Re: [Freeipa-users] domain trust linux to AD server not finding user profiles

2014-10-08 Thread Sumit Bose
On Tue, Oct 07, 2014 at 08:01:48PM -0400, Dmitri Pal wrote:
 On 10/07/2014 05:03 PM, Licause, Al (CSC AMS BCS - UNIX/Linux Network
 Support) wrote:
 
 I've been following the steps outlined in section 7.3.5 of the manual
 entitled
 
 Integrating OpenShift Enterprise
 
 with Identity Management (IdM)
 
 in Red Hat Enterprise Linux
 
 OpenShift Enterprise 2.1
 
 IdM in Red Hat Enterprise Linux 7
 
 Windows Server 2012 - Active Directory Integration
 
 I now have our RHEL V7 running IdM, setup as an IdM Server in a domain,
 Realm and subnet
 
 different from our existing AD server running Windows 2008 R2 with a
 populated user database
 
 that can be queried using ldapsearch and can authorize users.
 
 I have successfully created a domain trust between the RHEL V7 Server
 
 (linux.ipa.cxo.cpqcorp.net 10.20.0.59/24) and the AD Server
 
 (win2008.osn.cxo.cpqcorp.net 16.112.240.55).
 
 To simplify the configuration I have no firewall running and so have
 stopped both iptables
 
 and firewalld.
 
 All steps in section 7.3.5 have been followed.   But when I run the first
 test for a user
 
 on the AD system, the system is unable to find anything:
 
 [root@linux ~]# getent group 'OSN\Domain Users'
 
 [root@linux ~]#
 
 [root@linux ~]#
 
 [root@linux ~]# getent passwd 'OSN\ldap25'
 
 [root@linux ~]#
 
 
 The users and related information are not fetched until you authenticate as
 this user.
 The ability to fetch users and groups that are not yet authenticated is
 tracked by the ticket https://fedorahosted.org/sssd/ticket/2159 and will be
 addressed in the next version of SSSD.
 How frequently do you really need to lookup unauthenticated AD users and AD
 groups on linux systems? What is the use case?

This is correct, but the simple lookups shown above should still work
even for unauthenticated users. What is missing is the full
group-membership of an unauthenticated user and the full list of members
for a group.

Coming back to the issue above, it would be nice if you can increase the
debug level of SSSD running on the host where you call the getent
commands and send the SSSD logs after running the commands. Feel free to
send them to me directly if you think that the logs are too big or might
contain information too sensitive for a public mailing-list.

bye,
Sumit

 
 The ticket above is for the cases when there is an application that needs to
 fetch the user so that admin of the application can assign privileges to
 this user. But this is a pretty corner case.
 
 I find this in the krb5kdc.log file:
 
 Oct 07 16:28:01 linux.ipa.cxo.cpqcorp.net krb5kdc[12908](info): AS_REQ (6
 etypes {18 17 16 23 25 26}) 10.20.0.59: NEEDED_PREAUTH:
 host/linux.ipa.cxo.cpqcorp@ipa.cxo.cpqcorp.net for
 krbtgt/ipa.cxo.cpqcorp@ipa.cxo.cpqcorp.net, Additional
 pre-authentication required
 
 Oct 07 16:28:01 linux.ipa.cxo.cpqcorp.net krb5kdc[12908](info): AS_REQ (6
 etypes {18 17 16 23 25 26}) 10.20.0.59: ISSUE: authtime 1412713681, etypes
 {rep=18 tkt=18 ses=18}, host/linux.ipa.cxo.cpqcorp@ipa.cxo.cpqcorp.net
 for krbtgt/ipa.cxo.cpqcorp@ipa.cxo.cpqcorp.net
 
 Oct 07 16:28:01 linux.ipa.cxo.cpqcorp.net krb5kdc[12908](info): TGS_REQ (6
 etypes {18 17 16 23 25 26}) 10.20.0.59: ISSUE: authtime 1412713681, etypes
 {rep=18 tkt=18 ses=18}, host/linux.ipa.cxo.cpqcorp@ipa.cxo.cpqcorp.net
 for ldap/linux.ipa.cxo.cpqcorp@ipa.cxo.cpqcorp.net
 
