug-in is now installed. You can now connect to your virtual machines using the SPICE protocol.
The Basic tab enables you to view and use all the virtual machines that are available to you. The screen consists of three areas: the title bar, a virtual machines area, and a details pane. A number of control buttons allow you to work with the virtual machines.
Figure 3.1. The User Portal
The title bar (1) includes the name of the User logged in to the portal and the Sign Out button.
In the virtual machines area, the name of the virtual machines or virtual machine pools assigned to you display (2). The logo of the virtual machine‘s operating system also displays (3). When a virtual machine is powered up, you can connect to it by double-clicking on the virtual machine‘s logo.
On each virtual machine‘s icon, buttons allow you to play, stop or pause a virtual machine. The buttons perform the same functions as buttons on a media player (4).
The status of the virtual machine is indicated by the text below the virtual machine‘s icon - Machine is Ready or Machine is Down.
Clicking on a virtual machine displays the statistics of the selected virtual machine on the details pane to the right (5), including the operating system, defined memory, number of cores and size of virtual drives. You can also configure connection protocol options (6) such as enabling the use of USB devices or local drives.
In the User Portal, virtual machines are represented by icons that indicate both type and status. The icons indicate whether a virtual machine is part of a virtual machine pool or is a standalone Windows or Linux virtual machine. The icons also reflect whether the virtual machine is running or stopped.
The User Portal displays a list of the virtual machines assigned to you. You can turn on one or more virtual machines, connect, and log in. You can access virtual machines that are running different operating systems, and you can use multiple virtual machines simultaneously.
In contrast, if you have only one running virtual machine and have enabled automatic connection, you can bypass the User Portal and log in directly to the virtual machine, similar to how you log in to a physical machine.
To use a virtual machine in the User Portal, you must turn it on and then connect to it. If a virtual machine is turned off, it is grayed out and displays Machine is Down.
You can be assigned an individual virtual machine or assigned to one or more virtual machines that are part of a virtual machine pool. Virtual machines in a pool are all clones of a base template, and have the same operating system and installed applications.
?
Procedure 3.1. Turning on a Virtual Machine
To turn on a standalone virtual machine, select the virtual machine icon and click the button.
?
Figure 3.2. Turn on virtual machine
To take a virtual machine from a pool, select the virtual machine pool icon and click the button.
?
Figure 3.3. Take virtual machine from a pool
If there is an available virtual machine in the pool, an icon for that virtual machine will appear in your list. The rest of this procedure then applies to that virtual machine. If you can take multiple virtual machines from a pool, the icon for the virtual machine pool will change into an icon for the last virtual machine you have taken when you take the maximum number of virtual machines possible for that pool.
The virtual machine powers up.
?
Figure 3.4. Virtual machine powering up
When the virtual machine is powered up, the icon is no longer grayed out. The text displays as Machine is Ready. You are now ready to connect.
?
Figure 3.5. Virtual machine turned on
After a virtual machine has been turned on, you can connect to it, log in, and start work the same way that you would with a physical machine. The text "Machine is Ready" displays on virtual machines that are powered up.
Procedure 3.2. Connecting to a Powered on Virtual Machine
Double-click on the selected virtual machine to connect.
?
Figure 3.6. Connect to Virtual Machine
It is recommended that you log out from a virtual machine before shutting it down, to minimize the risk of data loss. Additionally, if you attempt to forcefully shut down a virtual machine from the User Portal, it might freeze with a status of Powering Down. To gracefully turn off a virtual machine, use the following steps.
Procedure 3.3. Shutting Down a Virtual Machine
The Extended tab graphical interface enables you to access and monitor all the virtual resources that are available to you. Eight elements of the Extended tab are explained below.
Figure 4.1. The Extended Tab
Table 4.1. The Extended Tab
Details Pane Tab Functions:
This chapter describes how to run, connect to and stop virtual machines on the Power User Portal. You can use multiple virtual machines simultaneously, or use machines running different operating systems.
After you have logged into the portal, you can start, stop, or connect to the virtual machines that are displayed.
Summary
This procedure describes how to start a stopped virtual machine, and how to connect to the virtual machine.
Procedure 4.1. Connecting to Virtual Machines
Figure 4.2. Virtual machine turned off
The Stop symbol next to the virtual machine‘s name changes to a Powering Up symbol.When the virtual machine is turned on, the Play symbol displays next to the virtual machine‘s name.
