Great! That worked.
Thank you so much Rob. Your help is highly appreciated.

On Thu, Aug 25, 2016 at 3:49 PM, Rob Crittenden <rcrit...@redhat.com> wrote:

> Linov Suresh wrote:
>
>> I ran  ldapsearch -Y GSSAPI, what we are seeing is IPA server 2, ipa02
>>   is missing on both master and replica servers. Do we need to add IPA
>> server 2, ipa02 on both master and replica?
>>
>
> No, it should replicate. I find it very strange that these are missing. I
> wonder what else wasn't setup when the replica was created.
>
> In any case, this will add the entries:
>
> # ldapmodify -Y GSSAPI
> dn: cn=ipa-http-delegation,cn=s4u2proxy,cn=etc,dc=teloip,dc=net
> changetype: modify
> add: memberPrincipal
> memberPrincipal: HTTP/ipa02.teloip....@teloip.net
>
> ^D
>
> # ldapmodify -Y GSAPI
> dn: cn=ipa-ldap-delegation-targets,cn=s4u2proxy,cn=etc,dc=teloip,dc=net
> hangetype: modify
> add: memberPrincipal
> memberPrincipal: ldap/ipa02.teloip....@teloip.net
>
> ^D
>
> rob
>
>>
>> *[root@ipa01 ~]# ldapsearch -Y GSSAPI -H ldap://ipa01.teloip.net
>> <http://ipa01.teloip.net> -b "cn=s4u2proxy,cn=etc,dc=teloip,dc=net"*
>> SASL/GSSAPI authentication started
>> SASL username: ad...@teloip.net <mailto:ad...@teloip.net>
>> SASL SSF: 56
>> SASL data security layer installed.
>> # extended LDIF
>> #
>> # LDAPv3
>> # base <cn=s4u2proxy,cn=etc,dc=teloip,dc=net> with scope subtree
>> # filter: (objectclass=*)
>> # requesting: ALL
>> #
>>
>> # s4u2proxy, etc, teloip.net <http://teloip.net>
>> dn: cn=s4u2proxy,cn=etc,dc=teloip,dc=net
>> objectClass: nsContainer
>> objectClass: top
>> cn: s4u2proxy
>>
>> # ipa-http-delegation, s4u2proxy, etc, teloip.net <http://teloip.net>
>> dn: cn=ipa-http-delegation,cn=s4u2proxy,cn=etc,dc=teloip,dc=net
>> objectClass: ipaKrb5DelegationACL
>> objectClass: groupOfPrincipals
>> objectClass: top
>> ipaAllowedTarget:
>> cn=ipa-ldap-delegation-targets,cn=s4u2proxy,cn=etc,dc=teloip,dc=net
>> ipaAllowedTarget:
>> cn=ipa-cifs-delegation-targets,cn=s4u2proxy,cn=etc,dc=teloip,dc=net
>> *memberPrincipal: HTTP/ipa01.teloip....@teloip.net
>> <mailto:ipa01.teloip....@teloip.net>*
>> cn: ipa-http-delegation
>>
>> # ipa-cifs-delegation-targets, s4u2proxy, etc, teloip.net
>> <http://teloip.net>
>> dn: cn=ipa-cifs-delegation-targets,cn=s4u2proxy,cn=etc,dc=teloip,dc=net
>> objectClass: groupOfPrincipals
>> objectClass: top
>> cn: ipa-cifs-delegation-targets
>>
>> # ipa-ldap-delegation-targets, s4u2proxy, etc, teloip.net
>> <http://teloip.net>
>> dn: cn=ipa-ldap-delegation-targets,cn=s4u2proxy,cn=etc,dc=teloip,dc=net
>> objectClass: groupOfPrincipals
>> objectClass: top
>> *memberPrincipal: ldap/ipa01.teloip....@teloip.net
>> <mailto:ipa01.teloip....@teloip.net>*
>> cn: ipa-ldap-delegation-targets
>>
>> # search result
>> search: 4
>> result: 0 Success
>>
>> # numResponses: 5
>> # numEntries: 4
>> [root@ipa01 ~]#
>>
>> *[root@ipa02 ~]# ldapsearch -Y GSSAPI -H ldap://ipa02.teloip.net
>> <http://ipa02.teloip.net> -b "cn=s4u2proxy,cn=etc,dc=teloip,dc=net"*
>> SASL/GSSAPI authentication started
>> SASL username: ad...@teloip.net <mailto:ad...@teloip.net>
>> SASL SSF: 56
>> SASL data security layer installed.
