On Tue, Jan 19, 2016 at 03:15:01PM +0100, Sumit Bose wrote:
> On Mon, Jan 18, 2016 at 04:48:40PM +0100, Jakub Hrozek wrote:
> > On Mon, Jan 18, 2016 at 01:53:27PM +0100, Sumit Bose wrote:
> > > Thank you for the review. New version attached.
> > > 
> > > bye,
> > > Sumit
> > 
> > Thank you, the patch now look good to me and seem to work well. I see
> > this message in adcli output:
> >     ! Couldn't set userAccountControl on computer account: 
> > CN=ADCLIENT,CN=Computers,DC=win,DC=trust,DC=test: Insufficient access
> 
> yes, this is expected. adcli can update other attributes as well, but in
> general the permissions the host princiapal has are not sufficient.
> 
> > 
> > but the keytab was updated successfully.
> > 
> > I also wonder if you considered using the -S option to run the update
> > against the server sssd talks to? From experience I know that many
> > environments restrict access to parts of their AD domain. It's not a big
> > deal, though, because failing to renew the keytab is non-fatal..
> 
> That's a good idea. I added three new patches on top of the existing
> ones to add this. I used the failover code to get the active server
> because I found this more accessible here compared to getting the LDAP
> connection internals to call getpeername(). If you don't like it I think
> I would prefer to just commit the initial 3 patches and create a ticket
> to add -S support.
> 
> bye,
> Sumit

Thank you, the patches seem to work well. I tested by assigning a client
to a site, then the LDAP lookups as well as the keytab renewal
communicated with the DC in site. Then I hardcoded a DC with 'ad_server'
and the communication was always directed to the hardcoded DC.

ACK

I will just run Coverity and CI before pushing to be sure..
_______________________________________________
sssd-devel mailing list
sssd-devel@lists.fedorahosted.org
https://lists.fedorahosted.org/admin/lists/sssd-devel@lists.fedorahosted.org

Reply via email to