On Fri, Aug 18, 2017 at 12:54 PM, Louis Garcia <[email protected]> wrote:

> On Fri, Aug 18, 2017 at 12:24 PM, Louis Garcia <[email protected]>
> wrote:
>
>> On Fri, Aug 18, 2017 at 11:58 AM, Louis Garcia <[email protected]>
>> wrote:
>>
>>> On Fri, Aug 18, 2017 at 4:08 AM, Jakub Hrozek <[email protected]>
>>> wrote:
>>>
>>>> On Fri, Aug 18, 2017 at 08:42:34AM +0200, Lukas Slebodnik wrote:
>>>> > On (17/08/17 12:38), Louis Garcia wrote:
>>>> > >Sorry to mail you directly but I think the sssd user mailing list is
>>>> not
>>>> > >accepting my emails. I replied twice to this thread yesterday and
>>>> both
>>>> > >bounced.
>>>> > >
>>>> >
>>>>
>>>> > I have no idea why you have problems to send a mails there.
>>>>
>>>> Sorry, this is partially my fault. I should be watching the moderation
>>>> queue, but lately we've been getting so much spam (sometimes one spam
>>>> attempt per hour) that I overlooked your e-mail.
>>>>
>>>> You can subscribe to the list and then your messages will go right to
>>>> the list w/o the moderation queue!
>>>>
>>>
>>> [email protected]
>>> Aug 15 (3 days ago)
>>>
>>>
>>> to me
>>> Welcome to the "sssd-users" mailing list!
>>>
>>
>> I subscribed here: https://lists.fedorahosted.org
>> /admin/lists/sssd-users.lists.fedorahosted.org/ and I receive all emails
>> from the list but I don't have a user account.
>> How do I properly subscribe?
>>
>>
> I test by login out of gnome and login back in. After I open a terminal
> and run klist
>
> klist: Credentials cache keyring 'persistent:1000:1000' not found
>
> Then I need to kinit and if I klist again
>
> Ticket cache: KEYRING:persistent:1000:1000
> Default principal: [email protected]
>
> Valid starting       Expires              Service principal
> 08/18/2017 12:33:50  08/19/2017 12:33:33  krbtgt/MONTCLAIRE.LOCAL@
> MONTCLAIRE.LOCAL
>
>
> after that I can ssh and mount nfs4 krb5p. I want to receive my ticket
> when I login.
>
> I am not sure how to search journald. I used 'journalctl -u pam' with no
> effect
>
> #cat /etc/pam.d/system-auth
> #%PAM-1.0
> # This file is auto-generated.
> # User changes will be destroyed the next time authconfig is run.
> auth        required      pam_env.so
> auth        required      pam_faildelay.so delay=2000000
> auth        sufficient    pam_fprintd.so
> auth        [default=1 ignore=ignore success=ok] pam_succeed_if.so uid >=
> 1000 quiet
> auth        [default=1 ignore=ignore success=ok] pam_localuser.so
> auth        sufficient    pam_unix.so nullok try_first_pass
> auth        requisite     pam_succeed_if.so uid >= 1000 quiet_success
> auth        sufficient    pam_sss.so forward_pass
> auth        required      pam_deny.so
>
> account     required      pam_unix.so
> account     sufficient    pam_localuser.so
> account     sufficient    pam_succeed_if.so uid < 1000 quiet
> account     [default=bad success=ok user_unknown=ignore] pam_sss.so
> account     required      pam_permit.so
>
> password    requisite     pam_pwquality.so try_first_pass local_users_only
> retry=3 authtok_type=
> password    sufficient    pam_unix.so sha512 shadow nullok try_first_pass
> use_authtok
> password    sufficient    pam_sss.so use_authtok
> password    required      pam_deny.so
>
> session     optional      pam_keyinit.so revoke
> session     required      pam_limits.so
> -session     optional      pam_systemd.so
> session     [success=1 default=ignore] pam_succeed_if.so service in crond
> quiet use_uid
> session     required      pam_unix.so
> session     optional      pam_sss.so
>
> # cat /etc/pam.d/password-auth
> #%PAM-1.0
> # This file is auto-generated.
> # User changes will be destroyed the next time authconfig is run.
> auth        required      pam_env.so
> auth        required      pam_faildelay.so delay=2000000
> auth        [default=1 ignore=ignore success=ok] pam_succeed_if.so uid >=
> 1000 quiet
> auth        [default=1 ignore=ignore success=ok] pam_localuser.so
> auth        sufficient    pam_unix.so nullok try_first_pass
> auth        requisite     pam_succeed_if.so uid >= 1000 quiet_success
> auth        sufficient    pam_sss.so forward_pass
> auth        required      pam_deny.so
>
> account     required      pam_unix.so
> account     sufficient    pam_localuser.so
> account     sufficient    pam_succeed_if.so uid < 1000 quiet
> account     [default=bad success=ok user_unknown=ignore] pam_sss.so
> account     required      pam_permit.so
>
> password    requisite     pam_pwquality.so try_first_pass local_users_only
> retry=3 authtok_type=
> password    sufficient    pam_unix.so sha512 shadow nullok try_first_pass
> use_authtok
> password    sufficient    pam_sss.so use_authtok
> password    required      pam_deny.so
>
> session     optional      pam_keyinit.so revoke
> session     required      pam_limits.so
> -session     optional      pam_systemd.so
> session     [success=1 default=ignore] pam_succeed_if.so service in crond
> quiet use_uid
> session     required      pam_unix.so
> session     optional      pam_sss.so
>
>
do I need to login to gdm with my domain realm? [email protected]
??
_______________________________________________
sssd-users mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to