Thank you Lukas and Jakub,
Lukas: sorry for the typo, my sssd.config reflect the correct parameter name.
i'll test the min and max range then post the results.
 
Jakub: all of a sudden it started working yesterday and i was able to enumerate 
the groups now and yes i have configured two forests in sssd.conf.
 
this is a very large deployment so i hope i can share the results here so it 
can benefits anyone want to implement in large AD environment.
 
you guys did a wonderful job Thanks for that.
if there are any pitfalls i should be aware of please do let me know though to 
take into considerations 
 
Thanks.
 
From: [email protected]
To: [email protected]
Subject: RE: sssd and external trust
Date: Wed, 12 Nov 2014 20:47:27 -0800




another question:
how are you doing with ID collisions in cross realms scenarios?
currently both forest configured with ldap_idmapping_range_size = 20000000
anything less than this sssd will complain its not able to convert SID to unix 
ID and login fail.
 
i didn't configure _range_max parameter, is there any recommendations for 
setting this across the two domains?
 
Thanks
 
 
From: [email protected]
To: [email protected]
Subject: RE: sssd and external trust
Date: Wed, 12 Nov 2014 17:18:00 -0800





it's getting interesting,
I setup the production lab and was able to authenticate against the new forest 
DC fine
but getent group NEWFOREST\\GROUPNAME return 0 results
 
i compiled latest SSSD on RHEL 6.6 
the error i see in the log exactly match this
https://bugzilla.redhat.com/show_bug.cgi?id=1002592
 
when i resolve group in the first forest it works fine, when i try the new 
forest it return 0 results and thing my provider is offline although it  is not!
 
any pointer is appreciated
 
Thanks

 
From: [email protected]
To: [email protected]
Subject: sssd and external trust
Date: Wed, 12 Nov 2014 14:26:21 -0800




 Hi Team,
i have a very complex/large AD setup which SSSD successfully integrated the 
Linux machine onto it.
 
now after acquiring another company we have to integrate a separate AD forest 
which is now trusted by our forest root.
 
I understand that SSSD won't work with external trusts and only support the 
same forest.
 
what is the best practice to allow authentication from the new trusted forest.
 
on my test lab
I added the new forest to a new domain section, then used adcli to create a 
computer account on the new forest.
so technically this Linux machine is now joined to two domains
klist -k show correct entries for both forests
nothing i changed in krb5.conf
 
my tests are positive and i was able to login both forests from my Linux 
machine.
 
is this supported scenario and what is the best practice when having external 
trust?.
 
any detailed guidance will be highly appreciated (no documentation about this 
except for IPA which we don't use)
 
 
Thanks
 
                                                                                
                                                                                
  
_______________________________________________
sssd-users mailing list
[email protected]
https://lists.fedorahosted.org/mailman/listinfo/sssd-users

Reply via email to