-
Notifications
You must be signed in to change notification settings - Fork 0
/
install.sh
569 lines (494 loc) · 19.5 KB
/
install.sh
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
#!/bin/bash
#install.sh-FreeRADIUS
clear
dnf -y install net-tools dmidecode
TEXTRESET=$(tput sgr0)
RED=$(tput setaf 1)
YELLOW=$(tput setaf 3)
GREEN=$(tput setaf 2)
INTERFACE=$(nmcli | grep "connected to" | cut -d " " -f4)
FQDN=$(hostname)
IP=$(hostname -I)
FQDN=$(hostname)
DOMAIN=$(hostname | sed 's/^[^.:]*[.:]//' | sed -e 's/\(.*\)/\U\1/')
USER=$(whoami)
MAJOROS=$(cat /etc/redhat-release | grep -Eo "[0-9]" | sed '$d')
DETECTIP=$(nmcli -f ipv4.method con show $INTERFACE)
NMCLIIP=$(nmcli | grep inet4 | sed '$d' | cut -c7- | cut -d / -f1)
HWKVM=$(dmidecode | grep -i -e manufacturer -e product -e vendor | grep KVM | cut -c16-)
HWVMWARE=$(dmidecode | grep -i -e manufacturer -e product -e vendor | grep Manufacturer | grep "VMware, Inc." | cut -c16- | cut -d , -f1)
n='([0-9]|[1-9][0-9]|1[0-9][0-9]|2[0-4][0-9]|25[0-5])'
m='([0-9]|[12][0-9]|3[012])'
#Bracketed pasting...yuck!
sed -i '8i set enable-bracketed-paste off' /etc/inputrc
#Checking for user permissions
if [ "$USER" = "root" ]; then
echo " "
else
echo ${RED}"This program must be run as root ${TEXTRESET}"
echo "Exiting"
fi
#Checking for version Information
if [ "$MAJOROS" = "9" ]; then
echo " "
else
echo ${RED}"Sorry, but this installer only works on Rocky 9.X ${TEXTRESET}"
echo "Please upgrade to ${GREEN}Rocky 9.x${TEXTRESET}"
echo "Exiting the installer..."
exit
fi
clear
cat <<EOF
Checking for static IP Address
EOF
sleep 1s
#Detect Static or DHCP (IF not Static, change it)
if [ -z "$INTERFACE" ]; then
"Usage: $0 <interface>"
exit 1
fi
if [ "$DETECTIP" = "ipv4.method: auto" ]; then
echo ${RED}"Interface $INTERFACE is using DHCP${TEXTRESET}"
read -p "Please provide a static IP address in CIDR format (i.e 192.168.24.2/24): " IPADDR
while [ -z "$IPADDR" ]; do
echo ${RED}"The response cannot be blank. Please Try again${TEXTRESET}"
read -p "Please provide a static IP address in CIDR format (i.e 192.168.24.2/24): " IPADDR
done
while [[ ! $IPADDR =~ ^$n(\.$n){3}/$m$ ]]; do
read -p ${RED}"The entry is not in valid CIDR notation. Please Try again:${TEXTRESET} " IPADDR
done
read -p "Please Provide a Default Gateway Address: " GW
while [ -z "$GW" ]; do
echo ${RED}"The response cannot be blank. Please Try again${TEXTRESET}"
read -p "Please Provide a Default Gateway Address: " GW
done
read -p "Please provide the FQDN of this machine: " HOSTNAME
while [ -z "$HOSTNAME" ]; do
echo ${RED}"The response cannot be blank. Please Try again${TEXTRESET}"
read -p "Please provide the FQDN of this machine: " HOSTNAME
done
read -p "Please provide the IP address of the Active Directory server: " DNSSERVER
while [ -z "$DNSSERVER" ]; do
echo ${RED}"The response cannot be blank. Please Try again${TEXTRESET}"
read -p "Please provide the IP address of the Active Directory server: " DNSSERVER
done
