[Freeipa-users] AD trust established but users can't login
andrei.brajnicov
andrei.brajnicov at gmail.com
Wed Aug 5 13:42:51 UTC 2015
Hello.
My mission is to install an FreeIPA instance as subdomain of AD, and to
allow AD users to login to some Linux servers. I Installed and
configured it, but i meet a problem, AD users are not allowed to login
to FreeIPA .
A piece of everything:
AD = adexample.com ( 2008R2 )
IPA =ipa.adexample.com
# ipa --version
VERSION: 4.1.0, API_VERSION: 2.112
# sssd --version
1.12.2
# hostname
otp1tst86.ipa.adexample.com
# uname -a
Linux otp1tst86.ipa.adexample.com 3.10.0-229.7.2.el7.x86_64 #1 SMP Tue
Jun 23 22:06:11 UTC 2015 x86_64 x86_64 x86_64 GNU/Linux
# klist
Ticket cache: KEYRING:persistent:0:krb_ccache_1nRCjmt
Default principal: Administrator at ADEXAMPLE.COM
Valid starting Expires Service principal
08/05/2015 16:30:32 08/06/2015 02:14:53
krbtgt/IPA.ADEXAMPLE.COM at ADEXAMPLE.COM
renew until 08/06/2015 16:14:50
08/05/2015 16:14:53 08/06/2015 02:14:53 krbtgt/ADEXAMPLE.COM at ADEXAMPLE.COM
renew until 08/06/2015 16:14:50
# cat sssd.conf
[domain/ipa.adexample.com]
cache_credentials = True
krb5_store_password_if_offline = True
ipa_domain = ipa.adexample.com
id_provider = ipa
auth_provider = ipa
access_provider = ipa
ipa_hostname = otp1tst86.ipa.adexample.com
chpass_provider = ipa
ipa_server = otp1tst86.ipa.adexample.com
ipa_server_mode = True
ldap_tls_cacert = /etc/ipa/ca.crt
subdomains_provider = ipa
[sssd]
services = nss, sudo, pam, ssh, pac
config_file_version = 2
sudo_provider = ldap
ldap_uri = ldap://otp1tst86.ipa.adexample.com
ldap_sudo_search_base = ou=sudoers,dc=ipa, dc=adexample,dc=com
ldap_sasl_mech = GSSAPI
ldap_sasl_authid = host/otp1tst86.ipa.adexample.com
ldap_sasl_realm = IPA.ADEXAMPLE.COM
krb5_server = otp1tst86.ipa.adexample.com
domains = ipa.adexample.com
[nss]
homedir_substring = /home
[pam]
[sudo]
[autofs]
[ssh]
[pac]
[ifp]
# egrep "^[^#]" /etc/nsswitch.conf
passwd: files sss
shadow: files sss
group: files sss
hosts: files dns wins
bootparams: nisplus [NOTFOUND=return] files
ethers: files
netmasks: files
networks: files
protocols: files
rpc: files
services: files sss
netgroup: files sss
publickey: nisplus
automount: files sss
aliases: files nisplus
sudoers: files sss
Here I can see AD users.
# wbinfo -ug
ADEXAMPLE\administrator
ADEXAMPLE\guest
ADEXAMPLE\krbtgt
ADEXAMPLE\abrajnicov
ADEXAMPLE\ipa$
ADEXAMPLE\kuzea
admins
editors
default smb group
ad_admins
ADEXAMPLE\domain computers
ADEXAMPLE\domain controllers
ADEXAMPLE\schema admins
ADEXAMPLE\enterprise admins
ADEXAMPLE\domain admins
ADEXAMPLE\domain users
ADEXAMPLE\domain guests
ADEXAMPLE\group policy creator owners
ADEXAMPLE\read-only domain controllers
ADEXAMPLE\enterprise read-only domain controllers
ADEXAMPLE\dnsupdateproxy
[root at otp1tst86 ~]# id admin at IPA.ADEXAMPLE.COM
uid=1466400000(admin) gid=1466400000(admins) groups=1466400000(admins)
[root at otp1tst86 ~]# id kuzea at ADEXAMPLE.COM
id: kuzea at ADEXAMPLE.COM: no such user
So you can see that AD users is not visible to sssd.
# cat /etc/krb5.conf
includedir /var/lib/sss/pubconf/krb5.include.d/
[logging]
default = FILE:/var/log/krb5libs.log
kdc = FILE:/var/log/krb5kdc.log
admin_server = FILE:/var/log/kadmind.log
[libdefaults]
default_realm = IPA.ADEXAMPLE.COM
dns_lookup_realm = false
dns_lookup_kdc = true
rdns = false
ticket_lifetime = 24h
forwardable = yes
udp_preference_limit = 0
default_ccache_name = KEYRING:persistent:%{uid}
[realms]
IPA.ADEXAMPLE.COM = {
kdc = otp1tst86.ipa.adexample.com:88
master_kdc = otp1tst86.ipa.adexample.com:88
admin_server = otp1tst86.ipa.adexample.com:749
default_domain = ipa.adexample.com
pkinit_anchors = FILE:/etc/ipa/ca.crt
auth_to_local =
RULE:[1:$1@$0](^.*@ADEXAMPLE.COM$)s/@ADEXAMPLE.COM/@adexample.com/
auth_to_local = DEFAULT
}
[domain_realm]
.ipa.adexample.com = IPA.ADEXAMPLE.COM
ipa.adexample.com = IPA.ADEXAMPLE.COM
.adexample.com = ADEXAMPLE.COM
adexample.com = ADEXAMPLE.COM
[dbmodules]
IPA.ADEXAMPLE.COM = {
db_library = ipadb.so
}
# wbinfo -n 'adexample\Domain Admins'
S-1-5-21-4094320520-3357938610-121029971-512 SID_DOM_GROUP (2)
But when I try to login to a server using ssh I meet these error:
Aug 05 16:40:28 otp1tst86.ipa.adexample.com sshd[3997]: Invalid user
kuzea at adexample.com from ::1
Aug 05 16:40:28 otp1tst86.ipa.adexample.com sshd[3997]:
input_userauth_request: invalid user kuzea at adexample.com [preauth]
Aug 05 16:40:34 otp1tst86.ipa.adexample.com sshd[3997]:
pam_unix(sshd:auth): check pass; user unknown
Aug 05 16:40:34 otp1tst86.ipa.adexample.com sshd[3997]:
pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0
tty=ssh ruser= rhost=localhost
Aug 05 16:40:37 otp1tst86.ipa.adexample.com sshd[3997]: Failed password
for invalid user kuzea at adexample.com from ::1 port 32809 ssh2
I don't know if these information is sufficient. But I hope that someone
will help me to troubleshoot the problem.
More information about the Freeipa-users
mailing list