?
Figure 4.3. Virtual machine powering up
Click the Console button to connect to the virtual machine.
?
Figure 4.4. Connect to virtual machine
A console window of the virtual machine displays. You can now use the virtual machine in the same way that you would use a physical desktop.
Result
You have started a stopped virtual machine and connected to it.
If you attempt to turn off a virtual machine from the User Portal, it might freeze with a status of Powering Down, indicating that it has not completely shut down. Use the following procedure to gracefully turn off a virtual machine from within the User Portal.
Summary
This procedure explains how to turn off a virtual machine from the User Portal.
Procedure 4.2. Turning Off a Virtual Machine from the User Portal
Result
You have turned off a virtual machine.
Summary
This procedure explains how to reboot a virtual machine from the User Portal.
?
Procedure 4.3. Rebooting a Virtual Machine from the User Portal
Result
You have rebooted a virtual machine.
Summary
You can create a virtual machine using a blank template and configure all of its settings.
Procedure 4.4. Creating a Virtual Machine
Click the New VM button to open the New Virtual Machine window.
?
Figure 4.5. The New Virtual Machine Window
Result
The new virtual machine is created and displays in the list of virtual machines with a status of Down
. Before you can use this virtual machine, add at least one network interface and one virtual disk, and install an operating system.
Summary
You can create virtual machines based on templates. This allows you to create virtual machines that are pre-configured with an operating system, network interfaces, applications and other resources.
Procedure 4.5. Creating a Virtual Machine Based on a Template
Click the Resource Allocation tab.
?
Figure 4.6. Provisioning - Thin
Result
The virtual machine is created and displayed in the list in the Virtual Machines tab. You can now log on to the virtual machine and begin using it, or assign users to it.
Summary
Cloned virtual machines are similar to virtual machines based on templates. However, while a cloned virtual machine inherits settings in the same way as a virtual machine based on a template, a cloned virtual machine does not depend on the template on which it was based after it has been created.
?
Procedure 4.6. Cloning a Virtual Machine Based on a Template
Click the Resource Allocation tab.
?
Figure 4.7. Provisioning - Clone
Result
The virtual machine is created and displayed in the list in the Virtual Machines tab. You can now assign users to it, and can begin using it when the clone operation is complete.
Summary
Before you can use your newly created virtual machine, the Guide Me window prompts you to configure at least one network interface and one virtual disk for the virtual machine.
Procedure 4.7. Completing the Configuration of a Virtual Machine by Defining Network Interfaces and Hard Disks
Use the drop-down menus to select the Network and the Type of network interface for the new virtual machine. The Link State is set to Up by default when the NIC is defined on the virtual machine and connected to the network.
Add either an Internal virtual disk or an External LUN to the virtual machine.
?
Figure 4.7. Add Virtual Disk Window
Result
You have added a network interface and a virtual disk to your virtual machine.
Summary
Changes to storage, operating system or networking parameters can adversely affect the virtual machine. Ensure that you have the correct details before attempting to make any changes. Virtual machines must be powered off before some changes can be made to them. This procedure explains how to edit a virtual machine. It is necessary to edit a virtual machines in order to change its settings.
The following fields can be edited while a virtual machine is running:
To change all other settings, the virtual machine must be powered off.
?
Procedure 4.8. Editing a virtual machine:
Result
You have changed the settings of a virtual machine by editing it.
Summary
This procedure describes editing a network interface. In order to change any network settings, you must edit the network interface.
?
Procedure 4.9. Editing a Network Interface
Result
You have now changed the network interface by editing it.
Summary
This procedure explains how to extend the size of a virtual drive while the virtual drive is attached to a virtual machine.
?
Procedure 4.10. Extending the Size of an Online Virtual Disk
Extend size by(GB)
field.Result
The target disk‘s status becomes locked
for a short time, during which the drive is resized. When the resizing of the drive is complete, the status of the drive becomes OK
.
Floating disks are disks that are not associated with any virtual machine.
Floating disks can minimize the amount of time required to set up virtual machines. Designating a floating disk as storage for a VM makes it unnecessary to wait for disk preallocation at the time of a VM‘s creation.
Floating disks can be attached to virtual machines or designated as shareable disks, which can be used with one or more VMs.
Summary
This procedure explains how to associate a virtual disk with a virtual machine. Once the virtual disk is associated with the virtual machine, the VM is able to access it.
?
