> > I know this may be a loaded question, but I am asking it anyways.
> >
> >
> > Can anyone tell me what the current status and future plan for IPA /
> > Samba 4 is?
>
> We plan to support setting up trusts with Samba4 just like we do with AD
> when Samba4 will start supporting Cross-forest trusts. It currently
> doesn't.
>
> Simo.
>
Yes, its amazing samba4 has finally gone GA. Plan to set up an instance as
a backup AD to existing AD some day when I get some time. Not well
documented though,  wish there was well writen book on it. Anyway backup AD
would be the best way to set some experience I am assuming

A related question, would there be any need to have a replica when using
trust if the AD is just one instance?  What I am asking in another way is,
if the AD fail, wouldn't the FreeIPA fail to authenticate users till AD
issues are fixed?

Regards,

William
> --
> Simo Sorce * Red Hat, Inc * New York
>
>
>
> ------------------------------
>
> Message: 2
> Date: Mon, 17 Dec 2012 16:03:03 -0500
> From: Dmitri Pal <d...@redhat.com>
> To: freeipa-users@redhat.com
> Subject: Re: [Freeipa-users] anyone know how to do sssd filters?
> Message-ID: <50cf8887.9020...@redhat.com>
> Content-Type: text/plain; charset=ISO-8859-1
>
> On 12/17/2012 03:11 PM, KodaK wrote:
> > I'm attempting to install Satellite in my IPA domain.  There is a
> > ridiculous requirement that the group "dba" must not already exist
> > prior to installing.  Red Hat support wanted me to *remove* the DBA
> > group and then install.
> >
> > Anyway, I'm trying to play around with filter_groups in sssd, and I
> > can't seem to get it to "take."  The man page isn't exactly clear, but
> > here's what I've tried:
> >
> > filter_groups = dba
> > filter_groups= dba@fqdn
> >
> > In the [domain], [sssd] and [nss] sections of the config file.
> >
> > What's the right syntax?  Do I need it in every section?
> >
> Is it a local group or a central group?
>
> --
> Thank you,
> Dmitri Pal
>
> Sr. Engineering Manager for IdM portfolio
> Red Hat Inc.
>
>
> -------------------------------
> Looking to carve out IT costs?
> www.redhat.com/carveoutcosts/
>
>
>
>
>
> ------------------------------
>
> Message: 3
> Date: Mon, 17 Dec 2012 16:29:00 -0500
> From: Dmitri Pal <d...@redhat.com>
> To: Simo Sorce <s...@redhat.com>
> Cc: freeipa-users <freeipa-users@redhat.com>, Albert Adams
>         <bite...@gmail.com>
> Subject: Re: [Freeipa-users] Allow IPA users to create SSH tunnel with
>         no shell
> Message-ID: <50cf8e9c.4020...@redhat.com>
> Content-Type: text/plain; charset=UTF-8
>
> On 12/17/2012 09:36 AM, Simo Sorce wrote:
> > On Mon, 2012-12-17 at 09:07 -0500, Albert Adams wrote:
> >> Thank you for the responses.  I was initially attempting to set this
> >> value via the web UI and if I entered anything other than the hash
> >> value of the user's public key it would get rejected.  After thinking
> >> about your response I realize that I really need to determine a method
> >> of doing this via a HBAC rule.  If I accomplish this with
> >> authorized_keys then the user is restricted across the board and would
> >> not be able to gain a shell on any system whereas HBAC would allow me
> >> to restrict thier access as needed.  We currently require users to
> >> tunnel over SSH to gain access to certain sensitive web apps (like
> >> Nessus) but those same users have shell access on a few boxes.
> >> Thoughts??
> > One thing you could do is to use the override_shell parameter in sssd.
> > However this one would override the shell for all users so just
> > putting /sbin/nologin there would not work if you need some users to be
> > able to log in (if you care only for root logins it would be enough).
> >
> > However you can still manage to use it to point to a script that would
> > test something like whether the user belongs to a group or not, and if
> > so run either /bin/bash or /bin/nologin
> >
> > This seem like a nice feature request for FreeIPA though, maybe we can
> > extend HBAC to allow a special option to define a shell, maybe creating
> > a special 'shell' service that sssd can properly interpret as a hint to
> > set nologin vs the actual shell.
> >
> > Dmitri, should we open a RFE on this ?
> >
> >
> > Simo.
> >
> OK , RFE would make sense.
>
> --
> Thank you,
> Dmitri Pal
>
> Sr. Engineering Manager for IdM portfolio
> Red Hat Inc.
>
>
> -------------------------------
> Looking to carve out IT costs?
