Yeah, But my default id range starts with 770000 but all my existing infrastructure uid's are within 4 digits like 4147,8921,9756 like this. Here I am facing an issue.
That's why I am creating users with default id range and then later I am modifying it via uid's as per my infrastructure then ipantuserattrs created and I am able to authenticate with password. Can you suggest to me that with this setup i can easily handle 350Users for around 400 servers across different different locations with cache of storing on ipa clients. On Tue, Nov 28, 2023 at 2:00 PM Alexander Bokovoy <[email protected]> wrote: > Please don't drop mailing list. > > On Аўт, 28 ліс 2023, Pradeep KNS wrote: > >Hey Alexander, > > > >Thanks For the Reply. > > > >But in my case i have fixed it by recreating the user on Ipa web UI and > >observing ipantuserattrs created password logins are working fine. > > > >But do I face any issues if I try to modify the base id range manually? as > >per redhat docs which is not recommended to modify. > > If you have re-created your user and that new one works, it means > underlying infrastructure works properly. Older user entries need to be > fixed. Preferrably through a new ID range, if those entries use IDs > which are outside of the main ID range. > > > > >Also on ipa 4.11 they support dedicated ssh key based > >authentication.Ofcourse now also its working. > > > >My setup is that I have internal dns which is handled by a puppet and > >slowly will move it to a dedicated internal dns server so that's why i > >opted for ipa installation without dns. > > > >On Tue, Nov 28, 2023 at 1:06 PM Alexander Bokovoy <[email protected]> > >wrote: > > > >> On Пан, 27 ліс 2023, Pradeep KNS via FreeIPA-users wrote: > >> >Hi Rob, > >> >Thank you for your email. I've identified the issue. > >> >When attempting to create a user using the 'ipa user-add' command and > >> >defining the UID and GID according to my specifications, the UID falls > >> >within the 4-digit range, for instance, 4141. The > >> >IPA IDs range during installation was set to 770000. Users created > within > >> >this range are accepted with their passwords. However, users created > with > >> >UIDs like 4141 or 4142 encounter issues. > >> > > >> >Looks like attributes, were not creating > >> > > >> >objectclass: top, person, organizationalperson, inetorgperson, > inetuser, > >> >posixaccount, krbprincipalaux, krbticketpolicyaux, ipaobject, > ipasshuser, > >> >ipaSshGroupOfPubKeys, mepOriginEntry, ipantuserattrs > >> > > >> >If i mention uid and gid using ipa user-add command > >> >ipantuserattrs is not getting create. > >> > > >> >I tried to modify default range but it dint happened. > >> > >> See my answers in a parallel thread 'kinit fails on freeipa master: File > >> or directory not found'. > >> > >> > > >> > > >> > > >> >On Mon, 27 Nov 2023 at 9:41 PM, Rob Crittenden <[email protected]> > >> wrote: > >> > > >> >> Pradeep KNS wrote: > >> >> > Hi, > >> >> > I have installed an ipa with internal dns.After installing updated > >> >> > entries on dns as well. > >> >> > > >> >> > My main criteria is to communicate with ipa clients with ssh > keybased > >> >> > authentication which is working fine. > >> >> > > >> >> > Today i tot of i want to test with password based authentication > which > >> >> > is not happening.I dont know where i am missing > >> >> > > >> >> > > >> >> > [[email protected] <mailto:[email protected]>]# ipa --version > >> >> > VERSION: 4.10.1, API_VERSION: 2.251 > >> >> > [[email protected] <mailto:[email protected]>]# > >> >> > > >> >> > ********************** PREVIOUS MESSAGE WAS TRIGGERED BY THE > FOLLOWING > >> >> > BACKTRACE: > >> >> > * (2023-11-23 19:33:16): [krb5_child[11588]] [tgt_req_child] > >> >> > (0x1000): [RID#15] Password was expired > >> >> > >> >> The user's password is expired. > >> >> > >> >> IPA intends that only the end-user knows their password. So if it is > set > >> >> or reset by an administrator the user will need to change it. > >> >> > >> >> Is the user not prompted to reset it? > >> >> > >> >> rob > >> >> > >> >> > * (2023-11-23 19:33:16): [krb5_child[11588]] > [sss_krb5_responder] > >> >> > (0x4000): [RID#15] Got question [password]. > >> >> > * (2023-11-23 19:33:16): [krb5_child[11588]] [map_krb5_error] > >> >> > (0x0020): [RID#15] 2138: [-1765328324][Generic error (see e-text)] > >> >> > ********************** BACKTRACE DUMP ENDS HERE > >> >> > ********************************* > >> >> > > >> >> > ssh log > >> >> > > >> >> > Nov 23 19:33:16 test-example.com <http://test-example.com> > >> sshd[11586]: > >> >> > pam_sss(sshd:auth): authentication failure; logname= uid=0 euid=0 > >> >> > tty=ssh ruser= rhost=10.10.1.1 user=harsh > >> >> > Nov 23 19:33:16 test-example.com <http://test-example.com> > >> sshd[11586]: > >> >> > pam_sss(sshd:auth): received for user harsh: 4 (System error) > >> >> > Nov 23 19:33:18test-example.com <http://18test-example.com> > >> sshd[11584]: > >> >> > error: PAM: Authentication failure for harsh from 10.10.1.1 > >> >> > Nov 23 19:33:20 test-example.com <http://test-example.com> > >> sshd[11584]: > >> >> > Connection closed by authenticating user harsh 10.10.1.1 port 47724 > >> >> > [preauth] > >> >> > >> >> > >> >> > >> > >> > >> > >> > >> -- > >> / Alexander Bokovoy > >> Sr. Principal Software Engineer > >> Security / Identity Management Engineering > >> Red Hat Limited, Finland > >> > >> > > > > > -- > / Alexander Bokovoy > Sr. Principal Software Engineer > Security / Identity Management Engineering > Red Hat Limited, Finland > >
-- _______________________________________________ FreeIPA-users mailing list -- [email protected] To unsubscribe send an email to [email protected] Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedorahosted.org/archives/list/[email protected] Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/new_issue
