Am Thu, Aug 25, 2022 at 04:55:14PM -0500 schrieb Jarett DeAngelis:
> Hi,
> 
> I've put a much longer copy of the log here: https://pastebin.com/uT4L7NgW 
> <https://pastebin.com/uT4L7NgW>
> 
> I suspect the "insufficient access" message is real; the server is denying us 
> access to the highestCommittedUSN attribute there. I don't know why SSSD 
> should need this; it doesn't seem necessary to authenticate users: 
> https://ldapwiki.com/wiki/Update%20Sequence%20Number#:~:text=Update%20Sequence%20Number%20(USN)%20is,counters%20on%20every%20Domain%20Controller.

Hi,

I suspect that the 'insufficient access' does not only refer to the
'highestCommittedUSN' attribute but to the whole request to read the
rootDSE. Can you try manually if

    ldapsearch -H ldaps://test.ldap.test.com -x -b '' -s base

works or returns 'insufficient access' as well?

bye,
Sumit

> 
> If it was, logging into web services with credentials from this server 
> wouldn't work either, but it does.
> 
> Additionally, I now know how to map other attributes into uidNumber and 
> gidNumber, so that won't be a problem.
> 
> If for whatever reason the way SSSD is written "can't" ignore all these 
> extraneous things it checks for, do you (or anyone else) know of a way to 
> auth + create users from SAML logins? Those are easy/free for us to set up.
> 
> Thanks,
> J
> 
> > On Aug 22, 2022, at 1:07 AM, Sumit Bose <[email protected]> wrote:
> > 
> > Am Sun, Aug 21, 2022 at 01:24:29AM -0000 schrieb Jarett DeAngelis:
> >> Hi everyone,
> >> 
> >> I am trying to get SSSD to auth against an LDAP service provided by an IAM 
> >> SaaS company that goes out of its way to make its LDAP interface as 
> >> minimal as possible. All I want SSSD to do is check usernames and 
> >> passwords against the service (which allows the systems in question to be 
> >> secured by MFA) and grab UIDs and GIDs from two specified attributes in 
> >> each user object. It seems to be able to connect fine, but it seems to 
> >> choke on some missing attributes, as seen in these logs:
> >> 
> >> ```
> >> (2022-08-20 21:17:18): [be[test.ldap]] [sdap_get_generic_op_finished] 
> >> (0x0400): [RID#6930] Search result: Insufficient access(50), no errmsg set
> >> (2022-08-20 21:17:18): [be[test.ldap]] [sdap_get_generic_op_finished] 
> >> (0x0040): [RID#6930] Unexpected result from ldap: Insufficient access(50), 
> >> no errmsg set
> > 
> > Hi,
> > 
> > 'Insufficient access' means that the user
> > (uid=ldap-bind,ou=users,dc=test,dc=ldap) does not has the needed
> > permissions to perform the requested operation. Unfortunately the
> > related request is not part of your log snippet, can you sen more of the
> > log?
> > 
> >>   *  ... skipping repetitive backtrace ...
> >> (2022-08-20 21:17:18): [be[test.ldap]] [generic_ext_search_handler] 
> >> (0x0020): [RID#6930] sdap_get_generic_ext_recv request failed: [5]: 
> >> Input/output error
> >>   *  ... skipping repetitive backtrace ...
> >> (2022-08-20 21:17:18): [be[test.ldap]] [sdap_get_server_opts_from_rootdse] 
> >> (0x0200): [RID#6930] No known USN scheme is supported by this server!
> >> (2022-08-20 21:17:18): [be[test.ldap]] [sdap_cli_auth_step] (0x0100): 
> >> [RID#6930] expire timeout is 900
> >> (2022-08-20 21:17:18): [be[test.ldap]] [sdap_cli_auth_step] (0x1000): 
> >> [RID#6930] the connection will expire at 1661045538
> >> (2022-08-20 21:17:18): [be[test.ldap]] [simple_bind_send] (0x0100): 
> >> [RID#6930] Executing simple bind as: uid=ldap-bind,ou=users,dc=test,dc=ldap
> >> (2022-08-20 21:17:19): [be[test.ldap]] [simple_bind_done] (0x0080): 
> >> [RID#6930] ldap_parse_passwordpolicy_control failed.
> > 
> > During the bind the LDAP server returns the data about the server side
> > password policy in an LDAP control. The function
> > ldap_parse_passwordpolicy_control() from OpenLDAP's libldap cannot parse
> > this control and since it might contain information about if the
> > password is expired and how many grace logins are still left SSSD
> > currently prefers to fail instead of ignoring the error. If you set
> > 
