[Freeipa-users] ad trust and default_domain_suffix
Nicolas Zin
nicolas.zin at savoirfairelinux.com
Thu Dec 4 17:49:36 UTC 2014
Hi,
I have a IDM (v3.3) installed on a Redhat7.
I have a IDM realm connected to an AD via trust relationship.
In the IDM realm there are Redhat6 and Redhat5 clients.
My client ask to be able to connect to the Linux machine with their AD without entering their domain (just username). On Redhat 6 there is an option for sssd (default_domain_suffix=)
Seems to be exactly what I need, but I have a problem. If I use this option, I can indeed login with my AD username with domain name, but I cannot login with my Linux IDM username anymore, even if I use my fully qualified username at realm. i.e. In the middle of the PAM authentication it seems to fails (when ssh to the machine with ssh <server> -l admin@<realm>, I get Write failed: Broken pipe). If needed I can send more logs.
I reproduce the problem in a more simple environment: just a Linux realm, and default_domain_suffix set to a inexistant domain, and again I cannot ssh to my server with my fully qualified username at realm
Here is my sssd.conf:
[domain/idm1]
cache_credentials = True
krb5_store_password_if_offline = True
ipa_domain = idm1
id_provider = ipa
auth_provider = ipa
access_provider = ipa
ipa_hostname = dc.idm1
chpass_provider = ipa
ipa_server = dc.idm1
ipa_server_mode = True
ldap_tls_cacert = /etc/ipa/ca.crt
[sssd]
services = nss, pam, ssh
config_file_version = 2
domains = idm1
default_domain_suffix=toto.com
[nss]
[pam]
[sudo]
[autofs]
[ssh]
[pac]
Here is my krb5.conf:
includedir /var/lib/sss/pubconf/krb5.include.d/
[logging]
default = FILE:/var/log/krb5libs.log
kdc = FILE:/var/log/krb5kdc.log
admin_server = FILE:/var/log/kadmind.log
[libdefaults]
default_realm = IDM1
dns_lookup_realm = false
dns_lookup_kdc = true
rdns = false
ticket_lifetime = 24h
forwardable = yes
default_ccache_name = KEYRING:persistent:%{uid}
ignore_acceptor_hostname = true
[realms]
IDM1 = {
kdc = dc.idm1:88
master_kdc = dc.idm1:88
admin_server = dc.idm1:749
default_domain = idm1
pkinit_anchors = FILE:/etc/ipa/ca.crt
}
[domain_realm]
.idm1 = IDM1
idm1 = IDM1
[dbmodules]
IDM1 = {
db_library = ipadb.so
}
is there something to add to make it working?
Site note: also with Redhat5 which is configured following ipa-advise sssd-before-1.9, the default_domain_suffix is not understood with sssd<1.9. Is there a way to connect to force RHEL5 to let my windows user connect without entering their domain. I don’t know if there is a way to tune the compatibility tree return by the ldap server for example.
Or should I try to compile sssd 1.9 for RHEL5? (but I guess this is easier said than done) or it doesn’t worth it? (incompatibility with kerberos, or with the RHEL5 kernel…)
Regards,
Nicolas Zin
More information about the Freeipa-users
mailing list