Procedure 4.11. Associating a Virtual Disk with a Virtual Machine
Result
The virtual disk is associated with the virtual machine.
Summary
You can change the CD accessible to a virtual machine while that virtual machine is running.
?
Procedure 4.12. Changing the CD for a Virtual Machine
Click Change CD to open the Change CD window.
?
Figure 4.9. The Change CD Window
[Eject]
to eject the CD currently accessible to the virtual machine.
Or,Result
You have ejected the CD previously accessible to the virtual machine, or ejected the CD previously accessible to the virtual machine and made a new CD accessible to that virtual machine
Smart cards are an external hardware security feature, most commonly seen in credit cards, but also used by many businesses as authentication tokens. Smart cards can be used to protect oVirt virtual machines.
Summary
The following procedures explain how to enable and disable the Smart card feature for virtual machines.
?
Procedure 4.13. Enabling Smart cards
Result
You have enabled Smart card authentication for the virtual machine.
?
Procedure 4.14. Disabling Smart cards
Result
You have disabled Smart card authentication for the virtual machine.
Summary
Remove a virtual machine from the oVirt environment.
?
Procedure 4.15. Removing a Virtual Machine
Result
The virtual machine is removed from the environment and is no longer listed in the Virtual Machines resource tab. If you selected the Remove Disk(s) check box, then the virtual disks attached to the virtual machine are also removed.
Before you make changes to your virtual machine, it is recommended to use snapshots to back up all the virtual machine‘s existing data. A snapshot displays a view of the VM‘s operating system and all its applications at a given point in time, and can be used to restore a VM to a previous state.
Summary
This procedure explains how to create a snapshot of a virtual machine.
?
Procedure 4.16. Creating a snapshot of a virtual machine
Result
You have taken a snapshot of a virtual machine.
Summary
This procedure explains how to clone a virtual machine from a snapshot.
?
Procedure 4.17. Cloning Snapshots
Result
You have cloned a virtual machine from a snapshot.
Summary
A snapshot can be used to restore a virtual machine to its previous state.
?
Procedure 4.18. Using a snapshot to restore a virtual machine
Click the drop-down list beside Preview to open the Custom Preview Snapshot window.</li>
Preview Mode
. The status of the virtual machine briefly changes to Image Locked
before returning to Down
.Result
The virtual machine is restored to its state at the time of the snapshot, or returned to its state before the preview of the snapshot.
Summary
This procedure describes how to delete a snapshot.
?
Procedure 4.19. Deleting a Snapshot
Result
You have deleted a snapshot.
A template is a copy of a preconfigured virtual machine, used to simplify the subsequent, repeated creation of similar virtual machines. Templates capture installed software and software configurations, as well as the hardware configuration, of the original virtual machine.
When you create a template from a virtual machine, a read-only copy of the virtual machine‘s disk is taken. The read-only disk becomes the base disk image of the new template, and of any virtual machines created from the template. As such, the template cannot be deleted whilst virtual machines created from the template exist in the environment.
Virtual machines created from a template use the same NIC type and driver as the original virtual machine, but utilize separate and unique MAC addresses.
Summary
Create a template from an existing virtual machine to use as a blueprint for creating additional virtual machines.
?
Procedure 4.20. Creating a Template from an Existing Virtual Machine
Down
.Result
The virtual machine displays a status of Image Locked
while the template is being created. The process of creating a template
may take up to an hour depending on the size of the virtual machine
disk and your storage hardware. When complete, the template is added to
the Templates tab. You can now create new virtual machines based on the template.
Summary
Once a template has been created, its properties can be edited. Because a template is a copy of a virtual machine, the options available when editing a template are identical to those in the Edit Virtual Machine window.
?
Procedure 4.21. Editing a Template
Result
The properties of the template are updated. The Edit Template window will not close if a property field is invalid.
Summary
Delete a template from your oVirt environment.
Warning
If you have used a template to create a virtual machine, make sure that you do not delete the template as the virtual machine needs it to continue running.
?
Procedure 4.22. Deleting a Template
Result
You have removed the template.
As the SuperUser, the system administrator manages all aspects of the Administration Portal. More specific administrative roles can be assigned to other users. These restricted administrator roles are useful for granting a user administrative privileges that limit them to a specific resource. For example, a DataCenterAdmin role has administrator privileges only for the assigned data center with the exception of the storage for that data center, and a ClusterAdmin has administrator privileges only for the assigned cluster.
