Installing Interlock

  • An LDAP/ADDS Server or Server Pool
  • Access to Python PIP Repositories (Required for pip install -r requirements.txt)
  • A container or VM with:
    • Ubuntu (>= 20.04 Stable) || Debian (>= 10 - Buster)
    • 2 Thread / Virtual CPU
    • 2GB RAM
  • A valid URL for your front-end
  • An SSL Certificate

Initial Setup

Installing Interlock is fairly straight-forward.

Firstly you’ll need to add the official repository and install it with APT.

# Add the Interlock Public GPG Key
apt install gnupg -y
wget -qO - | gpg --dearmor > /etc/apt/trusted.gpg.d/interlock.gpg

# Add the Interlock Repository
echo "deb [arch=amd64] stable main" > /etc/apt/sources.list.d/interlock.list

# Install the package with the required dependencies
apt update -y
apt install interlock -y

Once the installation has finished the post-install script will execute multiple required operations:

  • Create the Systemd unit service
  • Create the NGINX Front-end site and Back-end reverse proxy for client access
  • Create a self-signed SSL Certificate that is meant to be replaced and temporary

It will also ask you for a VALID URL to use in the Front-end.

When the installation concludes you may copy your SSL Certificate(s) to:

  • /var/lib/interlock/sslcerts/fullchain.pem
  • /var/lib/interlock/sslcerts/privkey.pem

Once that is all done you can proceed to do the initial configuration.

LDAP Configuration

To start setting up your Interlock server login with the default credentials:

  • User: admin
  • Password: interlock

And head over to the settings section.

Here you’ll be able to configure your LDAP Connection.

Make sure to enter the full directory path for your Bind User.

The default or initial bind user DN can usually be something along the lines of “CN=Administrator,OU=Users,DC=example,DC=com”