 Oct 07 16:28:01 linux.ipa.cxo.cpqcorp.net krb5kdc[12908](info): closing
 down fd 11
 
 I'm not quite sure what else I'm missing or have not understood in order
 to query the
 
 AD server from the linux IdM server...but it would appear that something
 is not correctly
 
 defined in the krb5.conf file found below:
 
 [root@linux ~]# cat /etc/krb5.conf
 
 includedir /var/lib/sss/pubconf/krb5.include.d/
 
 [logging]
 
 default = FILE:/var/log/krb5libs.log
 
 kdc = FILE:/var/log/krb5kdc.log
 
 admin_server = FILE:/var/log/kadmind.log
 
 [libdefaults]
 
 default_realm = IPA.CXO.CPQCORP.NET
 
 dns_lookup_realm = false
 
 dns_lookup_kdc = true
 
 rdns = false
 
 ticket_lifetime = 24h
 
 forwardable = yes
 
 default_ccache_name = KEYRING:persistent:%{uid}
 
 [realms]
 
 IPA.CXO.CPQCORP.NET = {
 
 kdc = linux.ipa.cxo.cpqcorp.net:88
 
 master_kdc = linux.ipa.cxo.cpqcorp.net:88
 
 admin_server = linux.ipa.cxo.cpqcorp.net:749
 
 default_domain = ipa.cxo.cpqcorp.net
 
 pkinit_anchors = FILE:/etc/ipa/ca.crt
 
 auth_to_local = 
 RULE:[1:$1@$0](^.*@OSN.CXO.CPQCORP.NET$)s/@OSN.CXO.CPQCORP.NET/@osn.cxo.cpqcorp.net/
 auth_to_local = DEFAULT
 
 }
 
 OSN.CXO.CPQCORP.NET = {
 
 kdc = win2008.osn.cxo.cpqcorp.net
 
 master_kdc = win2008.osn.cxo.cpqcorp.net
 
 admin_sever = win2008.osn.cxo.cpqcorp.net
 
 }
 
 [domain_realm]
 
 .ipa.cxo.cpqcorp.net = IPA.CXO.CPQCORP.NET
 
 ipa.cxo.cpqcorp.net = IPA.CXO.CPQCORP.NET
 
 .osn.cxo.cpqcorp.net = OSN.CXO.CPQCORP.NET
 
 osn.cxo.cpqcorp.net = OSN.CXO.CPQCORP.NET
 
 [dbmodules]
 
 IPA.CXO.CPQCORP.NET = {
 
 db_library = ipadb.so
 
 }
 
 Any help greatly appreciated.
 
 Al
 

Re: [Freeipa-users] domain trust linux to AD server not finding user profiles

2014-10-08 Thread Loris Santamaria
El mar, 07-10-2014 a las 20:01 -0400, Dmitri Pal escribió:

 
 The users and related information are not fetched until you
 authenticate as this user.
 The ability to fetch users and groups that are not yet authenticated
 is tracked by the ticket https://fedorahosted.org/sssd/ticket/2159 and
 will be addressed in the next version of SSSD.
 How frequently do you really need to lookup unauthenticated AD users
 and AD groups on linux systems? What is the use case?
 
 The ticket above is for the cases when there is an application that
 needs to fetch the user so that admin of the application can assign
 privileges to this user. But this is a pretty corner case.

It is a pretty common request when you configure a proxy server with
authentication. You get the user's ticket but the user is not logged in
on the system, so normal group membership via sssd won't work.