A template administrator is a system administration role for templates in a data center. This role can be applied to specific virtual machines, to a data center, or to the whole virtualized environment; this is useful to allow different users to manage certain virtual resources.
The template administrator role permits the following actions:
Before making configuration changes to virtual machines in the User Portal, it is recommended that you take an inventory of the resources available. This is to ensure the resources are sufficient for peak performance and to avoid overloading the hosts running the virtual machines.
The Resources tab in the navigation pane shows a cumulative view of all the resources available in the User Portal, and the performance and statistics of each virtual machine.
Figure 4.11. Resources tab
When you create a virtual machine, the virtual machine consumes CPU and storage resources from its data center. Quota compares the amount of virtual resources consumed by the creation of the virtual machine to the storage allowance and the run-time allowance set by the system administrator.
If you do not have enough of either kind of allowance, you are not allowed to create the virtual machine. Avoid exceeding your quota limit by using the Resources tab to monitor your CPU and storage consumption.
oVirt provides a resource-limitation tool called quota, which allows system administrators to limit the amount of CPU and storage each user can consume. Quota compares the amount of virtual resources consumed when you use the virtual machine to the storage allowance and the run-time allowance set by the system administrator.
When you exceed your quota, a pop-up window informs you that you have exceeded your quota, and you will no longer have access to virtual resources. For example, this can happen if you have too many concurrently running virtual machines in your environment.
To regain access to your virtual machines, do one of the following:
As the SuperUser, the system administrator manages all aspects of the Administration Portal. More specific administrative roles can be assigned to other users. These restricted administrator roles are useful for granting a user administrative privileges that limit them to a specific resource. For example, a DataCenterAdmin role has administrator privileges only for the assigned data center with the exception of the storage for that data center, and a ClusterAdmin has administrator privileges only for the assigned cluster.
A UserVmManager is a system administration role for virtual machines in a data center. This role can be applied to specific virtual machines, to a data center, or to the whole virtualized environment; this is useful to allow different users to manage certain virtual resources.
The user virtual machine administrator role permits the following actions:
Many end users are concerned solely with the virtual machine resources of the virtualized environment. As a result, oVirt provides several user roles which enable the user to manage virtual machines specifically, but not other resources in the data center.
If you are creating virtual machines for users other than yourself, you have to assign roles to the users before they can use the virtual machines. Note that permissions can only be assigned to existing users. See the oVirt Installation Guide for details on creating user accounts.
The oVirt User Portal supports three default roles: User, PowerUser and UserVmManager. However, customized roles can be configured via oVirt Administration Portal. The default roles are described below.
When you create a virtual machine, you automatically inherit UserVmManager privileges. This enables you to make changes to the virtual machine and assign permissions to the users you manage, or users who are in your Identity Management (IdM) or RHDS group.
See oVirt Installation Guide for more information on directory services support in oVirt.
Summary
This procedure explains how to add permissions to users.
?
Procedure 4.23. Assigning Permissions to Users
Result
You have added permissions to a user.
Summary
This procedure explains how to remove user permissions.
?
Procedure 4.24. Removing Access to Virtual Machines from Users
Result
You have now removed permissions from a user.
Connection protocols are the underlying technology used to provide graphical consoles for virtual machines and allow users to work with virtual machines in a similar way as they would with physical machines. oVirt currently supports the following connection protocols:
SPICE
Simple Protocol for Independent Computing Environments (SPICE) is the recommended connection protocol for both Linux virtual machines and Windows virtual machines. SPICE is installed and executed on the client that connects to the virtual machine.
VNC
Virtual Network Computing (VNC) can be used to open consoles to both Linux virtual machines and Windows virtual machines. To open a console to a virtual machine using VNC, you must use Remote Viewer or a VNC client.
RDP
Remote Desktop Protocol (RDP) can only be used to open consoles to Windows virtual machines, and is only available when you access a virtual machines from a Windows machine on which Remote Desktop has been installed. Moreover, before you can connect to a Windows virtual machine using RDP, you must set up remote sharing on the virtual machine and configure the firewall to allow remote desktop connections.
In the User Portal, you can configure several options for opening graphical consoles for virtual machines, such as the method of invocation and whether to enable or disable USB redirection.
Procedure 5.1. Accessing Console Options
When the SPICE connection protocol is selected, the following options are available in the Console Options window.
