Re: [Freeipa-users] IPA-AD Login

2016-02-05 Thread Alan P
Thanks jhrozek, I have already seen it and applied to my IPA server, but it 
didn't have any significant impact, at least for AD users. In krb5kdc log, when 
I try to login with an IPA user in Windows, I can see the next:

Feb 05 17:52:12 master.ipa.ad.example.com krb5kdc[14081](info): AS_REQ (6 
etypes {18 17 23 24 -135 3}) 172.19.21.37: NEEDED_PREAUTH: 
ipa.u...@ipa.ad.example.com for krbtgt/ipa.ad.example@ipa.ad.example.com, 
Additional pre-authentication required
Feb 05 17:52:12 master.ipa.ad.example.com krb5kdc[14081](info): closing down fd 
12
Feb 05 17:52:12 master.ipa.ad.example.com krb5kdc[14081](info): AS_REQ (6 
etypes {18 17 23 24 -135 3}) 172.19.21.37: ISSUE: authtime 1454716332, etypes 
{rep=18 tkt=18 ses=18}, ipa.u...@ipa.ad.example.com for 
krbtgt/ipa.ad.example@ipa.ad.example.com
Feb 05 17:52:12 master.ipa.ad.example.com krb5kdc[14081](info): closing down fd 
12
Feb 05 17:52:12 master.ipa.ad.example.com krb5kdc[14081](info): TGS_REQ (5 
etypes {18 17 23 24 -135}) 172.19.21.37: ISSUE: authtime 1454716332, etypes 
{rep=18 tkt=18 ses=18}, ipa.u...@ipa.ad.example.com for 
krbtgt/ad.example@ipa.ad.example.com
Feb 05 17:52:12 master.ipa.ad.example.com krb5kdc[14081](info): closing down fd 
12
Feb 05 17:58:45 master.ipa.ad.example.com krb5kdc[14081](info): TGS_REQ (5 
etypes {18 17 23 24 -135}) 172.19.21.37: ISSUE: authtime 1454716332, etypes 
{rep=18 tkt=18 ses=18}, ipa.u...@ipa.ad.example.com for 
cifs/master.ipa.ad.example@ipa.ad.example.com
Feb 05 17:58:45 master.ipa.ad.example.com krb5kdc[14081](info): closing down fd 
12
Feb 05 17:58:47 master.ipa.ad.example.com krb5kdc[14081](info): TGS_REQ (5 
etypes {18 17 23 24 -135}) 172.19.21.37: LOOKING_UP_SERVER: authtime 0,  
ipa.u...@ipa.ad.example.com for 
ProtectedStorage/master.ipa.ad.example@ipa.ad.example.com, Server not found 
in Kerberos database
Feb 05 17:58:47 master.ipa.ad.example.com krb5kdc[14081](info): closing down fd 
12


In Windows, I can't find something related.

Any other suggestion?


> Date: Fri, 5 Feb 2016 09:33:25 +0100
> From: jhro...@redhat.com
> To: freeipa-users@redhat.com
> Subject: Re: [Freeipa-users] IPA-AD Login
> 
> On Thu, Feb 04, 2016 at 01:15:17PM -0600, Alan P wrote:
> > Hi, 
> > 
> > I just configured a trust between an IPA and an Active Directory to 
> > authenticate IPA users in Windows machines joined in AD domain. The login 
> > is successfull, but only after several minutes (nearly 25 minutes) in the 
> > first attempt; in the next attempts, the required time goes from 5 to 10 
> > min. So, what can I do to reduce the time to something more acceptable? 
> > (For reference, when an AD user authenticates it only takes 10 seconds or 
> > less).
> > 
> > My environment is:
> > 
> > IPA server 4.2.0-15 in a RHEL 7.2
> > IPA domain is a subdomain of AD (like ad.example.com and ipa.ad.example.com)
> > There are, right now, a few users but is planed to manage more than 10,000
> > The trust was configured as "two way"
> > 
> > AD is in a Windows Server 2012
> > It has the root domain
> > I  made a domain delegation, so AD is authoritative for ad.example.com and 
> > IPA, for ipa.ad.example.com
> > All windows client machines are joined here
> > There are a few users, but they are only for test purposes
> > 
> > The authentication in a windows client is:
> > user: IPA.AD.EXAMPLE.COM\ipa.user
> > pass: ipa user pass
> > 
> > >From IPA console I can make kinit user...@ad.example.com with no problem.
> 
> Please see:
> 
> https://jhrozek.wordpress.com/2015/08/19/performance-tuning-sssd-for-large-ipa-ad-trust-deployments/
> 
> We're working on sssd performance fixes for the next version (1.14, will
> be in RHEL-7.3)
> 
> -- 
> Manage your subscription for the Freeipa-users mailing list:
> https://www.redhat.com/mailman/listinfo/freeipa-users
> Go to http://freeipa.org for more info on the project
  -- 
Manage your subscription for the Freeipa-users mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-users
Go to http://freeipa.org for more info on the project

[Freeipa-users] IPA-AD Login

2016-02-04 Thread Alan P
Hi, 

I just configured a trust between an IPA and an Active Directory to 
authenticate IPA users in Windows machines joined in AD domain. The login is 
successfull, but only after several minutes (nearly 25 minutes) in the first 
attempt; in the next attempts, the required time goes from 5 to 10 min. So, 
what can I do to reduce the time to something more acceptable? (For reference, 
when an AD user authenticates it only takes 10 seconds or less).

My environment is:

IPA server 4.2.0-15 in a RHEL 7.2
IPA domain is a subdomain of AD (like ad.example.com and ipa.ad.example.com)
There are, right now, a few users but is planed to manage more than 10,000
The trust was configured as "two way"

AD is in a Windows Server 2012
It has the root domain
I  made a domain delegation, so AD is authoritative for ad.example.com and IPA, 
for ipa.ad.example.com
All windows client machines are joined here
There are a few users, but they are only for test purposes

The authentication in a windows client is:
user: IPA.AD.EXAMPLE.COM\ipa.user
pass: ipa user pass

>From IPA console I can make kinit user...@ad.example.com with no problem.

Thanks.
Alan
  -- 
Manage your subscription for the Freeipa-users mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-users
Go to http://freeipa.org for more info on the project