> www.redhat.com/carveoutcosts/
>
>
>
>
>
> ------------------------------
>
> Message: 4
> Date: Tue, 18 Dec 2012 00:15:42 +0000
> From: Johan Petersson <johan.peters...@sscspace.com>
> To: "freeipa-users@redhat.com" <freeipa-users@redhat.com>
> Subject: [Freeipa-users] Problem generating Oracle ZFS Storage
>         Appliance host and nfs principals and keys to IPA/Free IPA.
> Message-ID:
>         <558c15177f5e714f83334217c9a197df5db40...@ssc-mbx2.ssc.internal>
> Content-Type: text/plain; charset="iso-8859-1"
>
> Hi,
>
> When trying to generate a host and nfs principal + keys  from the Oracle
ZFS 7120/7320 Appliance i get the following error message (note that the
information pasted are from a simulator but i get exactly the same error
from our real Appliances).
> I can't generate a key on the IPA server and copy it to the Appliance
unfortunately it does not support that since it has a specialised
webinterface and CLI.
> The Appliance wants to generate the principals and keys itself after i
add the Kerberos information realm/KDC and admin principal.
>
> NTP is synced and DNS is working with reverse, no firewalls and SELinux
disabled.
>
> I have tested on both Red Hat/CentOS 6.3 and fedora 17 as IPA servers
with the same results.
>
> Any ideas on what is wrong and if it is possible to get it working?
>
>
> An unanticipated system error occurred:
>
> failed to create principal 'host/zfs1.home@HOME': libkadm5clnt error:
43787522 (Operation requires ``add'' privilege)
>
> Exception type: coXmlrpcFault
> Native message: failed to create principal 'host/zfs1.home@HOME':
libkadm5clnt error: 43787522 (Operation requires ``add'' privilege)
> Mapped stack trace:
>
> Native file: <undefined> line ?
> Native stack trace:
> Message: <none>
> Wrapped exception: <none>
> Stack trace:
> <none>
>
>     at https://192.168.0.112:215/lib/crazyolait/index.js:370:21
> Additional native members:
>     faultCode: 600
>     faultString: failed to create principal 'host/zfs1.home@HOME':
libkadm5clnt error: 43787522 (Operation requires ``add'' privilege)
>     coStack: top.akMulticall(argv:<array> "[object Object]", abort:true,
func:<function> "function (ret, err, idx) {\n\t\t\tif (err && err.faultName
!== 'EAK_KRB5_NOENT') {\n\t\t\t\takHandleFault(err, { set: widget.aknsn_vs
});\n\t\t\t\treturn;\n\t\t\t}\n\t\t\tcommitprop(callback);\n\t\t}")
> nasServiceNFS.prototype.commit(callback:<function> "function (err)
{\n\t\tif (akHandleFault(err, {\n\t\t    set: view.aksvc_current_set\n\t\t
   })) {\n\t\t\tif
(callback)\n\t\t\t\tcallback(true);\n\t\t\tview.changed(true);\n\t\t\treturn;\n\t\t}\n\n\t\t/*\n\n\n\t\t
*/\n\t\tview.changed(false);\n\n\t\tif (enable === false) {\n\t\t\tif
(callback)\n\t\t\t\tcallback();\n\t\t\treturn;\n\t\t}\n\n\t\takService.svc.setCompositeState(view.aksvc_id,\n\t\t
   akSvc.AK_SVC_STATE_ONLINE, function (ret, err) {\n\t\t\tif
(akHandleFault(err)) {\n\t\t\t\tif
(callback)\n\t\t\t\t\tcallback(true);\n\t\t\t} else {\n\t\t\t\tif
(callback)\n\t\t\t\t\tcallback();\n\t\t\t}\n\t\t});\n\t}")
> akSvcView.prototype.commitToServer(enable:false, callback:<function>
"function (error) {\n\t\t\takStopWaiting(function () {\n\t\t\t\tif
(view.aksvc_done &&
!error)\n\t\t\t\t\tview.aksvc_done();\n\t\t\t});\n\t\t}")
> akSvcView.prototype.commit(callback:null)
> <anonymous>(<object> "[object Object]", <object> "[object MouseEvent]")
> <anonymous>(e:<object> "[object MouseEvent]")
> [akEventListenerWrap,click,undefined](e:<object> "[object MouseEvent]")
>
>     faultName: EAK_KADM5
>
> In the kadmind.log on the IPA server i get the following:
>
> Dec 17 23:12:05 server.home kadmind[3614](Notice): Request: kadm5_init,
admin@HOME, success, client=admin@HOME, service=kadmin/server.home@HOME,
addr=192.168.0.112, vers=2, flavor=6
> Dec 17 23:12:05 server.home kadmind[3614](Notice): Unauthorized request:
kadm5_create_principal, host/zfs1.home@HOME, client=admin@HOME,
service=kadmin/server.home@HOME, addr=192.168.0.112
>
> And in the krb5kdc.log:
>
> Dec 17 23:15:23 server.home krb5kdc[4015](info): AS_REQ (7 etypes {18 17
16 23 24 3 1}) 192.168.0.112: CLIENT_NOT_FOUND: root/zfs1.home@HOME for
krbtgt/HOME@HOME, Client not found in Kerberos database
> Dec 17 23:15:23 server.home krb5kdc[4016](info): AS_REQ (7 etypes {18 17
16 23 24 3 1}) 192.168.0.112: CLIENT_NOT_FOUND: host/zfs1.home@HOME for
krbtgt/HOME@HOME, Client not found in Kerberos database
>
> If i add the host in IPA i instead get:
>
> Dec 17 23:48:18 server.home krb5kdc[4016](info): ...