Figure 5.1. The Console Options window
Console Invocation
SPICE Options
SpiceX.cab
installation program. For all other browsers, the Native client console option is the default. This console option uses the version of Remote Viewer provided by the virt-viewer-x86.msi
and virt-viewer-x64.msi
installation files.When the VNC connection protocol is selected, the following options are available in the Console Options window.
Console Invocation
VNC Options
When the RDP connection protocol is selected, the following options are available in the Console Options window.
Console Invocation
RDP Options
When you specify the Native client or Browser plugin console invocation options, you will connect to virtual machines using Remote Viewer. The Remote Viewer window provides a number of options for interacting with the virtual machine to which it is connected.?
Table 5.1. Remote Viewer Options
Option | Hotkey |
---|---|
File | * Screenshot: Takes a screen capture of the active window and saves it in a location of your specification.
|
View | * Full screen: Toggles full screen mode on or off. When
enabled, full screen mode expands the virtual machine to fill the entire
screen. When disabled, the virtual machine is displayed as a window.
The hot key for enabling or disabling full screen is SHIFT+F11.
|
Send key | * Ctrl+Alt+Del: On a Red Hat Enterprise Linux
virtual machine, it displays a dialog with options to suspend, shut down
or restart the virtual machine. On a Windows virtual machine, it
displays the task manager or Windows Security dialog.
|
Help | The About entry displays the version details of Virtual Machine Viewer that you are using. |
Release Cursor from Virtual Machine | SHIFT+F12 |
You can access the hotkeys for a virtual machine in both full screen mode and windowed mode. If you are using full screen mode, you can display the menu containing the button for hotkeys by moving the mouse pointer to the middle of the top of the screen. If you are using windowed mode, you can access the hotkeys via the Send key menu on the virtual machine window title bar.
A virtual machine connected with the SPICE protocol can be configured to connect directly to USB devices.
The USB device will only be redirected if the virtual machine is active and in focus. USB redirection can be manually enabled each time a device is plugged in or set to automatically redirect to active virtual machines in the SPICE client menu.
USB redirection Native mode allows KVM/SPICE USB redirection for Linux and Windows virtual machines. Virtual (guest) machines require no guest-installed agents or drivers for native USB. All packages required by the client are brought forward by the SPICE xpi Firefox plugin. The USBClerk package must be installed on the Windows client. Native USB mode is supported on the following clients and guests:
The usbclerk service must be running on the Windows client for the USB device to be redirected to the guest. Ensure the version of usbclerk matches the architecture of the client machine. For example, the 64-bit version of usbclerk must be installed on 64-bit Windows machines.
Procedure 7.1. Using USB Devices on a Windows Client
The usbredir package enables USB redirection from Red Hat Enterprise Linux, CentOS, or similar clients to virtual machines. usbredir is a dependency of the spice-xpi package, and is automatically installed together with that package.
Procedure 7.2. Using USB devices on a Red Hat Enterprise Linux/CentOSclient
Legacy mode for USB redirection enables the SPICE USB redirection policy used in oVirt 3.0. Legacy mode must be manually configured.
Legacy USB mode is supported on the following clients and guests:
If you connect to a virtual guest from a Red Hat Enterprise Linux client machine, you have to install several SPICE packages before you can share USB devices between the client and the guest.
Procedure 7.3. Using USB devices on Red Hat Enterprise Linux clients:
These packages are available on the Red Hat Network, from the Red Hat Enterprise Linux Supplementary Software channel for your version of Red Hat Enterprise Linux. To install the packages, run:
# yum install spice-usb-share kmod-kspiceusb
RHEV-ToolsSetup.exe
. If the Guest Tools ISO is not available in your CD drive, contact your system administrator. After the tools have been installed, you will be prompted to restart the machine for changes to be applied.Figure 7.1. List of Connected USB devices - Linux Client
When you close the SPICE session the USB device will no longer be shared with the guest.
If you are connecting from a Windows client machine, and wish to use USB devices on your guest, you have to enable SPICE USB redirection.
Procedure 7.4. Enabling USB redirection on Windows:
oVirt-USB-Client.exe
. oVirt-ToolsSetup.exe
. If the Guest Tools ISO is not available in your CD drive, contact your system administrator. After the tools have been installed, you will be prompted to restart the machine for changes to be applied.Figure 7.2. List of Connected USB devices - Windows Client
Configuring single sign-on allows you to automatically log in to a virtual machine using the credentials you use to log in to the User Portal. Single sign-on can be used on both Red Hat Enterprise Linux/CentOS and Windows virtual machines.