>> # extended LDIF
>> #
>> # LDAPv3
>> # base <cn=s4u2proxy,cn=etc,dc=teloip,dc=net> with scope subtree
>> # filter: (objectclass=*)
>> # requesting: ALL
>> #
>>
>> # s4u2proxy, etc, teloip.net <http://teloip.net>
>> dn: cn=s4u2proxy,cn=etc,dc=teloip,dc=net
>> cn: s4u2proxy
>> objectClass: nsContainer
>> objectClass: top
>>
>> # ipa-http-delegation, s4u2proxy, etc, teloip.net <http://teloip.net>
>> dn: cn=ipa-http-delegation,cn=s4u2proxy,cn=etc,dc=teloip,dc=net
>> cn: ipa-http-delegation
>> *memberPrincipal: HTTP/ipa01.teloip....@teloip.net
>> <mailto:ipa01.teloip....@teloip.net>*
>> ipaAllowedTarget:
>> cn=ipa-ldap-delegation-targets,cn=s4u2proxy,cn=etc,dc=teloip,dc=net
>> ipaAllowedTarget:
>> cn=ipa-cifs-delegation-targets,cn=s4u2proxy,cn=etc,dc=teloip,dc=net
>> objectClass: ipaKrb5DelegationACL
>> objectClass: groupOfPrincipals
>> objectClass: top
>>
>> # ipa-cifs-delegation-targets, s4u2proxy, etc, teloip.net
>> <http://teloip.net>
>> dn: cn=ipa-cifs-delegation-targets,cn=s4u2proxy,cn=etc,dc=teloip,dc=net
>> cn: ipa-cifs-delegation-targets
>> objectClass: groupOfPrincipals
>> objectClass: top
>>
>> # ipa-ldap-delegation-targets, s4u2proxy, etc, teloip.net
>> <http://teloip.net>
>> dn: cn=ipa-ldap-delegation-targets,cn=s4u2proxy,cn=etc,dc=teloip,dc=net
>> cn: ipa-ldap-delegation-targets
>> *memberPrincipal: ldap/ipa01.teloip....@teloip.net
>> <mailto:ipa01.teloip....@teloip.net>*
>> objectClass: groupOfPrincipals
>> objectClass: top
>>
>> # search result
>> search: 4
>> result: 0 Success
>>
>> # numResponses: 5
>> # numEntries: 4
>> [root@ipa02 ~]#
>>
>> Appreciate your help,
>>
>> Linov Suresh.
>>
>>
>>
>> On Wed, Aug 24, 2016 at 4:32 PM, Rob Crittenden <rcrit...@redhat.com
>> <mailto:rcrit...@redhat.com>> wrote:
>>
>>     Linov Suresh wrote:
>>
>>         Look like our issue is discussed here, and *is **missing one or
>> more
>>         memberPrincipal*.
>>
>>         https://www.redhat.com/archives/freeipa-users/2013-April/
>> msg00228.html
>>         <https://www.redhat.com/archives/freeipa-users/2013-April/
>> msg00228.html>
>>
>>         When I tried to add the Principal, I'm getting error,
>>
>>
>>     You didn't follow the instructions in the e-mail thread. The problem
>>     isn't a principal that doesn't exist, it is a principal not in the
>>     delegation list. Do the ldapsearch's and see what is missing (and
>>     you'll need to use -Y GSSAPI instead of -x) then add it using
>>     ldapmodify.
>>
>>     Only under very specific circumstances would I ever recommend using
>>     kadmin.local.
>>
>>     rob
>>
>>
>>
>>         [root@ipa01 ~]# kadmin.local
>>         Authenticating as principal admin/ad...@teloip.net
>>         <mailto:ad...@teloip.net>
>>         <mailto:ad...@teloip.net <mailto:ad...@teloip.net>> with
>> password.
>>         kadmin.local:  addprinc -randkey
>>         HTTP/ipa02.teloip....@teloip.net
>>         <mailto:ipa02.teloip....@teloip.net>
>>         <mailto:ipa02.teloip....@teloip.net
>>         <mailto:ipa02.teloip....@teloip.net>>
>>         WARNING: no policy specified for
>>         HTTP/ipa02.teloip....@teloip.net
>>         <mailto:ipa02.teloip....@teloip.net>
>>         <mailto:ipa02.teloip....@teloip.net
>>         <mailto:ipa02.teloip....@teloip.net>>; defaulting to no policy
>>         add_principal: Principal or policy already exists while creating
>>         "HTTP/ipa02.teloip....@teloip.net
>>         <mailto:ipa02.teloip....@teloip.net>
>>         <mailto:ipa02.teloip....@teloip.net
>>         <mailto:ipa02.teloip....@teloip.net>>"
>>
>>         [root@ipa01 ~]# kadmin.local
>>         Authenticating as principal admin/ad...@teloip.net
>>         <mailto:ad...@teloip.net>
>>         <mailto:ad...@teloip.net <mailto:ad...@teloip.net>> with
>> password.