read -p "Please provide the domain search name: " DNSSEARCH
while [ -z "$DNSSEARCH" ]; do
echo ${RED}"The response cannot be blank. Please Try again${TEXTRESET}"
read -p "Please provide the domain search name: " DNSSEARCH
done
clear
cat <<EOF
The following changes to the system will be configured:
IP address: ${GREEN}$IPADDR${TEXTRESET}
Gateway: ${GREEN}$GW${TEXTRESET}
DNS Search: ${GREEN}$DNSSEARCH${TEXTRESET}
DNS Server: ${GREEN}$DNSSERVER${TEXTRESET}
HOSTNAME: ${GREEN}$HOSTNAME${TEXTRESET}
EOF
read -p "Press any Key to Continue"
nmcli con mod $INTERFACE ipv4.address $IPADDR
nmcli con mod $INTERFACE ipv4.gateway $GW
nmcli con mod $INTERFACE ipv4.method manual
nmcli con mod $INTERFACE ipv4.dns-search $DNSSEARCH
nmcli con mod $INTERFACE ipv4.dns $DNSSERVER
hostnamectl set-hostname $HOSTNAME
cat <<EOF
The System must reboot for the changes to take effect. ${RED}Please log back in as root.${TEXTRESET}
The installer will continue when you log back in.
If using SSH, please use the IP Address: $IPADDR
EOF
read -p "Press Any Key to Continue"
clear
echo "/root/FR-Installer/install.sh" >>/root/.bash_profile
reboot
exit
else
echo ${GREEN}"Interface $INTERFACE is using a static IP address ${TEXTRESET}"
fi
clear
if [ "$FQDN" = "localhost.localdomain" ]; then
cat <<EOF
${RED}This system is still using the default hostname (localhost.localdomain)${TEXTRESET}
EOF
read -p "Please provide a valid FQDN for this machine: " HOSTNAME
while [ -z "$HOSTNAME" ]; do
echo ${RED}"The response cannot be blank. Please Try again${TEXTRESET}"
read -p "Please provide a valid FQDN for this machine: " HOSTNAME
done
hostnamectl set-hostname $HOSTNAME
cat <<EOF
The System must reboot for the changes to take effect.
${RED}Please log back in as root.${TEXTRESET}
The installer will continue when you log back in.
If using SSH, please use the IP Address: ${NMCLIIP}
EOF
read -p "Press Any Key to Continue"
clear
echo "/root/FR-Installer/install.sh" >>/root/.bash_profile
reboot
exit
fi
clear
cat <<EOF
*********************************************
This script was created for ${GREEN}Rocky 9.x${TEXTRESET}
This script will quickly configure a FreeRADIUS Server
What this script does:
1. Update and install all dependencies for FreeRADIUS.
2. Add radius ports to the Firewall
3. Integrates this server into AD
4. Configures winbind, PEAP/MS-CHAP, MAC Auth and Mac Auth with IPSK
5. Tests winbind, MS-CHAP and FreeRadius
*********************************************
This will take around 10-15 minutes depending on your Internet connection
and processor speed/memory
EOF
read -p "Press any Key to continue or Ctrl-C to Exit"
clear
cat <<EOF
*********************************************
Checklist:
Before the Installer starts, please make sure you have the following information
1. ${YELLOW}An Active User in AD${TEXTRESET} that you can use to test the Radius Auth for MSCHAP.
2. ${YELLOW}An AD Group that the User in #1 is associated${TEXTRESET}. Something like "Wireless Users".