To configure single sign-on for Red Hat Enterprise Linux virtual machines using GNOME and KDE graphical desktop environments and IPA (IdM) servers, you must install the ovirt-guest-agent package on the virtual machine and install the packages associated with your window manager.
Procedure 8.1. Configuring Single Sign-On for Red Hat Enterprise Linux Virtual Machines
# rhn-channel --add --channel=rhel-x86_64-rhev-agent-6-server
# yum install rhevm-guest-agent
# yum install rhev-agent-pam-rhev-cred # yum install rhev-agent-gdm-plugin-rhevcred
# yum install ipa-client
# ipa-client-install --permit --mkhomedir
# ipa-client-install --domain=[FQDN] --server==[FQDN]
# getent passwd [IPA user name]
[some-ipa-user]:*:936600010:936600001::/home/[some-ipa-user]:/bin/sh
You will need this information in the next step to create a home directory for [some-ipa-user].
# mkdir /home/[some-ipa-user]
# chown 935500010:936600001 /home/[some-ipa-user]
Result
You have enabled single sign-on for your Red Hat Enterprise Linux virtual machine. Log in to the User Portal using the user name and password of a user configured to use single sign-on and connect to the console of the virtual machine. You will be logged in automatically.
To configure single sign-on for Red Hat Enterprise Linux or CentOS virtual machines using GNOME and KDE graphical desktop environments and Active Directory, you must install the ovirt-guest-agent package on the virtual machine, install the packages associated with your window manager and join the virtual machine to the domain.
? Procedure 8.2. Configuring Single Sign-On for Red Hat Enterprise Linux/CentOS Virtual Machines
# rhn-channel --add --channel=rhel-x86_64-rhev-agent-6-server
# yum install ovirt-guest-agent
# yum install ovirt-agent-gdm-plugin-rhevcred
# yum install samba-client samba-winbind samba-winbind-clients
/etc/samba/smb.conf
file to contain the following, replacing DOMAIN
with the short domain name and REALM.LOCAL
with the Active Directory realm:
[global] workgroup = DOMAIN realm = REALM.LOCAL log level = 2 syslog = 0 server string = Linux File Server security = ads log file = /var/log/samba/%m max log size = 50 printcap name = cups printing = cups winbind enum users = Yes winbind enum groups = Yes winbind use default domain = true winbind separator = + idmap uid = 1000000-2000000 idmap gid = 1000000-2000000 template shell = /bin/bash
net ads join -U [user name]
# service winbind start # chkconfig winbind on
# wbinfo -t
# wbinfo -u
# wbinfo -g
# authconfig-tui
Result
You have enabled single sign-on for your Red Hat Enterprise Linux virtual machine. Log in to the User Portal using the user name and password of a user configured to use single sign-on and connect to the console of the virtual machine. You will be logged in automatically.
To configure single sign-on for Windows virtual machines, the Windows guest agent must be installed on the guest virtual machine. The oVirt Guest Tools ISO
file provides this agent. If the oVirt-toolsSetup.iso
image is not available in your ISO domain, contact your system administrator. ?
Procedure 8.3. Configuring Single Sign-On for Windows Virtual Machines
oVirt-toolsSetup.iso
. Click OK.Result
You have enabled single sign-on for your Windows virtual machine. Log in to the User Portal using the user name and password of a user configured to use single sign-on and connect to the console of the virtual machine. You will be logged in automatically.
Copyright © 2014 Red Hat, Inc.
This document is licensed by Red Hat under the Creative Commons Attribution-ShareAlike 3.0 Unported License. If you distribute this document, or a modified version of it, you must provide attribution to Red Hat, Inc. and provide a link to the original. If the document is modified, all Red Hat trademarks must be removed.
Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section 4d of CC-BY-SA to the fullest extent permitted by applicable law.
Red Hat, Red Hat Enterprise Linux, the Shadowman logo, JBoss, MetaMatrix, Fedora, the Infinity Logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries.
Linux® is the registered trademark of Linus Torvalds in the United States and other countries.
Java® is a registered trademark of Oracle and/or its affiliates.
XFS® is a trademark of Silicon Graphics International Corp. or its subsidiaries in the United States and/or other countries.
MySQL® is a registered trademark of MySQL AB in the United States, the European Union and other countries.