>>         kadmin.local:  addprinc -randkey
>>         ldap/ipa02.teloip....@teloip.net
>>         <mailto:ipa02.teloip....@teloip.net>
>>         <mailto:ipa02.teloip....@teloip.net
>>         <mailto:ipa02.teloip....@teloip.net>>
>>         WARNING: no policy specified for
>>         ldap/ipa02.teloip....@teloip.net
>>         <mailto:ipa02.teloip....@teloip.net>
>>         <mailto:ipa02.teloip....@teloip.net
>>         <mailto:ipa02.teloip....@teloip.net>>; defaulting to no policy
>>         add_principal: Principal or policy already exists while creating
>>         "ldap/ipa02.teloip....@teloip.net
>>         <mailto:ipa02.teloip....@teloip.net>
>>         <mailto:ipa02.teloip....@teloip.net
>>         <mailto:ipa02.teloip....@teloip.net>>".
>>
>>         Could you please help us to fix the "*KDC returned error string:
>>         NOT_ALLOWED_TO_DELEGATE*" error?
>>
>>
>>         [root@caer ~]# kadmin.local
>>         Authenticating as principal admin/ad...@teloip.net
>>         <mailto:ad...@teloip.net>
>>         <mailto:ad...@teloip.net <mailto:ad...@teloip.net>> with
>> password.
>>         kadmin.local:  addprinc -randkey HTTP/neit.teloip....@teloip.net
>>         <mailto:neit.teloip....@teloip.net>
>>         <mailto:neit.teloip....@teloip.net
>>         <mailto:neit.teloip....@teloip.net>>
>>         WARNING: no policy specified for HTTP/neit.teloip....@teloip.net
>>         <mailto:neit.teloip....@teloip.net>
>>         <mailto:neit.teloip....@teloip.net
>>         <mailto:neit.teloip....@teloip.net>>; defaulting to no policy
>>         add_principal: Principal or policy already exists while creating
>>         "HTTP/neit.teloip....@teloip.net
>>         <mailto:neit.teloip....@teloip.net>
>>         <mailto:neit.teloip....@teloip.net
>>         <mailto:neit.teloip....@teloip.net>>"
>>
>>
>>
>>
>>
>>
>>         On Tue, Aug 16, 2016 at 7:58 AM, Martin Kosek <mko...@redhat.com
>>         <mailto:mko...@redhat.com>
>>         <mailto:mko...@redhat.com <mailto:mko...@redhat.com>>> wrote:
>>
>>              On 08/16/2016 09:25 AM, Petr Spacek wrote:
>>              > On 15.8.2016 20:18, Linov Suresh wrote:
>>              >> We have IPA replica set up in RHEL 6.4 and is FreeIPA
>> 3.0.0
>>              >>
>>              >>
>>              >> We can only add the clients from IPA Server 01, not from
>>         IPA Server 02.
>>              >> When I tried to add the client from IPA Server 02,
>>         getting the error,
>>              >>
>>              >>
>>              >> ipa: ERROR: Insufficient access: SASL(-1): generic
>>         failure: GSSAPI Error:
>>              >> Unspecified GSS failure.  Minor code may provide more
>>         information (KDC
>>              >> returned error string: NOT_ALLOWED_TO_DELEGATE)
>>              >>
>>              >> SASL/GSSAPI authentication started
>>              >>
>>              >> SASL username:vp...@example.net
>>         <mailto:username%3avp...@example.net> <mailto:vp...@example.net
>>         <mailto:vp...@example.net>>
>>              >>
>>              >> SASL SSF: 56
>>              >>
>>              >> SASL data security layer installed.
>>              >>
>>              >> ldap_modify: No such object (32)
>>              >>
>>              >>         additional info: Range Check error
>>              >>
>>              >> modifying entry "fqdn=cpe-5061747522f9.example.net
>>         <http://cpe-5061747522f9.example.net>
>>         <http://cpe-5061747522f9.example.net
>>
>>         <http://cpe-5061747522f9.example.net>>
>>              >> ,cn=computers,cn=accounts,dc=example,dc=net"
>>              >>
>>              >>
>>              >> Could you please help us to fix this?
>>              >
>>               > We need to see exact steps you did before we can give
>>         you any
>>              meaningful advice.
>>               >
>>               > Please have a look at
>>               > http://www.chiark.greenend.org.uk/~sgtatham/bugs.html
>>         <http://www.chiark.greenend.org.uk/~sgtatham/bugs.html>
>>              <http://www.chiark.greenend.org.uk/~sgtatham/bugs.html
>>         <http://www.chiark.greenend.org.uk/~sgtatham/bugs.html>>
>>               >
>>               > It is a very nice document which describes general bug
>>         reporting
>>              procedure and
>>               > best practices.
>>               >
>>               > We will certainly have a look but we need first see the
>>              information :-)
>>               >
>>
>>              Also, using IPA on RHEL-6.4 is discouraged. This is a
>>         really old
>>              release and
>>              there are known issues (in cert renewals for example). Using
>> at
>>              least RHEL-6.8
>>              or, even better, RHEL-7.2 is preferred and would help you
>> avoid
>>              known issues
>>              and deficiencies (and the newer FreeIPA versions are way
>>         cooler anyway).
>>
>>
>>
>>
>>
>>
>>
>
-- 
Manage your subscription for the Freeipa-users mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-users
Go to http://freeipa.org for more info on the project

Reply via email to