${YELLOW}(FR will look for an approved Group to allow access to the network)${TEXTRESET}
If using RADS installer (Server Management Program)
AD Management--> Create New Group
AD Management--> Add User
AD Management--> Move Users to Groups
${RED}(Make sure your case and spacing is noted as you must put it in exactly as you created it)${TEXTRESET}
2. ${YELLOW}An Active Admin account${TEXTRESET} that you can use to join this server to the Windows domain
3. Verify that this server is ${YELLOW}configured to use the DNS services of AD.${TEXTRESET}
4. Verify that you know the ${YELLOW}REALM of the AD environment${TEXTRESET} you wish to join
5. Make sure that you know the ${YELLOW}subnet, in CIDR notation${TEXTRESET} of NAS devices this server will accept
6. Make sure you have the ${YELLOW}password${TEXTRESET} you would like to use for your ${YELLOW}NAS devices${TEXTRESET}
*********************************************
EOF
read -p "Press any Key to continue or Ctrl-C to Exit"
clear
#Checking for VM platform-Install client
echo ${GREEN}"Installing VMGuest${TEXTRESET}"
if [ "$HWKVM" = "KVM" ]; then
echo ${GREEN}"KVM Platform detected ${TEXTRESET}"
echo "Installing qemu-guest-agent"
sleep 1
dnf -y install qemu-guest-agent
else
echo "Not KVM Platform"
fi
#Checking for VM platform-Install client
if [ "$HWVMWARE" = "VMware" ]; then
echo ${GREEN}"VMWARE Platform detected ${TEXTRESET}"
echo "Installing open-vm-tools"
sleep 1
dnf -y install open-vm-tools
else
echo "Not VMware Platform"
fi
clear
#Allow FreeRADIUS Ports on firewall-cmd
echo "Updating Firewall Rules"
echo "${GREEN} "
firewall-cmd --add-service=radius --permanent
firewall-cmd --reload
clear
echo ${GREEN}"These are the services/ports now open on the server${TEXTRESET}"
echo
firewall-cmd --list-services --zone=public
echo "${TEXTRESET}"
echo "The Installer will continue in a moment or Press Ctrl-C to Exit"
sleep 8s
clear
cat <<EOF
${GREEN}Downloading and installing updates${TEXTRESET}
EOF
sleep 3s
dnf -y install epel-release
dnf -y install dnf-plugins-core
dnf config-manager --set-enabled crb
dnf -y update
dnf -y install ntsysv wget oddjob oddjob-mkhomedir samba-winbind samba-winbind-clients samba-common-tools freeradius freeradius-utils realmd bind-utils
clear
#Add option for cockpit install
cat <<EOF
${GREEN}Install Cockpit${TEXTRESET}
Cockpit is a server administration tool, focused on providing a modern-looking
and user-friendly interface to manage and administer servers.
EOF
read -r -p "Would you like to install Cockpit for web based administration? [y/N]" -n 1
echo # (optional) move to a new line
if [[ "$REPLY" =~ ^[Yy]$ ]]; then
echo ${YELLOW}"Your cockpit instance can be accessed at ${FQDN}:9090"${TEXTRESET}
sleep 5
dnf -y install cockpit cockpit-storaged
systemctl enable cockpit.socket
systemctl start cockpit.socket
fi
clear
cat <<EOF
The Installer will now ask some questions from the checklist provided earlier.
Please make sure you have this information
EOF
read -p "Press any Key to continue or Ctrl-C to Exit"
clear
read -p "Please provide the AD username for testing: " FRUSER
while [ -z "$FRUSER" ]; do
echo ${RED}"The response cannot be blank. Please Try again${TEXTRESET}"
read -p "Please provide the AD username for testing: " FRUSER
done
read -p "Please provides this user's password: " FRPASS
while [ -z "$FRPASS" ]; do
echo ${RED}"The response cannot be blank. Please Try again${TEXTRESET}"
read -p "Please provides this user's password: " FRPASS
done
read -p "Please provide the AD Group we will check for membership: " GROUP
