On 13/10/2025 15:49, Brian J. Murrell via FreeIPA-users wrote:
What I have left is a low UID (112) system account that I do need to be
in IPA as it needs to have a Kerberos credential.  I figured the
simplest thing to do was to give 112 it's own ID range since it's the
only low UID I have a need for.
FYI, you might be able to avoid needing to create an 'asterisk' user in your directory entirely.

You can map arbitrary Kerberos principal names to local usernames in krb5.conf:

[realms]
EXAMPLE.COM = {
  auth_to_local_names = {
    ipa-asterisk = asterisk
    asterisk/myhost.example.com = asterisk
  }
}

Now the principals for the IPA user 'ipa-asterisk' will be mapped to the local username 'asterisk'. Same for the IPA service 'asterisk/myhost.example.com'.

(One caveat, if you trust other realms then this will map principals in those realms as well. The fix is to use auth_to_local instead, which can accomplish the same job but with more verbose/annoying syntax.)

This was covered in this thread:
https://lists.fedorahosted.org/archives/list/[email protected]/thread/Z5YOARJJUW62XRGRXZ6KSWWDFUKT5GJV/?sort=thread

--
Sam Morris <https://robots.org.uk/>
PGP: rsa4096/CAAA AA1A CA69 A83A 892B  1855 D20B 4202 5CDA 27B9
--
_______________________________________________
FreeIPA-users mailing list -- [email protected]
To unsubscribe send an email to [email protected]
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedorahosted.org/archives/list/[email protected]
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue

Reply via email to