Requirements and Recommended Specs
- An LDAP/ADDS Server or Server Pool
- A container or VM with:
- Ubuntu (>= 20.04 Stable) || Debian (>= 10 - Buster)
- 2 Thread / Virtual CPU
- 2GB RAM
- A valid URL for your front-end
- An SSL Certificate
Installing Interlock is fairly straight-forward.
Firstly you’ll need to add the official repository and install it with APT.
# Add the Interlock Public GPG Key apt install gnupg -y wget -qO - https://brconsulting.info/publickeys/apt-repo.key | gpg --dearmor > /etc/apt/trusted.gpg.d/interlock.gpg # Add the Interlock Repository echo "deb [arch=amd64] http://apt-repo.brconsulting.info/interlock/ stable main" > /etc/apt/sources.list.d/interlock.list # Install the package with the required dependencies apt update -y apt install interlock -y
Once the installation has finished the post-install script will execute multiple required operations:
- Create the Systemd unit service
- Create the NGINX Front-end site and Back-end reverse proxy for client access
- Create a self-signed SSL Certificate that is meant to be replaced and temporary
It will also ask you for a VALID URL to use in the Front-end.
When the installation concludes you may copy your SSL Certificate(s) to:
Once that is all done you can proceed to do the initial configuration.
To start setting up your Interlock server login with the default credentials:
- User: admin
- Password: interlock
And head over to the settings section.
Here you’ll be able to configure your LDAP Connection.
Make sure to enter the full directory path for your Bind User.
The default or initial bind user DN can usually be something along the lines of “CN=Administrator,OU=Users,DC=example,DC=com”