Node.js® is an official trademark of Joyent. Red Hat Software Collections is not formally related to or endorsed by the official Joyent Node.js open source or commercial project.
The OpenStack® Word Mark and OpenStack Logo are either registered trademarks/service marks or trademarks/service marks of the OpenStack Foundation, in the United States and other countries and are used with the OpenStack Foundation‘s permission. We are not affiliated with, endorsed or sponsored by the OpenStack Foundation, or the OpenStack community.
All other trademarks are the property of their respective owners.
Jodi Biddle
jbiddle@redhat.com
Lucinda Bopf
lbopf@redhat.com
Andrew Burden
aburden@redhat.com
Zac Dover
zdover@redhat.com
Tim Hildred
thildred@redhat.com
Dayle Parker
dayparke@redhat.com
Brian Proffitt
bkp@redhat.com
Revision 3.4-20
Fri 3 Oct 2014
Brian Proffitt
Converted to oVirt-oriented documentation.
Revision 3.4-19
Fri 27 Jun 2014
Andrew Dahms
BZ#1093492 - Outlined the difference between the methods for sealing a Linux virtual machine. |
Revision 3.4-17
Wed 11 Jun 2014
Andrew Burden
Brewing for 3.4 GA. |
Revision 3.4-16
Fri 6 Jun 2014
Andrew Dahms
BZ#996570 - Updated the list of console options for the SPICE and VNC connection protocols. |
Revision 3.4-14
Thurs 24 Apr 2014
Timothy Poitras
BZ#1075477 - Updated note re: enabling/disabling SSO on VMs. |
Revision 3.4-13
Tue 22 Apr 2014
Lucy Bopf
BZ#1088716 - Updated screen shots for User Portal (Basic and Extended) to include new reboot button. |
Revision 3.4-10
Wed 16 Apr 2014
Timothy Poitras
BZ#1085670 - Tidied tagging and syntax in multiple topics. |
Revision 3.4-9
Tue 15 Apr 2014
Lucy Bopf
BZ#1075919 - Added a list of parameters that can be changed while a Virtual Machine is running. |
Revision 3.4-8
Thu 03 Apr 2014
Andrew Dahms
BZ#1091596 - Added a note that console settings for virtual machines taken from virtual machine pools are persistent. |
BZ#1088648 - Updated the description of selecting virtual machines in procedures involving virtual machine properties. |
BZ#1085786 - Clarified that the Run Stateless option is only enabled on virtual machines with virtual disks. |
BZ#1081744 - Updated the description of the DataCenterAdmin role. |
BZ#1076282 - Added a note outlining that the name of the base template is retained for cloned virtual machines. |
BZ#1074421 - Added an explanation of how to add and configure watchdogs. |
BZ#1071044 - Added a description of how to manually associate console.vv files with Remote Viewer. |
BZ#1039217 - Updated the description of how to install and access console components. |
Revision 3.4-7
Wed 02 Apr 2014
Lucy Bopf
BZ#1076892 - Added the VNC Keyboard Layout option in the Run Once window. |
BZ#1076318 - Updated and added procedures and screen shots to include new Reboot button. |
BZ#1075526 - Updated and added procedures and screen shots for creating and previewing snapshots. |
Revision 3.4-6
Tue 01 Apr 2014
Zac Dover
Beta build with Publican 3.99 for rhevm-doc - altered spec.tmpl |
Revision 3.4-3
Thu 27 Mar 2014
Andrew Dahms
BZ#1081268 - Updated the procedure for changing the CD accessible to a virtual machine. |
BZ#1076283 - Added an explanation of how to configure Cloud-Init settings for virtual machines and templates. |
BZ#1075492 - Updated sections on creating and using templates to outline the new template sub version feature. |
BZ#1075487 - Added an explanation of how to configure persistent Cloud-Init settings. |
Revision 3.4-2
Thu 20 Mar 2014
Andrew Dahms
BZ#1078606 - Updated the location of the USB Clerk and Virt Viewer .msi files. |
BZ#1075878 - Updated the procedure for removing virtual disks from virtual machines. |
BZ#1043433 - Added a description of how to ensure USB support is set to native for USB redirection. |
Revision 3.4-1
Mon 17 Mar 2014
Andrew Dahms
Initial creation for the Red Hat Enterprise Virtualization 3.4 release.
标签:
原文地址:http://www.cnblogs.com/ruiy/p/5122479.html