Yes:

Package krb5-pkinit-1.20.1-8.el9.x86_64 is already installed.
Dependencies resolved.
Nothing to do.
Complete!

Best,

Francis

> On 28 Jun 2023, at 08:03, Francis Augusto Medeiros-Logeay via FreeIPA-users 
> <freeipa-users@lists.fedorahosted.org> wrote:
> 
> 
> 
>> On 28 Jun 2023, at 07:50, Sumit Bose via FreeIPA-users 
>> <freeipa-users@lists.fedorahosted.org> wrote:
>> 
>> Am Wed, Jun 28, 2023 at 07:23:58AM +0200 schrieb Francis Augusto 
>> Medeiros-Logeay:
>>> 
>>> 
>>>> On 23 Jun 2023, at 10:52, Sumit Bose via FreeIPA-users 
>>>> <freeipa-users@lists.fedorahosted.org> wrote:
>>>> 
>>>> Am Fri, Jun 23, 2023 at 09:03:55AM +0200 schrieb Francis Augusto 
>>>> Medeiros-Logeay via FreeIPA-users:
>>>>> 
>>>>> 
>>>>>> On 22 Jun 2023, at 14:48, Rob Crittenden via FreeIPA-users 
>>>>>> <freeipa-users@lists.fedorahosted.org> wrote:
>>>>>> 
>>>>>> Francis Augusto Medeiros-Logeay via FreeIPA-users wrote:
>>>>>>> Hi,
>>>>>>> 
>>>>>>> We have an application that requires Active Directory. In order to
>>>>>>> provide SSO, the application gets a user certificate from AD and, as I
>>>>>>> understand, uses it towards a RHEL machine as a smart card. I installed
>>>>>>> AD's ca certificates on the RHEL client and it works when sssd.conf is
>>>>>>> all configured towards AD.
>>>>>>> 
>>>>>>> I've joined the client to AD, as I said, but I do want my `id_provider`
>>>>>>> in `sssd.conf` to be `ldap` so that it gets my group info from FreeIPA.
>>>>>>> But when I do this, the authentication doesn't work.
>>>>>>> 
>>>>>>> Is there a way to either force pam/sssd to check the certificates
>>>>>>> against AD while still getting groups and names from ldap, or to get
>>>>>>> FreeIPA to approve the certificates?
>>>>>>> 
>>>>>>> I know this might be a very corner case, but if we make it works, this
>>>>>>> would be beautiful.
>>>>>> 
>>>>> 
>>>>> Thanks Rob!
>>>>> 
>>>>>> IMHO you should cross-post this to the SSSD users list as this seems
>>>>>> more their area,
>>>>>> https://lists.fedorahosted.org/archives/list/sssd-us...@lists.fedorahosted.org/
>>>>> 
>>>>> I posted it there first, tbh, but got no reply.
>>>>> 
>>>>>> I think expanding on your configuration would help too. Are you using
>>>>>> the IPA certificate mapping to map the AD-issued certificates to an IPA
>>>>>> user for authentication?
>>>>> 
>>>>> No. The users are the same on both - same uid, gid, etc, but no 
>>>>> connection, trust, or anything.
>>>>> The mapping on sssd.conf is this one:
>>>>> 
>>>>> [certmap/mydomain.com/truesso]                #Add this section and 
>>>>> following lines to set match and map rule for certificate user
>>>>> matchrule = <EKU>msScLogin
>>>>> maprule = 
>>>>> (|(userPrincipal={subject_principal})(samAccountName={subject_principal.short_name}))
>>>>> domains = mydomain.com
>>>>> priority = 10
>>>>> 
>>>>> When id_provider = ad, it works, but not when it is `ldap`. But the 
>>>>> users, in principle, are the same. Could it be those attributes that are 
>>>>> wrong?
>>>> 
>>>> Hi,
>>>> 
>>>> with 'id_provider = ad' the 'auth_provider' will be 'ad' as well, which
>>>> is basically 'auth_provider = krb5' and Smartcard authentication is done
>>>> the Kerberos way. With 'id_provider = ldap' the 'auth_provider' will be
>>>> 'ldap' as well, so you might have to explicitly add 'auth_provider =
>>>> krb5'
>>>> 
>>>> Additionally, the 'maprule' is looking for LDAP attributes, so you IPA
>>>> user must at least have the 'userPrincipal' attribute set with the
>>>> principal which is stored in the subject alternative names of the
>>>> certificate.
>>>> 
>>>> Feel free to add 'debug_level = 9' to the [pam] and [domain/...]
>>>> sections of sssd.conf, restart SSSD, try again and send the SSSD logs
>>>> here.
>>>> 
>>>> bye,
>>>> Sumit
>>> 
>>> 
>>> Hi Sumit,
>>> 
>>> It fails on RHEL 9, though - before I was doing it on RHEL 9.
>>> 
>>> I get this: 
>>> 
>>> Jun 28 07:21:09 sso-rhel-test krb5_child[3447]: Pre-authentication failed: 
