[SSSD-users] Re: sssd.conf sections only work if they reflect existing AD domain, why?

2018-09-03 Thread Daniele Raffo
Thanks a lot, it works.  Changed

simple_allow_groups = Simple Users(a)FOOBAR.GLOBAL 

to

simple_allow_groups = Simple Users(a)FOOBAR_NOLOGIN.GLOBAL 

and it works as intended.
One thing to keep in mind: These AD users must now be referenced in Linux (e.g. 
in /etc/sudoers) not by their AD domain of origin but by their sssd section 
domain, e.g simpleuser@FOOBAR_NOLOGIN.GLOBAL.
For simplicity I also changed the other sssd section to [domain/FOOBAR.GLOBAL], 
and works fine.

Many thanks for your assistance.
___
sssd-users mailing list -- sssd-users@lists.fedorahosted.org
To unsubscribe send an email to sssd-users-le...@lists.fedorahosted.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedorahosted.org/archives/list/sssd-users@lists.fedorahosted.org


[SSSD-users] Re: sssd.conf sections only work if they reflect existing AD domain, why?

2018-09-03 Thread Jakub Hrozek
SSSD logs would show this better, but I wonder if this is related to also using 
the AD domain name in the simple access filter. Do logins work if you use the 
name of the sssd section there instead of the AD domain name? Or, do the logins 
work if you comment out the access provider for a test?

> On 3 Sep 2018, at 10:32, D R  wrote:
> 
> An user belonging to the Simple Users group is resolved correctly via either 
> one of these commands:
> 
> id simpleuser@FOOBAR_NOLOGIN.GLOBAL
> id simpleuser@FOOBAR.GLOBAL
> 
> Similarly, an user belonging to the Administrators group can be seen via 
> either one of these commands:
> 
> id adminuser@FOOBAR_ADMINS.GLOBAL
> id adminuser@FOOBAR.GLOBAL
> 
> However, no user is able to log in.  I've tried all these commands:
> 
> ssh simpleuser@FOOBAR_NOLOGIN.GLOBAL@
> ssh simpleuser@FOOBAR.GLOBAL@
> ssh adminuser@FOOBAR_ADMINS.GLOBAL@
> ssh adminuser@FOOBAR.GLOBAL@
> 
> Here's the ssh -vvv output after that  requests the password: 
> 
> debug3: send packet: type 50
> debug2: we sent a password packet, wait for reply
> Authentication failed.
> ___
> sssd-users mailing list -- sssd-users@lists.fedorahosted.org
> To unsubscribe send an email to sssd-users-le...@lists.fedorahosted.org
> Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
> List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
> List Archives: 
> https://lists.fedorahosted.org/archives/list/sssd-users@lists.fedorahosted.org
___
sssd-users mailing list -- sssd-users@lists.fedorahosted.org
To unsubscribe send an email to sssd-users-le...@lists.fedorahosted.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedorahosted.org/archives/list/sssd-users@lists.fedorahosted.org


[SSSD-users] Re: sssd.conf sections only work if they reflect existing AD domain, why?

2018-09-03 Thread D R
An user belonging to the Simple Users group is resolved correctly via either 
one of these commands:

id simpleuser@FOOBAR_NOLOGIN.GLOBAL
id simpleuser@FOOBAR.GLOBAL

Similarly, an user belonging to the Administrators group can be seen via either 
one of these commands:

id adminuser@FOOBAR_ADMINS.GLOBAL
id adminuser@FOOBAR.GLOBAL

However, no user is able to log in.  I've tried all these commands:

ssh simpleuser@FOOBAR_NOLOGIN.GLOBAL@
ssh simpleuser@FOOBAR.GLOBAL@
ssh adminuser@FOOBAR_ADMINS.GLOBAL@
ssh adminuser@FOOBAR.GLOBAL@

Here's the ssh -vvv output after that  requests the password: 

debug3: send packet: type 50
debug2: we sent a password packet, wait for reply
Authentication failed.
___
sssd-users mailing list -- sssd-users@lists.fedorahosted.org
To unsubscribe send an email to sssd-users-le...@lists.fedorahosted.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedorahosted.org/archives/list/sssd-users@lists.fedorahosted.org


[SSSD-users] Re: sssd.conf sections only work if they reflect existing AD domain, why?

