Ronald Wimmer via FreeIPA-users wrote:
> On 08.01.24 17:58, Alexander Bokovoy wrote:
>> On Пан, 08 сту 2024, Ronald Wimmer wrote:
>>> On 02.01.24 17:57, Ronald Wimmer via FreeIPA-users wrote:
>>>> On 02.01.24 16:27, Rob Crittenden wrote:
>>>>> Ronald Wimmer via FreeIPA-users wrote:
>>>>>>
>>>>>>
>>>>>> On 14.12.23 14:42, Alexander Bokovoy wrote:
>>>>>>> On Чцв, 14 сне 2023, Ronald Wimmer via FreeIPA-users wrote:
>>>>>>>> In our company we do have an IAM tool for user management. We
>>>>>>>> need to
>>>>>>>> create IPA users via this particular tool. I am aware of all IPA
>>>>>>>> commands or API calls to create/modify or delete a user.
>>>>>>>>
>>>>>>>> As the tool does not support FreeIPA yet they asked if there is
>>>>>>>> a way
>>>>>>>> to manage users by using LDAP only. Could that work? What about
>>>>>>>> attributes like ipaNTSecurityIdentifier, ipaUniqueID or uidNumber?
>>>>>>>
>>>>>>> Learn about lifecycle management. This is your way of integrating
>>>>>>> with
>>>>>>> such tools bvy creating staged users:
>>>>>>> https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/managing_idm_users_groups_hosts_and_access_control_rules/configuring-idm-for-external-provisioning-of-users_managing-users-groups-hosts#doc-wrapper
>>>>>>>
>>>>>>>
>>>>>>
>>>>>> I followed the instructions from the documentation.
>>>>>>
>>>>>> How could I possibly overcome
>>>>>>
>>>>>> Dec 19 09:18:39 tipa01.ipatest.mydomain.at ipa-activate-all[836863]:
>>>>>> ipa: ERROR: Constraint violation: pre-hashed passwords are not valid
>>>>>>
>>>>>> I need to set passwords from the external system.
>>>>>
>>>>> You need to enable migration mode (ipa config-mod
>>>>> --enable-migration true).
>>>>>
>>>>> By default a pre-hashed password can only be set once: during the user
>>>>> add operation.
>>>>
>>>> Ok. So this would not work for a password change. So if we need to
>>>> set an initial password and change that particular password in some
>>>> point in time the only feasible way is the IPA API, right?
>>>>
>>>> Can the immediate password expiration be overridden?
>>>
>>> As we have an upcoming please allow me to ask if I got the point here.
>>>
>>> I appreciate your support in this matter!
>>>
>>
>> I was looking over the code. The only way to accept pre-hashed passwords
>> is when they also have Kerberos keys set. This means you cannot use
>> external LDAP modify/add for that as you cannot create the Kerberos key
>> without knowing a Kerberos master key.
>>
>> So the only other option is to submit a clear-text password:
>>
>>   userPassword: {CLEAR}text-password
>>
>> That will be accepted and if bind DN that performed this change is
>> either a cn=Directory Manager or a one from the passsync managers, it
>> would also not be marked for expiration immediately.
> 
> 
> If I try to set the userPassword attribute to some value with an LDAP
> browser and chose "plaintext"  the value gets hashed immediately. I do
> see {PBKDF2_SHA256}. As a consequence the user cannot be activated.
> 
> What am I doing wrong?

IPA does not store passwords in the clear.

> I tried to enable migration mode and wanted to try it again but now I
> cannot connect to IPA's LDAP directory at all anymore...
> 
> [root@tipa01 ~]# ipa config-mod --enable-migration=true
>   Maximum username length: 32
>   Maximum hostname length: 64
>   Home directory base: /home
>   Default shell: /bin/sh
>   Default users group: ipausers
>   Default e-mail domain: ipatest.mydomain.at
>   Search time limit: 2
>   Search size limit: 100
>   User search fields: uid,givenname,sn,telephonenumber,ou,title
>   Group search fields: cn,description
>   Enable migration mode: True
>   Certificate Subject base: O=IPATEST.MYDOMAIN.AT
>   Password Expiration Notification (days): 4
>   Password plugin features: AllowNThash, KDC:Disable Last Success
>   SELinux user map order:
> guest_u:s0$xguest_u:s0$user_u:s0$staff_u:s0-s0:c0.c1023$sysadm_u:s0-s0:c0.c1023$unconfined_u:s0-s0:c0.c1023
> 
>   Default SELinux user: unconfined_u:s0-s0:c0.c1023
>   Default PAC types: MS-PAC, nfs:NONE
>   IPA masters: tipa01.ipatest.mydomain.at, tipa02.ipatest.mydomain.at
>   IPA master capable of PKINIT: tipa01.ipatest.mydomain.at,
> tipa02.ipatest.mydomain.at
>   IPA CA servers: tipa01.ipatest.mydomain.at
>   IPA CA renewal master: tipa01.ipatest.mydomain.at
>   Domain resolution order: org.mydomain.at:ipatest.mydomain.at
> [root@tipa01 ~]# ipa config-mod --enable-migration=false
> ipa: ERROR: Major (851968): Unspecified GSS failure.  Minor code may
> provide more information, Minor (2529638972): KDC returned error string:
> PROCESS_TGS

As who? The user with the reset password? Did you look in the krb5 log
for a denial reason?

rob
--
_______________________________________________
FreeIPA-users mailing list -- freeipa-users@lists.fedorahosted.org
To unsubscribe send an email to freeipa-users-le...@lists.fedorahosted.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedorahosted.org/archives/list/freeipa-users@lists.fedorahosted.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue

Reply via email to