> On 2 Aug 2017, at 20:43, Louis Garcia <[email protected]> wrote:
>
> On Wed, Aug 2, 2017 at 11:42 AM, Jakub Hrozek <[email protected]
> <mailto:[email protected]>> wrote:
> On Wed, Aug 02, 2017 at 11:07:08AM -0400, Louis Garcia wrote:
> > On Wed, Aug 2, 2017 at 8:54 AM, Jakub Hrozek <[email protected]
> > <mailto:[email protected]>> wrote:
> >
> > > On Wed, Aug 02, 2017 at 02:43:35PM +0200, Jakub Hrozek wrote:
> > > > On Wed, Aug 02, 2017 at 09:46:43AM +0200, Lukas Slebodnik wrote:
> > > > > On (02/08/17 09:43), Jakub Hrozek wrote:
> > > > > >On Tue, Aug 01, 2017 at 04:46:32PM -0400, Louis Garcia wrote:
> > > > > >> In fedora 26 where should sssd.conf live? /etc/sssd/ or
> > > /etc/sssd/conf.d/
> > > > > >> ??
> > > > > >
> > > > > >Ah, in fedora-26, this setup might be a bit more problematic because
> > > > > >sssd by default serves files already. Can you try something like this
> > > > > >please (untested):
> > > > > >
> > > > > IMHO it is not more problematic it's simpler :-)
> > > >
> > > > Yeah, but users who upgrade (or follow my old blog post) get stuck. I
> > > > can update the blog post, not sure what else can we do about the
> > > > existing configurations except for hardcoding id_provider=proxy and
> > > > proxy_lib_name=files.
> > >
> > > sorry, I meant "hardcoding a check if the user is already running
> > > id_provider=proxy with lib_name=files and disabling the implicit domain,
> > > then". Because the user is already running pretty much the same
> > > configuration as the files provider, but because the implicit files are
> > > always configured before the explicit domains, this kind of explicit
> > > domain is never reached..
> > >
> > > >
> > > > >
> > > > > >[sssd]
> > > > > >services = nss, pam
> > > > > ># this was missing in your original config
> > > > > >domains = kerberos
> > > > > >
> > > > > >[nss]
> > > > > >filter_groups = root
> > > > > >filter_users = root
> > > > > >
> > > > > >[pam]
> > > > > >offline_credentials_expiration = 2
> > > > > >offline_failed_login_attempts = 3
> > > > > >offline_failed_login_delay = 5
> > > > > >
> > > > > >[domain/kerberos]
> > > > > ># files provider instead of proxy
> > > > > >id_provider = files
> > > > > >
> > > > > >auth_provider = krb5
> > > > > >chpass_provider = krb5
> > > > > >krb5_realm = MONTCLAIRE.LOCAL
> > > > > >krb5_server = panther.montclaire.local
> > > > > >
> > > > > >cache_credentials = True
> > > > > >krb5_store_password_if_offline = True
> > > > >
> > > > > If that configuration does not help then please follow our
> > > troubleshooting wiki
> > > > > https://docs.pagure.org/SSSD.sssd/users/troubleshooting.html
> > > > > <https://docs.pagure.org/SSSD.sssd/users/troubleshooting.html>
> > > #troubleshooting-authentication-password-change-and-access-control
> > > > >
> > > > > LS
> > > > > _______________________________________________
> > > > > sssd-users mailing list -- [email protected]
> > > > > <mailto:[email protected]>
> > > > > To unsubscribe send an email to [email protected]
> > > osted.org <http://osted.org/>
> > > > _______________________________________________
> > > > sssd-users mailing list -- [email protected]
> > > > <mailto:[email protected]>
> > > > To unsubscribe send an email to [email protected]
> > > > <mailto:[email protected]>
> > > _______________________________________________
> > > sssd-users mailing list -- [email protected]
> > > <mailto:[email protected]>
> > > To unsubscribe send an email to [email protected]
> > > <mailto:[email protected]>
> > >
> >
> >
> > Ok I'm still not logged on to my realm but I got new logs. Not sure if this
> > list accepts attachments but sssd_kerberos.log is quite long.