> >    ldap_library_debug_level = -1
> > 
> > in the [domain/...] section of sssd.conf you should get detailed debug
> > output of libldap which might help to understand why the parsing fails.
> > 
> > bye,
> > Sumit
> > 
> >> (2022-08-20 21:17:19): [be[test.ldap]] [sdap_cli_connect_recv] (0x0040): 
> >> [RID#6930] Unable to establish connection [1432158209]: Internal Error
> >>   *  ... skipping repetitive backtrace ...
> >> (2022-08-20 21:17:19): [be[test.ldap]] [fo_set_port_status] (0x0100): 
> >> [RID#6930] Marking port 636 of server 'test.ldap' as 'not working'
> >> (2022-08-20 21:17:19): [be[test.ldap]] [fo_set_port_status] (0x0400): 
> >> [RID#6930] Marking port 636 of duplicate server 'test.ldap' as 'not 
> >> working'
> >> ```
> >> 
> >> sssd.conf is as shown:
> >> 
> >> [sssd]
> >> services = nss, pam
> >> config_file_version = 2
> >> domains = test.ldap
> >> 
> >> [nss]
> >> 
> >> [pam]
> >> 
> >> [domain/test.ldap]
> >> debug_level = 7
> >> ldap_id_use_start_tls = True
> >> cache_credentials = True
> >> ldap_search_base = ou=users,dc=test,dc=ldap
> >> id_provider = ldap
> >> auth_provider = ldap
> >> chpass_provider = ldap
> >> access_provider = permit
> >> #sudo_provider = ldap
> >> ldap_uri = ldaps://test.ldap
> >> ldap_default_bind_dn = uid=ldap-bind,ou=users,dc=test,dc=ldap
> >> ldap_default_authtok = some_good_password
> >> ldap_user_uid_number = employeeNumber
> >> ldap_user_gid_number = managerNumber
> >> ldap_user_name = uid
> >> ldap_tls_reqcert = allow
> >> ldap_tls_cacert = /etc/pki/tls/cacert.crt
> >> ldap_tls_cacertdir = /etc/pki/tls
> >> ldap_search_timeout = 50
> >> ldap_network_timeout = 60
> >> #ldap_access_order = filter
> >> #ldap_access_filter = (objectClass=inetOrgPerson)
> >> auto_private_groups = true
> >> 
> >> Can someone help me figure out how to get around this? Open to all 
> >> solutions including doing something with a server in between proxying 
> >> communications between the "broken" LDAP server and our equipment.
> >> _______________________________________________
> >> sssd-users mailing list -- [email protected]
> >> To unsubscribe send an email to [email protected]
> >> Fedora Code of Conduct: 
> >> https://docs.fedoraproject.org/en-US/project/code-of-conduct/
> >> List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
> >> List Archives: 
> >> https://lists.fedorahosted.org/archives/list/[email protected]
> >> Do not reply to spam, report it: 
> >> https://pagure.io/fedora-infrastructure/new_issue
> > _______________________________________________
> > sssd-users mailing list -- [email protected] 
> > <mailto:[email protected]>
> > To unsubscribe send an email to [email protected] 
> > <mailto:[email protected]>
> > Fedora Code of Conduct: 
> > https://docs.fedoraproject.org/en-US/project/code-of-conduct/ 
> > <https://docs.fedoraproject.org/en-US/project/code-of-conduct/>
> > List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines 
> > <https://fedoraproject.org/wiki/Mailing_list_guidelines>
> > List Archives: 
> > https://lists.fedorahosted.org/archives/list/[email protected]
> >  
> > <https://lists.fedorahosted.org/archives/list/[email protected]>
> > Do not reply to spam, report it: 
> > https://pagure.io/fedora-infrastructure/new_issue 
> > <https://pagure.io/fedora-infrastructure/new_issue>

> _______________________________________________
> sssd-users mailing list -- [email protected]
> To unsubscribe send an email to [email protected]
> Fedora Code of Conduct: 
> https://docs.fedoraproject.org/en-US/project/code-of-conduct/
> List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
> List Archives: 
> https://lists.fedorahosted.org/archives/list/[email protected]
> Do not reply to spam, report it: 
> https://pagure.io/fedora-infrastructure/new_issue
_______________________________________________
sssd-users mailing list -- [email protected]
To unsubscribe send an email to [email protected]
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedorahosted.org/archives/list/[email protected]
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue

Reply via email to