while [ -z "$GROUP" ]; do
echo ${RED}"The response cannot be blank. Please Try again${TEXTRESET}"
read -p "Please provide the AD Group we will check for membership: " GROUP
done
read -p "Please provide the AD Domain (CAPS Preferred) name (Realm-i.e. $DOMAIN ): " ADDOMAIN
while [ -z "$ADDOMAIN" ]; do
echo ${RED}"The response cannot be blank. Please Try again${TEXTRESET}"
read -p "Please provide the AD Domain (CAPS Preferred) name (Realm-i.e. $DOMAIN ): " ADDOMAIN
done
read -p "Please provide the IP/FQDN Address of your NTP/AD Server: " NTP
while [ -z "$NTP" ]; do
echo ${RED}"The response cannot be blank. Please Try again${TEXTRESET}"
read -p "Please provide the IP/FQDN Address of your NTP/AD Server: " NTP
done
read -p "Please provide the Administrator Account to join this system to AD (Just username, not UPN): " DOMAINADMIN
while [ -z "$DOMAINADMIN" ]; do
echo ${RED}"The response cannot be blank. Please Try again${TEXTRESET}"
read -p "Please provide the Administrator Account to join this system to AD (Just username, not UPN): " DOMAINADMIN
done
read -p "Please provide the subnet in CIDR notation for NAS devices to talk to radius: " CIDRNAS
while [ -z "$CIDRNAS" ]; do
echo ${RED}"The response cannot be blank. Please Try again${TEXTRESET}"
read -p "Please provide the subnet in CIDR notation for NAS devices to talk to radius: " CIDRNAS
done
read -p "Please provide the shared secret your NAS devices will be using: " NASSECRET
while [ -z "$NASSECRET" ]; do
echo ${RED}"The response cannot be blank. Please Try again${TEXTRESET}"
read -p "Please provide the shared secret your NAS devices will be using: " NASSECRET
done
clear
cat <<EOF
Validating your Entries:
Radius Testing Username: ${GREEN}$FRUSER${TEXTRESET}
Radius Testing Password: ${GREEN}$FRPASS${TEXTRESET}
Group Membership Name: ${GREEN}$GROUP${TEXTRESET}
Domain: ${GREEN}$ADDOMAIN${TEXTRESET}
NTP Server: ${GREEN}$NTP${TEXTRESET}
AD Administrator Account: ${GREEN}$DOMAINADMIN${TEXTRESET}
NAS client Subnet: ${GREEN}$CIDRNAS${TEXTRESET}
Password for NAS devices: ${GREEN}$NASSECRET${TEXTRESET}
EOF
read -p "Press any Key to continue or Ctrl-C to Exit"
clear
cat <<EOF
Joining server to Domain $ADDOMAIN
${RED}The screen may look frozen for up to a minute after the password is entered... Please wait${TEXTRESET}
EOF
realm join -U $DOMAINADMIN --client-software=winbind $ADDOMAIN
clear
sed -i "/pool /c\server $NTP iburst" /etc/chrony.conf
sed -i "/server /c\server $NTP iburst" /etc/chrony.conf
sed -e '2d' /etc/chrony.conf
systemctl restart chronyd
clear
echo ${RED}"Syncronizing time, Please wait${TEXTRESET}"
sleep 10s
clear
chronyc tracking
echo ${GREEN}"We should be syncing time${TEXTRESET}"
echo " "
echo "The Installer will continue in a moment, otherwise Ctrl-C to stop processing"
sleep 8
clear
#Validate winbind is working
cat <<EOF
${GREEN}Testing RPC to Active Directory${TEXTRESET}
EOF
echo ${GREEN}
wbinfo -t
echo ${TEXTRESET}
echo " "
echo "The Installer will continue in a moment, otherwise Ctrl-C to stop processing"
sleep 8
clear
#Validate winbind sees users
cat <<EOF
${GREEN}AD Users${TEXTRESET}
Please make sure you see your AD users.
If you do not, then please resolve this issue first before proceeding.
EOF
echo ${GREEN}
wbinfo -u
echo ${TEXTRESET}
echo " "
echo "The Installer will continue in a moment, otherwise Ctrl-C to stop processing"
sleep 8
clear
#Validate winbind groups are seen
cat <<EOF
${GREEN}AD Groups${TEXTRESET}
Please make sure you see your AD groups.
If you do not, then please resolve this issue first before proceeding.
