-
Notifications
You must be signed in to change notification settings - Fork 254
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
trusted root domain suffix not work in sub domain users as upn(FREE IPA) #7775
Comments
Hi, can you try if adding
in the [domain/...] section of bye, |
No, it's not working.
i already tried it this configuration means that if you configured in AD
level custom domain suffix it will work - and this configuration truly
works. but it is not related to my case in which I'm trying to login with
root domain suffix which is not a custom domain suffix.
…On Thu, 19 Dec 2024 at 14:06, sumit-bose ***@***.***> wrote:
Hi,
can you try if adding
krb5_use_enterprise_principal = True
in the [domain/...] section of sssd.conf can make authentication work
without your patch?
bye,
Sumit
—
Reply to this email directly, view it on GitHub
<#7775 (comment)>, or
unsubscribe
<https://github.com/notifications/unsubscribe-auth/AIWWX3KOKKVXW7YBB6Q2DLL2GKZFHAVCNFSM6AAAAABT2ZTUHSVHI2DSMVQWIX3LMV43OSLTON2WKQ3PNVWWK3TUHMZDKNJTGU4TIOJQGQ>
.
You are receiving this because you authored the thread.Message ID:
***@***.***>
|
Hi, would it be possible to get debug logs with To my knowledge there should be no difference on the Keberos level between a custom domain suffix set in AD's "Alternative Domain Suffixes" and existing domain names, e.g. the name of the forest root, as long as the UPN is unique in the forest, e.g. you cannot do this with the bye, |
Let me share some analysis about this issue.
|
Hi, it is expected that SSSD will first try bye, |
As I stated before, subdomain request does not fail. It succeeds finding [email protected]. And it writes results (with groups and overrides) into LDB for subdomain.example.com. |
Hi, do I understand correctly that the authentication was successful and the issue happened during access control ( When you say "it looks in LDB for example.com", do you mean that it looks into a ldb file Can you send your bye, |
No. Let's look at logs.
...snip...
as you see lookup by UPN succeeds, now second authorization attempt with user's primary name:
and here you see System error and failure. |
as you see user was stored in LDB with key name=[email protected],cn=users,cn=subdomain.example.com,cn=sysdb
At this moment I added some more debug print in function krb5_auth_send and found, that sysdb_get_user_attr_with_views gets called with domain example.com and user [email protected] and it returns 0 rows. If it was called with domain subdomain.example.com instead, it would return exactly 1 row as expected and authorization attempt will continue. |
Hi, thank you for the logs. Your patch is basically correct but in the wrong function. The domain should be set based on the results from the cache lookup. Would it be possible to test the following patch:
If it works and you don't mind fell free to open a pull request wiht this patch. bye, |
We are using FREEIPA installation with AD trusted domain.
The issue is that users from subdomains with upn as root domain suffix cannot login.
[note: samaccountname and upn are not the same for this user]
so for example:
root ad domain its example.com and subdomains are a.example.com and b.example.com etc.
user joe from subdomain a.example.com if his upn its root domain suffix '[email protected]' cannot login if it configured with subdomain suffix it works.
for us the problem was solved by adding in file responder\pam\pamsrv_cmd.c line is 2761
was:
now:
The text was updated successfully, but these errors were encountered: