[Freeipa-users] Re: Compat tree question

2017-05-31 Thread Jakub Hrozek via FreeIPA-users
On Tue, May 30, 2017 at 09:27:05PM +0300, Alexander Bokovoy via FreeIPA-users 
wrote:
> On ti, 30 touko 2017, Robert Johnson via FreeIPA-users wrote:
> > So I took a brand new user that I have never used in the system before (I
> > checked that the entry was not in the compat tree) and just ran an "id"
> > command on Solaris system.  I then looked in the /var/log/dirsrv/slapd- > domain>/access log file on the ipa server, for the query and from the log
> > file, the query came in as all caps.
> > 
> > example:
> > [~]$: id 831...@win.mydomin.com
> > 
> > [~]$: cat /var/log/dirsrv/slapd-/access |grep 831413
> > [30/May/2017:13:34:38.637498942 -0400] conn=94124 op=622 SRCH
> > base="cn=users,cn=compat,dc=ipa,dc=mydomain,dc=com" scope=1
> > filter="(&(objectClass=posixAccount)(uid=831...@win.mydomin.com))"
> > attrs="cn uid uidNumber gidNumber gecos description homeDirectory
> > loginShell"
> > [30/May/2017:13:34:38.651811322 -0400] conn=94124 op=622 RESULT err=0
> > tag=101 nentries=1 etime=0
> > 
> > However, the entry in the compat tree is all lowercase just like I
> > reported.  I can reproduce this easily.
> memberUid value comes from SSSD look up. SSSD normalizes all names to
> low case.
> 
> For group names, I'm not sure they are normalized, though.

with id_provider=ad (which is what is running under the hood of the
sssd-on-idm-masters) everything should be normalized and there shouldn't
even be an option to turn the normalization off.
___
FreeIPA-users mailing list -- freeipa-users@lists.fedorahosted.org
To unsubscribe send an email to freeipa-users-le...@lists.fedorahosted.org


[Freeipa-users] Re: Compat tree question

2017-05-30 Thread Alexander Bokovoy via FreeIPA-users

On ti, 30 touko 2017, Robert Johnson via FreeIPA-users wrote:

Is there a option in SSSD or the plugin to turn off the normalization ?

No. But as I said, you are not supposed to use all capital fqdn. You
need to use your user/group name as it is.

id user@ad.realm

kinit user@AD.REALM

are two different names -- the former is user name in POSIX and it is
case sensitive to the operating system but is case-insensitive in LDAP.
The latter is Kerberos principal which is case sensitive to Kerberos
KDC.

In LDAP 'uid' attribute is compared case-sensitive, 'cn' attribute is
case-insensitive. For 'uid' we add a secondary value from SSSD
(normalized) if it is different from the original in request because
case-normalized searches wouldn't work otherwise. For 'cn' we don't
change anything because 'cn' comparison syntax in LDAP is
case-insensitive.



On Tue, May 30, 2017 at 2:27 PM, Alexander Bokovoy 
wrote:


On ti, 30 touko 2017, Robert Johnson via FreeIPA-users wrote:


So I took a brand new user that I have never used in the system before (I
checked that the entry was not in the compat tree) and just ran an "id"
command on Solaris system.  I then looked in the
/var/log/dirsrv/slapd-/access log file on the ipa server, for the query and from the log
file, the query came in as all caps.

example:
[~]$: id 831...@win.mydomin.com

[~]$: cat /var/log/dirsrv/slapd-/access |grep 831413
[30/May/2017:13:34:38.637498942 -0400] conn=94124 op=622 SRCH
base="cn=users,cn=compat,dc=ipa,dc=mydomain,dc=com" scope=1
filter="(&(objectClass=posixAccount)(uid=831...@win.mydomin.com))"
attrs="cn uid uidNumber gidNumber gecos description homeDirectory
loginShell"
[30/May/2017:13:34:38.651811322 -0400] conn=94124 op=622 RESULT err=0
tag=101 nentries=1 etime=0

However, the entry in the compat tree is all lowercase just like I
reported.  I can reproduce this easily.


memberUid value comes from SSSD look up. SSSD normalizes all names to
low case.

For group names, I'm not sure they are normalized, though.





Robert Johnson

On Tue, May 30, 2017 at 1:10 PM, Alexander Bokovoy 
wrote:

On ti, 30 touko 2017, Robert Johnson via FreeIPA-users wrote:


Red Hat Enterprise Linux Server release 7.3

ipa-server-4.4.0-14.el7_3.4.x86_64
389-ds-base-1.3.5.10-15.el7_3.x86_64
sssd-1.14.0-43.el7_3.11.x86_64

When looking at entries in the "cn=groups,cn=compat" tree, I noticed
that
the entries for windows groups have the realm portion of the group name
in
all caps.  This is true for the comment, the dn and the cn.
example:
# domain us...@win.mydomain.com, groups, compat, ipa.mydomain.com
dn: cn=domain us...@win.mydomain.com
,cn=groups,cn=compat,dc=ipa,dc=mydomain,dc=com
memberUid: 123...@win.mydomain.com
cn: domain us...@win.mydomain.com

When I look at the entries in the "cn=users,cn=compat" tree, the realm
portion of the user name is all lower case.  Incidentally, these same
user
names are also all lowercase in the "memberUid" option on the groups
above.
example:
# 123...@win.mydomain.com, users, compat, ipa.mydomain.com
dn: uid=123...@win.mydomain.com,cn=users,cn=compat,dc=ipa,dc=myd
omain,dc=com
homeDirectory: /home/win.mydomain.com/123456
uid: 123...@win.mydomain.com

Was this by design ?