Best regards

-- 
Loris Santamaria   linux user #70506   xmpp:lo...@lgs.com.ve
Links Global Services, C.A.http://www.lgs.com.ve
Tel: 0286 952.06.87  Cel: 0414 095.00.10  sip:1...@lgs.com.ve

If I'd asked my customers what they wanted, they'd have said
a faster horse - Henry Ford

-- 
Manage your subscription for the Freeipa-users mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-users
Go To http://freeipa.org for more info on the project


Re: [Freeipa-users] domain trust linux to AD server not finding user profiles

2014-10-07 Thread Licause, Al (CSC AMS BCS - UNIX/Linux Network Support)


I've been following the steps outlined in section 7.3.5 of the manual entitled

Integrating OpenShift Enterprise
with Identity Management (IdM)
in Red Hat Enterprise Linux
OpenShift Enterprise 2.1
IdM in Red Hat Enterprise Linux 7
Windows Server 2012 - Active Directory Integration

I now have our RHEL V7 running IdM, setup as an IdM Server in a domain, Realm 
and subnet
different from our existing AD server running Windows 2008 R2 with a populated 
user database
that can be queried using ldapsearch and can authorize users.

I have successfully created a domain trust between the RHEL V7 Server
(linux.ipa.cxo.cpqcorp.net 10.20.0.59/24) and the AD Server
(win2008.osn.cxo.cpqcorp.net 16.112.240.55).

To simplify the configuration I have no firewall running and so have stopped 
both iptables
and firewalld.

All steps in section 7.3.5 have been followed.   But when I run the first test 
for a user
on the AD system, the system is unable to find anything:

[root@linux ~]# getent group 'OSN\Domain Users'
[root@linux ~]#
[root@linux ~]#
[root@linux ~]# getent passwd 'OSN\ldap25'
[root@linux ~]#


I find this in the krb5kdc.log file:
Oct 07 16:28:01 linux.ipa.cxo.cpqcorp.net krb5kdc[12908](info): AS_REQ (6 
etypes {18 17 16 23 25 26}) 10.20.0.59: NEEDED_PREAUTH: 
host/linux.ipa.cxo.cpqcorp@ipa.cxo.cpqcorp.net for 
krbtgt/ipa.cxo.cpqcorp@ipa.cxo.cpqcorp.net, Additional pre-authentication 
required
Oct 07 16:28:01 linux.ipa.cxo.cpqcorp.net krb5kdc[12908](info): AS_REQ (6 
etypes {18 17 16 23 25 26}) 10.20.0.59: ISSUE: authtime 1412713681, etypes 
{rep=18 tkt=18 ses=18}, host/linux.ipa.cxo.cpqcorp@ipa.cxo.cpqcorp.net for 
krbtgt/ipa.cxo.cpqcorp@ipa.cxo.cpqcorp.net
Oct 07 16:28:01 linux.ipa.cxo.cpqcorp.net krb5kdc[12908](info): TGS_REQ (6 
etypes {18 17 16 23 25 26}) 10.20.0.59: ISSUE: authtime 1412713681, etypes 
{rep=18 tkt=18 ses=18}, host/linux.ipa.cxo.cpqcorp@ipa.cxo.cpqcorp.net for 
ldap/linux.ipa.cxo.cpqcorp@ipa.cxo.cpqcorp.net
Oct 07 16:28:01 linux.ipa.cxo.cpqcorp.net krb5kdc[12908](info): closing down fd 
11

I'm not quite sure what else I'm missing or have not understood in order to 
query the
AD server from the linux IdM server...but it would appear that something is not 
correctly
defined in the krb5.conf file found below:

[root@linux ~]# cat /etc/krb5.conf
includedir /var/lib/sss/pubconf/krb5.include.d/

[logging]
default = FILE:/var/log/krb5libs.log
kdc = FILE:/var/log/krb5kdc.log
admin_server = FILE:/var/log/kadmind.log

[libdefaults]
default_realm = IPA.CXO.CPQCORP.NET
dns_lookup_realm = false
dns_lookup_kdc = true
rdns = false
ticket_lifetime = 24h
forwardable = yes
default_ccache_name = KEYRING:persistent:%{uid}