EOF
echo ${GREEN}
wbinfo -g
echo ${TEXTRESET}
echo " "
echo "The Installer will continue in a moment, otherwise Ctrl-C to stop processing"
sleep 10
clear
#Basic test against AD
cat <<EOF
${GREEN}Test a winbind login${TEXTRESET}
We are going to login with the test account ${GREEN}($FRUSER)${TEXTRESET}. Please make sure you see a valid response of:
${GREEN}challenge/response password authentication succeeded${TEXTRESET}
If you do not, then please resolve this issue first before proceeding.
EOF
echo ${GREEN}
wbinfo -a $FRUSER%$FRPASS
echo ${TEXTRESET}
echo " "
echo "The Installer will continue in a moment, otherwise Ctrl-C to stop processing"
sleep 10
clear
#Add support for NTLM_BIND to AD
sed -i '9i \ \ ntlm auth = mschapv2-and-ntlmv2-only' /etc/samba/smb.conf
#Modify PATH and DOMAIN for ntlm_auth
echo "Adding ntlm_auth"
sed -i 's\/path/to/ntlm_auth\/usr/bin/ntlm_auth\' /etc/raddb/mods-enabled/ntlm_auth
echo "Adding proper domain"
sed -i "s/--domain=MYDOMAIN/--domain=$ADDOMAIN/" /etc/raddb/mods-enabled/ntlm_auth
#Insert ntlm_auth line 512 for inner-tunnel and default
sed -i '512i \ \ #Added by FR-Installer' /etc/raddb/sites-enabled/default
sed -i '513i \ \ ntlm_auth' /etc/raddb/sites-enabled/default
sed -i '226i \ \ #Added by FR-Installer' /etc/raddb/sites-enabled/inner-tunnel
sed -i '227i \ \ ntlm_auth' /etc/raddb/sites-enabled/inner-tunnel
#Update /etc/issue so we can see the hostname and IP address Before logging in
rm -r -f /etc/issue
touch /etc/issue
cat <<EOF >/etc/issue
\S
Kernel \r on an \m
Hostname: \n
IP Address: \4
EOF
#Change permissions for winbind
systemctl stop winbind
usermod -a -G wbpriv radiusd
chown root:wbpriv /var/lib/samba/winbindd_privileged/
systemctl start winbind
#Add Modified ntlm_auth to mschap
touch /root/FR-Installer/ntlm_auth.tmp
echo 'ntlm_auth = "/usr/bin/ntlm_auth --request-nt-key --allow-mschapv2 --username=%{mschap:User-Name:-None} --domain=%{%{mschap:NT-Domain}:-MYDOMAIN} --challenge=%{mschap:Challenge:-00} --nt-response=%{mschap:NT-Response:-00}' >>/root/FR-Installer/ntlm_auth.tmp
sed -i "s/-MYDOMAIN/-$ADDOMAIN/" /root/FR-Installer/ntlm_auth.tmp
echo "--require-membership-of='$ADDOMAIN\\$GROUP'"\" >>/root/FR-Installer/ntlm_auth.tmp
awk '{if(NR%2==0) {print var,$0} else {var=$0}}' /root/FR-Installer/ntlm_auth.tmp >/root/FR-Installer/ntlm_auth.tmp.final
sed -i '83 r /root/FR-Installer/ntlm_auth.tmp.final' /etc/raddb/mods-enabled/mschap
#Enable MAC Base Auth
touch /root/FR-Installer/rewrite_MAC
echo "rewrite_calling_station_id" >>/root/FR-Installer/rewrite_MAC
sed -i '285 r /root/FR-Installer/rewrite_MAC' /etc/raddb/sites-enabled/default
clear
#Create our client CIDR for NAS access
touch /root/FR-Installer/nasclient
cat <<EOF >/root/FR-Installer/nasclient
#Added by FR-Installer
client private-network-1 {
ipaddr = $CIDRNAS
secret = $NASSECRET
}
EOF
sed -i '249 r /root/FR-Installer/nasclient' /etc/raddb/clients.conf
clear
#Create certs
cat <<EOF
${GREEN}Certificates${TEXTRESET}
Creating the default 60 day certs
If you want to create your own self signed certs
please use the server management program (server-manager).