>>> Preauthentication failed
>>> Jun 28 07:21:09 sso-rhel-test desktopWorker[2796]: 
>>> pam_sss(gdm-password:auth): authentication failure; logname= uid=0 euid=0 
>>> tty= ruser= rhost= user=francis
>>> Jun 28 07:21:09 sso-rhel-test krb5_child[3447]: Pre-authentication failed: 
>>> Preauthentication failed
>>> Jun 28 07:21:09 sso-rhel-test desktopWorker[2796]: 
>>> pam_sss(gdm-password:auth): received for user francis: 7 (Authentication 
>>> failure)
>>> Jun 28 07:21:09 sso-rhel-test desktopWorker[2796]: gkr-pam: unable to 
>>> locate daemon control file
>>> Jun 28 07:21:09 sso-rhel-test desktopWorker[2796]: gkr-pam: stashed 
>>> password to try later in open ses
>>> 
>>> Exact same configuration. Neither password nor certificate works, though 
>>> password works on ssh.
>>> 
>>> Any tips here?
>> 
>> Hi,
>> 
>> this might be related to
>> https://bugzilla.redhat.com/show_bug.cgi?id=2214300
>> (https://bugzilla.redhat.com/show_bug.cgi?id=2155607 is the
>> corresponding RHEL-9 ticket, but this is mostly private). Does it work
>> any better if you set
>> 
>>   update-crypto-policies --set LEGACY:AD-SUPPORT-LEGACY
>> 
>> bye,
>> Sumit
>> 
> 
> Not really. I get this:
> 
> Jun 28 08:02:00 sso-rhel-test krb5_child[3019]: Pre-authentication failed: 
> Preauthentication failed
> Jun 28 08:02:00 sso-rhel-test krb5_child[3019]: Pre-authentication failed: 
> Preauthentication failed
> Jun 28 08:02:00 sso-rhel-test desktopWorker[2835]: pam_sss(gdm-vmwcred:auth): 
> authentication failure; logname= uid=0 euid=0 tty= ruser= rhost= user=francis
> Jun 28 08:02:00 sso-rhel-test desktopWorker[2835]: pam_sss(gdm-vmwcred:auth): 
> received for user francis: 7 (Authentication failure)
> Jun 28 08:02:01 sso-rhel-test krb5_child[3083]: Cannot read password
> Jun 28 08:02:01 sso-rhel-test krb5_child[3083]: Cannot read password
> Jun 28 08:02:01 sso-rhel-test desktopWorker[2835]: pam_sss(gdm-vmwcred:auth): 
> authentication failure; logname= uid=0 euid=0 tty= ruser= rhost= user=francis
> Jun 28 08:02:01 sso-rhel-test desktopWorker[2835]: pam_sss(gdm-vmwcred:auth): 
> received for user francis: 15 (Authentication service cannot retrieve user 
> credentials)
> Jun 28 08:02:01 sso-rhel-test desktopWorker[2835]: gkr-pam: unable to locate 
> daemon control file
> Jun 28 08:02:01 sso-rhel-test desktopWorker[2835]: gkr-pam: stashed password 
> to try later in open session
> Jun 28 08:02:10 sso-rhel-test krb5_child[3112]: Pre-authentication failed: 
> Preauthentication failed
> Jun 28 08:02:10 sso-rhel-test krb5_child[3112]: Pre-authentication failed: 
> Preauthentication failed
> Jun 28 08:02:10 sso-rhel-test desktopWorker[2835]: 
> pam_sss(gdm-password:auth): authentication failure; logname= uid=0 euid=0 
> tty= ruser= rhost= user=francis
> Jun 28 08:02:10 sso-rhel-test desktopWorker[2835]: 
> pam_sss(gdm-password:auth): received for user francis: 7 (Authentication 
> failure)
> Jun 28 08:02:10 sso-rhel-test desktopWorker[2835]: gkr-pam: unable to locate 
> daemon control file
> 
> Best,
> 
> Francis 
> _______________________________________________
> FreeIPA-users mailing list -- freeipa-users@lists.fedorahosted.org
> To unsubscribe send an email to freeipa-users-le...@lists.fedorahosted.org
> Fedora Code of Conduct: 
> https://docs.fedoraproject.org/en-US/project/code-of-conduct/
> List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
> List Archives: 
> https://lists.fedorahosted.org/archives/list/freeipa-users@lists.fedorahosted.org
> Do not reply to spam, report it: 
> https://pagure.io/fedora-infrastructure/new_issue
_______________________________________________
FreeIPA-users mailing list -- freeipa-users@lists.fedorahosted.org
To unsubscribe send an email to freeipa-users-le...@lists.fedorahosted.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedorahosted.org/archives/list/freeipa-users@lists.fedorahosted.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue

Reply via email to