[realms]
IPA.CXO.CPQCORP.NET = {
  kdc = linux.ipa.cxo.cpqcorp.net:88
  master_kdc = linux.ipa.cxo.cpqcorp.net:88
  admin_server = linux.ipa.cxo.cpqcorp.net:749
  default_domain = ipa.cxo.cpqcorp.net
  pkinit_anchors = FILE:/etc/ipa/ca.crt
  auth_to_local = 
RULE:[1:$1@$0](^.*@OSN.CXO.CPQCORP.NET$)s/@OSN.CXO.CPQCORP.NET/@osn.cxo.cpqcorp.net/
 auth_to_local = DEFAULT
}

OSN.CXO.CPQCORP.NET = {
  kdc = win2008.osn.cxo.cpqcorp.net
  master_kdc = win2008.osn.cxo.cpqcorp.net
  admin_sever = win2008.osn.cxo.cpqcorp.net
  }

[domain_realm]
.ipa.cxo.cpqcorp.net = IPA.CXO.CPQCORP.NET
ipa.cxo.cpqcorp.net = IPA.CXO.CPQCORP.NET
.osn.cxo.cpqcorp.net = OSN.CXO.CPQCORP.NET
osn.cxo.cpqcorp.net = OSN.CXO.CPQCORP.NET

[dbmodules]
  IPA.CXO.CPQCORP.NET = {
db_library = ipadb.so
  }



Any help greatly appreciated.

Al

Al Licause
CSC Americas BCS Technical Specialist
HP Customer Support Center
Hours 5am-2pm Pacific time USA
Manager: mark.bai...@hp.com

-- 
Manage your subscription for the Freeipa-users mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-users
Go To http://freeipa.org for more info on the project

Re: [Freeipa-users] domain trust linux to AD server not finding user profiles

2014-10-07 Thread Dmitri Pal
On 10/07/2014 05:03 PM, Licause, Al (CSC AMS BCS - UNIX/Linux Network 
Support) wrote:


I've been following the steps outlined in section 7.3.5 of the manual 
entitled


Integrating OpenShift Enterprise

with Identity Management (IdM)

in Red Hat Enterprise Linux

OpenShift Enterprise 2.1

IdM in Red Hat Enterprise Linux 7

Windows Server 2012 - Active Directory Integration

I now have our RHEL V7 running IdM, setup as an IdM Server in a 
domain, Realm and subnet


different from our existing AD server running Windows 2008 R2 with a 
populated user database


that can be queried using ldapsearch and can authorize users.

I have successfully created a domain trust between the RHEL V7 Server

(linux.ipa.cxo.cpqcorp.net 10.20.0.59/24) and the AD Server

(win2008.osn.cxo.cpqcorp.net 16.112.240.55).

To simplify the configuration I have no firewall running and so have 
stopped both iptables


and firewalld.

All steps in section 7.3.5 have been followed.   But when I run the 
first test for a user


on the AD system, the system is unable to find anything:

[root@linux ~]# getent group 'OSN\Domain Users'

[root@linux ~]#

[root@linux ~]#

[root@linux ~]# getent passwd 'OSN\ldap25'

[root@linux ~]#



The users and related information are not fetched until you authenticate 
as this user.
The ability to fetch users and groups that are not yet authenticated is 
tracked by the ticket https://fedorahosted.org/sssd/ticket/2159 and will 
be addressed in the next version of SSSD.
How frequently do you really need to lookup unauthenticated AD users and 
AD groups on linux systems? What is the use case?


The ticket above is for the cases when there is an application that 
needs to fetch the user so that admin of the application can assign 
privileges to this user. But this is a pretty corner case.