In the FreeRADIUS module, there is an option to generate
new certificates (Generate self-signed certs)
EOF
echo "The Installer will continue in a moment, otherwise Ctrl-C to stop processing"
sleep 10
clear
/etc/raddb/certs/bootstrap
#Start radiusd
systemctl enable radiusd
systemctl start radiusd
clear
#Test MSCHAP
cat <<EOF
${GREEN}Testing MS-CHAP from local server${TEXTRESET}
If this returns ${GREEN}Allowed${TEXTRESET}, your server is configured properly
EOF
echo "${GREEN}"
radtest -t mschap $FRUSER $FRPASS localhost 0 testing123 | grep Allowed
echo "${TEXTRESET}"
echo "The Installer will continue in a moment, otherwise Ctrl-C to stop processing"
sleep 8
clear
#Add MAC Examples to users file
touch /root/FR-Installer/mac_auth_tmp
cat <<EOF >/root/FR-Installer/mac_auth_tmp
##########################################*MAC Auth Examples*################################################
#If you are only using MAC based (Open) authentication, then the format would be the following:
#abdcef123456 Cleartext-Password := abdcef123456, Calling-Station-Id == AB-DC-EF-12-34-56
#If you are using IPSK with MAC, the following format would be needed:
#abdcef123456 Cleartext-Password := <MAC Address>, Calling-Station-Id == AB-DC-EF-12-34-56
# Tunnel-Password = letmein <--This must be indented
#You MUST RESTART RADIUSD for a new entry to be considered active (systemctl restart radiusd)
#If you are manually editing this file, DO NOT USE server-management GUI to manage it, CHOOSE ONE OR THE OTHER APPROACH
#BEGIN SERVER-MANAGEMENT INSERTIONS
############################################################################################################
#
#
#
#
############################################################################################################
#END SERVER-MANAGEMENT INSERTIONS
#
#IF YOU ARE MANUALLY ADDING ENTRIES OR ADDING EN MASSE PLACE THEM BELOW THIS LINE
############################################################################################################
#THE FORMAT SHOULD BE 2 LINES FOR MAC AUTH (ENTRY, DESCRIPTION), 3 LINES FOR MAC AUTH iPSK (ENTRY, TUNNEL, DESCRIPTION)
#OTHERWISE IF YOU USE SERVER MANAGER TO DELETE LINES IT MAY MISTAKENLY REMOVE THE WRONG LINE
EOF
sed -i '2 r /root/FR-Installer/mac_auth_tmp' /etc/raddb/mods-config/files/authorize
cat <<EOF
${GREEN}********************************
Server Installation Complete
********************************${TEXTRESET}
Example entries for MAC Auth and Mac with IPSK are included in:
/etc/raddb/users at the top of the file.
If all tests completed successfully, the server is now ready to serve NAS endpoints for
1. 802.1x (PEAP and MS-CHAP)
(Make sure your AD users are a Member of the group: ${GREEN}$GROUP${TEXTRESET})
2. Open MAC Auth (Provide the entries in the users file or use ${GREEN}server-manager${TEXTRESET})
3. Mac Auth with IPSK (Provide the entries in the users file or use ${GREEN}server-manager${TEXTRESET})
The Installer will continue in a moment
${YELLOW}Getting Ready to install Server Management${TEXTRESET}
EOF
sleep 18
#Clean up FR Install files
sed -i '$ d' /root/.bash_profile
rm -r -f /root/FR-Installer
rm -r -f /root/DC-Installer.sh
rm -r -f /root/ADDCInstaller
rm -r -f /root/FR-Installer.sh
cat <<EOF
${GREEN}******************************
Installing Server Management
******************************${TEXTRESET}
EOF
sleep 3
cd /root/
dnf -y install wget
wget https://raw.githubusercontent.com/fumatchu/FR-RADS-SM/main/FR-RADS-FirstInstaller.sh
chmod 700 ./FR-RADS-FirstInstaller.sh
/root/FR-RADS-FirstInstaller.sh