>
> It does, but it might be better to gzip the logs so that you don't get
> over the attachment limit so easily.
>
> > In that log i see user: louisgtwo@kerberos which is not right.
>
> This is just the internal name that sssd uses, not the principal. This
> can be ignored.
>
> > I login to
> > my realm as [email protected]
>
> Well, according to the logs, sssd didn't even receive the
> PAM_AUTHENTICATE request. I wonder how exactly is your PAM stack set up
> like?
>
> Also, there are some messages that I wouldn't expect (requests returning
> EINVAL in the file provider, those requests should be just returned from
> the cache..). However, this shouldn't abort the authentication if it
> even got to SSSD.
>
> So, could you please attach also /etc/pam.d/* and also add debug_level
> to the nss and pam sections so that we see the PAM stack but also the
> requests that triggered the EINVAL return codes?
>
> Thank you.
>
>
> >
> > sssd.conf:
> > [sssd]
> > services = nss, pam
> > domains = kerberos
> >
> > [nss]
> > filter_groups = root
> > filter_users = root
> >
> > [pam]
> > offline_credentials_expiration = 2
> > offline_failed_login_attempts = 3
> > offline_failed_login_delay = 5
> >
> > [domain/kerberos]
> > id_provider = files
> > debug_level = 5
> >
> > auth_provider = krb5
> > chpass_provider = krb5
> > krb5_realm = MONTCLAIRE.LOCAL
> > krb5_server = panther.montclaire.local
> >
> > cache_credentials = True
> > krb5_store_password_if_offline = True
>
>
> > _______________________________________________
> > sssd-users mailing list -- [email protected]
> > <mailto:[email protected]>
> > To unsubscribe send an email to [email protected]
> > <mailto:[email protected]>
> _______________________________________________
> sssd-users mailing list -- [email protected]
> <mailto:[email protected]>
> To unsubscribe send an email to [email protected]
> <mailto:[email protected]>
>
>
> Is this the correct command for fedora 26?
> #authconfig --enablesssd --enablesssdauth --enablekrb5 --update
>
>
> do I add debug_level or debug_level = 5 to the nss and pam sections of
> sssd.conf?
I don’t think you need to pass —enablekrb5, just enable sssd and sssd auth btw
this sssd configuration worked for me:
[sssd]
domains = files
services = nss,pam
[domain/files]
id_provider = files
auth_provider = krb5
krb5_server = <redacted>
krb5_realm = REDHAT.COM <http://redhat.com/>
Using this (default I think?) PAM configuration:
cat /etc/pam.d/system-auth
# This file is auto-generated.
auth required pam_env.so
auth required pam_faildelay.so delay=2000000
auth [default=1 ignore=ignore success=ok] pam_succeed_if.so uid >= 1000
quiet
auth [default=1 ignore=ignore success=ok] pam_localuser.so
auth sufficient pam_unix.so nullok try_first_pass
auth requisite pam_succeed_if.so uid >= 1000 quiet_success
auth sufficient pam_sss.so forward_pass
auth required pam_deny.so
account required pam_unix.so
account sufficient pam_localuser.so
account sufficient pam_succeed_if.so uid < 1000 quiet
account [default=bad success=ok user_unknown=ignore] pam_sss.so
account required pam_permit.so
password requisite pam_pwquality.so try_first_pass local_users_only
retry=3 authtok_type=
password sufficient pam_unix.so md5 nullok try_first_pass use_authtok
password sufficient pam_sss.so use_authtok
password required pam_deny.so
session optional pam_keyinit.so revoke
session required pam_limits.so
-session optional pam_systemd.so
session [success=1 default=ignore] pam_succeed_if.so service in crond quiet
use_uid
session required pam_unix.so
session optional pam_sss.so
_______________________________________________
sssd-users mailing list -- [email protected]
To unsubscribe send an email to [email protected]