I find this in the krb5kdc.log file:

Oct 07 16:28:01 linux.ipa.cxo.cpqcorp.net krb5kdc[12908](info): AS_REQ 
(6 etypes {18 17 16 23 25 26}) 10.20.0.59: NEEDED_PREAUTH: 
host/linux.ipa.cxo.cpqcorp@ipa.cxo.cpqcorp.net for 
krbtgt/ipa.cxo.cpqcorp@ipa.cxo.cpqcorp.net, Additional 
pre-authentication required


Oct 07 16:28:01 linux.ipa.cxo.cpqcorp.net krb5kdc[12908](info): AS_REQ 
(6 etypes {18 17 16 23 25 26}) 10.20.0.59: ISSUE: authtime 1412713681, 
etypes {rep=18 tkt=18 ses=18}, 
host/linux.ipa.cxo.cpqcorp@ipa.cxo.cpqcorp.net for 
krbtgt/ipa.cxo.cpqcorp@ipa.cxo.cpqcorp.net


Oct 07 16:28:01 linux.ipa.cxo.cpqcorp.net krb5kdc[12908](info): 
TGS_REQ (6 etypes {18 17 16 23 25 26}) 10.20.0.59: ISSUE: authtime 
1412713681, etypes {rep=18 tkt=18 ses=18}, 
host/linux.ipa.cxo.cpqcorp@ipa.cxo.cpqcorp.net for 
ldap/linux.ipa.cxo.cpqcorp@ipa.cxo.cpqcorp.net


Oct 07 16:28:01 linux.ipa.cxo.cpqcorp.net krb5kdc[12908](info): 
closing down fd 11


I'm not quite sure what else I'm missing or have not understood in 
order to query the


AD server from the linux IdM server...but it would appear that 
something is not correctly


defined in the krb5.conf file found below:

[root@linux ~]# cat /etc/krb5.conf

includedir /var/lib/sss/pubconf/krb5.include.d/

[logging]

default = FILE:/var/log/krb5libs.log

kdc = FILE:/var/log/krb5kdc.log

admin_server = FILE:/var/log/kadmind.log

[libdefaults]

default_realm = IPA.CXO.CPQCORP.NET

dns_lookup_realm = false

dns_lookup_kdc = true

rdns = false

ticket_lifetime = 24h

forwardable = yes

default_ccache_name = KEYRING:persistent:%{uid}

[realms]

IPA.CXO.CPQCORP.NET = {

kdc = linux.ipa.cxo.cpqcorp.net:88

master_kdc = linux.ipa.cxo.cpqcorp.net:88

admin_server = linux.ipa.cxo.cpqcorp.net:749

default_domain = ipa.cxo.cpqcorp.net

pkinit_anchors = FILE:/etc/ipa/ca.crt

auth_to_local = 
RULE:[1:$1@$0](^.*@OSN.CXO.CPQCORP.NET$)s/@OSN.CXO.CPQCORP.NET/@osn.cxo.cpqcorp.net/ 
auth_to_local = DEFAULT


}

OSN.CXO.CPQCORP.NET = {

kdc = win2008.osn.cxo.cpqcorp.net

master_kdc = win2008.osn.cxo.cpqcorp.net

admin_sever = win2008.osn.cxo.cpqcorp.net

}

[domain_realm]

.ipa.cxo.cpqcorp.net = IPA.CXO.CPQCORP.NET

ipa.cxo.cpqcorp.net = IPA.CXO.CPQCORP.NET

.osn.cxo.cpqcorp.net = OSN.CXO.CPQCORP.NET

osn.cxo.cpqcorp.net = OSN.CXO.CPQCORP.NET

[dbmodules]

IPA.CXO.CPQCORP.NET = {

db_library = ipadb.so

}

Any help greatly appreciated.

Al

*Al Licause*

*CSC Americas BCS Technical Specialist*

*HP Customer Support Center*

*Hours 5am-2pm Pacific time USA*

*Manager: mark.bai...@hp.com*






--
Thank you,
Dmitri Pal

Sr. Engineering Manager IdM portfolio
Red Hat, Inc.

-- 
Manage your subscription for the Freeipa-users mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-users
Go To http://freeipa.org for more info on the project