CONSTRAINED-DELEGATION s4u-client=admin@HOME
> Dec 17 23:48:35 server.home krb5kdc[4016](info): AS_REQ (7 etypes {18 17
16 23 24 3 1}) 192.168.0.112: NEEDED_PREAUTH: admin@HOME for
kadmin/server.home@HOME, Additional pre-authentication required
> Dec 17 23:48:35 server.home krb5kdc[4015](info): AS_REQ (7 etypes {18 17
16 23 24 3 1}) 192.168.0.112: ISSUE: authtime 1355784515, etypes {rep=18
tkt=18 ses=18}, admin@HOME for kadmin/server.home@HOME
> -------------- next part --------------
> An HTML attachment was scrubbed...
> URL: <
https://www.redhat.com/archives/freeipa-users/attachments/20121218/aa8c09ef/attachment.html
>
>
> ------------------------------
>
> Message: 5
> Date: Mon, 17 Dec 2012 19:36:29 -0500
> From: Dmitri Pal <d...@redhat.com>
> To: freeipa-users@redhat.com
> Subject: Re: [Freeipa-users] Problem generating Oracle ZFS Storage
>         Appliance host and nfs principals and keys to IPA/Free IPA.
> Message-ID: <50cfba8d.6070...@redhat.com>
> Content-Type: text/plain; charset="iso-8859-1"
>
> On 12/17/2012 07:15 PM, Johan Petersson wrote:
> > Hi,
> >
> > When trying to generate a host and nfs principal + keys  from the
> > Oracle ZFS 7120/7320 Appliance i get the following error message (note
> > that the information pasted are from a simulator but i get exactly the
> > same error from our real Appliances).
> > I can't generate a key on the IPA server and copy it to the Appliance
> > unfortunately it does not support that since it has a specialised
> > webinterface and CLI.
> > The Appliance wants to generate the principals and keys itself after i
> > add the Kerberos information realm/KDC and admin principal.
> >
> > NTP is synced and DNS is working with reverse, no firewalls and
> > SELinux disabled.
> >
> > I have tested on both Red Hat/CentOS 6.3 and fedora 17 as IPA servers
> > with the same results.
> >
> > Any ideas on what is wrong and if it is possible to get it working?
> >
> >
> > An unanticipated system error occurred:
> >
> > failed to create principal 'host/zfs1.home@HOME': libkadm5clnt error:
> > 43787522 (Operation requires ``add'' privilege)
>
> Do you have this principal already precreated?
> It seems that the client tries to create a principal using its kadmin
> library. I am not sure it would work.
> The protocol we use in ipa-getkeytab is not a kadmin protocol. As far as
> I recall it does an LDAP extended operation.
>
> >
> > Exception type: coXmlrpcFault
> > Native message: failed to create principal 'host/zfs1.home@HOME':
> > libkadm5clnt error: 43787522 (Operation requires ``add'' privilege)
> > Mapped stack trace:
> >
> > Native file: <undefined> line ?