2018-09-03 Thread Jakub Hrozek


> On 31 Aug 2018, at 17:34, Daniele Raffo  wrote:
> 
> Hello,
> 
> I'm trying to define two sssd groups in order to assign a different login 
> shell to AD users belonging to two different AD groups in our domain 
> FOOBAR.GLOBAL.
> However, all users are unable to login and get an error "Authentication 
> failed”.  

Are you able to at least resolve the users? What exact name are you using to 
resolve the users, username@foobar_nologin.global or username@foobar.global? 
The former would work, the latter would not.

btw if all you want is to munge the shell based on group memberships, maybe the 
sss_override tool would help?

> If I change a sssd section to [domain/FOOBAR.GLOBAL] so to reflect the 
> existing AD domain, users defined in that sssd group are able to login.  
> However, clearly in this way I cannot define more than one section.
> Why is that?  How to define sssd sections with names different than the 
> existing AD domain?
> 
> Thanks in advance.  Below is my sssd.conf.
> 
> 
> [sssd]
> domains = FOOBAR_ADMINS.GLOBAL,FOOBAR_NOLOGIN.GLOBAL
> config_file_version = 2
> services = nss, pam
> 
> [domain/FOOBAR_NOLOGIN.GLOBAL]
> ldap_user_search_filter = (memberOf=CN=Simple Users,OU=Security 
> Groups,DC=FOOBAR,DC=GLOBAL)
> default_shell = /bin/sh
> ad_server = ad01.foobar.global
> ad_domain = FOOBAR.GLOBAL
> krb5_realm = FOOBAR.GLOBAL
> realmd_tags = manages-system joined-with-adcli 
> cache_credentials = False
> id_provider = ad
> krb5_store_password_if_offline = True
> ldap_id_mapping = True
> use_fully_qualified_names = True
> fallback_homedir = /home/%u@%d
> access_provider = simple
> simple_allow_groups = Simple Users@FOOBAR.GLOBAL
> 
> [domain/FOOBAR_ADMINS.GLOBAL]
> ldap_user_search_filter = (memberOf=CN=Administrators,OU=Security 
> Groups,DC=FOOBAR,DC=GLOBAL)
> default_shell = /bin/bash
> ad_server = ad01.foobar.global
> ad_domain = FOOBAR.GLOBAL
> krb5_realm = FOOBAR.GLOBAL
> realmd_tags = manages-system joined-with-adcli 
> cache_credentials = False
> id_provider = ad
> krb5_store_password_if_offline = True
> ldap_id_mapping = True
> use_fully_qualified_names = True
> fallback_homedir = /home/%u@%d
> access_provider = simple
> simple_allow_groups = Administrators@FOOBAR.GLOBAL
> ___
> sssd-users mailing list -- sssd-users@lists.fedorahosted.org
> To unsubscribe send an email to sssd-users-le...@lists.fedorahosted.org
> Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
> List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
> List Archives: 
> https://lists.fedorahosted.org/archives/list/sssd-users@lists.fedorahosted.org
___
sssd-users mailing list -- sssd-users@lists.fedorahosted.org
To unsubscribe send an email to sssd-users-le...@lists.fedorahosted.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedorahosted.org/archives/list/sssd-users@lists.fedorahosted.org


[SSSD-users] Re: sssd.conf sections only work if they reflect existing AD domain, why?

2018-08-31 Thread Daniele Raffo
If you're reading this via web, note that the @ sign got mutated to (a) in the 
simple_allow_groups configuration lines.
___
sssd-users mailing list -- sssd-users@lists.fedorahosted.org
To unsubscribe send an email to sssd-users-le...@lists.fedorahosted.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedorahosted.org/archives/list/sssd-users@lists.fedorahosted.org