> > Native stack trace:
> > Message: <none>
> > Wrapped exception: <none>
> > Stack trace:
> > <none>
> >
> >     at https://192.168.0.112:215/lib/crazyolait/index.js:370:21
> > Additional native members:
> >     faultCode: 600
> >     faultString: failed to create principal 'host/zfs1.home@HOME':
> > libkadm5clnt error: 43787522 (Operation requires ``add'' privilege)
> >     coStack: top.akMulticall(argv:<array> "[object Object]",
> > abort:true, func:<function> "function (ret, err, idx) {\n\t\t\tif (err
> > && err.faultName !== 'EAK_KRB5_NOENT') {\n\t\t\t\takHandleFault(err, {
> > set: widget.aknsn_vs
> > });\n\t\t\t\treturn;\n\t\t\t}\n\t\t\tcommitprop(callback);\n\t\t}")
> > nasServiceNFS.prototype.commit(callback:<function> "function (err)
> > {\n\t\tif (akHandleFault(err, {\n\t\t    set:
> > view.aksvc_current_set\n\t\t    })) {\n\t\t\tif
> >
(callback)\n\t\t\t\tcallback(true);\n\t\t\tview.changed(true);\n\t\t\treturn;\n\t\t}\n\n\t\t/*\n\n\n\t\t
> > */\n\t\tview.changed(false);\n\n\t\tif (enable === false) {\n\t\t\tif
> >
(callback)\n\t\t\t\tcallback();\n\t\t\treturn;\n\t\t}\n\n\t\takService.svc.setCompositeState(view.aksvc_id,\n\t\t
> >    akSvc.AK_SVC_STATE_ONLINE, function (ret, err) {\n\t\t\tif
> > (akHandleFault(err)) {\n\t\t\t\tif
> > (callback)\n\t\t\t\t\tcallback(true);\n\t\t\t} else {\n\t\t\t\tif
> > (callback)\n\t\t\t\t\tcallback();\n\t\t\t}\n\t\t});\n\t}")
> > akSvcView.prototype.commitToServer(enable:false, callback:<function>
> > "function (error) {\n\t\t\takStopWaiting(function () {\n\t\t\t\tif
> > (view.aksvc_done &&
> > !error)\n\t\t\t\t\tview.aksvc_done();\n\t\t\t});\n\t\t}")
> > akSvcView.prototype.commit(callback:null)
> > <anonymous>(<object> "[object Object]", <object> "[object MouseEvent]")
> > <anonymous>(e:<object> "[object MouseEvent]")
> > [akEventListenerWrap,click,undefined](e:<object> "[object MouseEvent]")
> >
> >     faultName: EAK_KADM5
> >
> > In the kadmind.log on the IPA server i get the following:
> >
> > Dec 17 23:12:05 server.home kadmind[3614](Notice): Request:
> > kadm5_init, admin@HOME, success, client=admin@HOME,
> > service=kadmin/server.home@HOME, addr=192.168.0.112, vers=2, flavor=6
> > Dec 17 23:12:05 server.home kadmind[3614](Notice): Unauthorized
> > request: kadm5_create_principal, host/zfs1.home@HOME,
> > client=admin@HOME, service=kadmin/server.home@HOME, addr=192.168.0.112
> >
> > And in the krb5kdc.log:
> >
> > Dec 17 23:15:23 server.home krb5kdc[4015](info): AS_REQ (7 etypes {18
> > 17 16 23 24 3 1}) 192.168.0.112: CLIENT_NOT_FOUND: root/zfs1.home@HOME
> > for krbtgt/HOME@HOME, Client not found in Kerberos database
> > Dec 17 23:15:23 server.home krb5kdc[4016](info): AS_REQ (7 etypes {18
> > 17 16 23 24 3 1}) 192.168.0.112: CLIENT_NOT_FOUND: host/zfs1.home@HOME
> > for krbtgt/HOME@HOME, Client not found in Kerberos database
> >
> > If i add the host in IPA i instead get:
> >
> > Dec 17 23:48:18 server.home krb5kdc[4016](info): ...
> > CONSTRAINED-DELEGATION s4u-client=admin@HOME
> > Dec 17 23:48:35 server.home krb5kdc[4016](info): AS_REQ (7 etypes {18
> > 17 16 23 24 3 1}) 192.168.0.112: NEEDED_PREAUTH: admin@HOME for
> > kadmin/server.home@HOME, Additional pre-authentication required
> > Dec 17 23:48:35 server.home krb5kdc[4015](info): AS_REQ (7 etypes {18
> > 17 16 23 24 3 1}) 192.168.0.112: ISSUE: authtime 1355784515, etypes
> > {rep=18 tkt=18 ses=18}, admin@HOME for kadmin/server.home@HOME
> >
> >
> > _______________________________________________
> > Freeipa-users mailing list
> > Freeipa-users@redhat.com
> > https://www.redhat.com/mailman/listinfo/freeipa-users
>
>
> --
> Thank you,
> Dmitri Pal
>
> Sr. Engineering Manager for IdM portfolio
> Red Hat Inc.
>
>
> -------------------------------
> Looking to carve out IT costs?
> www.redhat.com/carveoutcosts/
>
>
>
> -------------- next part --------------
> An HTML attachment was scrubbed...
> URL: <
https://www.redhat.com/archives/freeipa-users/attachments/20121217/7f262831/attachment.html
>
>
> ------------------------------
>
> _______________________________________________
> Freeipa-users mailing list
> Freeipa-users@redhat.com
> https://www.redhat.com/mailman/listinfo/freeipa-users
>
> End of Freeipa-users Digest, Vol 53, Issue 25
> *********************************************
_______________________________________________
Freeipa-users mailing list
Freeipa-users@redhat.com
https://www.redhat.com/mailman/listinfo/freeipa-users

Reply via email to