Users and groups for AD users are inserted into the compat tree on

demand, when a request comes mentioning them via LDAP query. The name is
taken from the LDAP query.

So it is your application(s) that are asking fully qualified user/group
names with domain part capitalized.


The reason I ask, is that when I try to use the "kinit" feature on our


Solaris 10 systems (which is joined to the IPA domain) for this windows
user, I get an error.

[~]$ kinit
Password for 123...@win.mydomain.com:
kinit(v5): KDC reply did not match expectations while getting initial
credentials

If I run it like this:
[~]$ kinit 123...@win.mydomain.com
Password for 123...@win.mydomain.com:
[~]$ klist
Ticket cache: FILE:/tmp/krb5cc_1683378846
Default principal: 123...@win.mydomain.com

Valid startingExpiresService principal
05/30/17 11:44:35  05/30/17 21:44:40  krbtgt/
win.mydomain@win.mydomain.com
   renew until 06/06/17 11:44:35

I believe this is due to the fact that the Solaris 10 system is using
the
lowercase entry in the compat tree above.  Here is the result of the ID
command on this user:
[~]$ id
uid=1683378846(123...@win.mydomain.com) gid=1683378846(
123...@win.mydomain.com)

I know this is a work around but I would prefer to make this easier on
the
end users.  Any suggestions ?

You mix up Kerberos principals and user identities. They are different.

In Kerberos protocol realm is case-sensitive. WIN.MYDOMAIN.COM is not
the same realm as win.mydomain.com. On Active Directory side this is
hidden behind the Windows UI facade but on UNIX systems Kerberos
libraries aren't hiding this fact.

That's why you get "KDC reply did not match expectations .." error
message -- a realm name is used as part of Kerberos exchange and it is
expected to be 

[Freeipa-users] Re: Compat tree question

2017-05-30 Thread Robert Johnson via FreeIPA-users
Is there a option in SSSD or the plugin to turn off the normalization ?

On Tue, May 30, 2017 at 2:27 PM, Alexander Bokovoy 
wrote:

> On ti, 30 touko 2017, Robert Johnson via FreeIPA-users wrote:
>
>> So I took a brand new user that I have never used in the system before (I
>> checked that the entry was not in the compat tree) and just ran an "id"
>> command on Solaris system.  I then looked in the
>> /var/log/dirsrv/slapd-> domain>/access log file on the ipa server, for the query and from the log
>> file, the query came in as all caps.
>>
>> example:
>> [~]$: id 831...@win.mydomin.com
>>
>> [~]$: cat /var/log/dirsrv/slapd-/access |grep 831413
>> [30/May/2017:13:34:38.637498942 -0400] conn=94124 op=622 SRCH
>> base="cn=users,cn=compat,dc=ipa,dc=mydomain,dc=com" scope=1
>> filter="(&(objectClass=posixAccount)(uid=831...@win.mydomin.com))"
>> attrs="cn uid uidNumber gidNumber gecos description homeDirectory
>> loginShell"
>> [30/May/2017:13:34:38.651811322 -0400] conn=94124 op=622 RESULT err=0
>> tag=101 nentries=1 etime=0
>>
>> However, the entry in the compat tree is all lowercase just like I
>> reported.  I can reproduce this easily.
>>
> memberUid value comes from SSSD look up. SSSD normalizes all names to
> low case.
>
> For group names, I'm not sure they are normalized, though.
>
>
>
>
>> Robert Johnson
>>
>> On Tue, May 30, 2017 at 1:10 PM, Alexander Bokovoy 
>> wrote:
>>
>> On ti, 30 touko 2017, Robert Johnson via FreeIPA-users wrote:
>>>
>>> Red Hat Enterprise Linux Server release 7.3
 ipa-server-4.4.0-14.el7_3.4.x86_64
 389-ds-base-1.3.5.10-15.el7_3.x86_64
 sssd-1.14.0-43.el7_3.11.x86_64

 When looking at entries in the "cn=groups,cn=compat" tree, I noticed
 that
 the entries for windows groups have the realm portion of the group name
 in
 all caps.  This is true for the comment, the dn and the cn.
 example:
 # domain us...@win.mydomain.com, groups, compat, ipa.mydomain.com
 dn: cn=domain us...@win.mydomain.com
 ,cn=groups,cn=compat,dc=ipa,dc=mydomain,dc=com
 memberUid: 123...@win.mydomain.com
 cn: domain us...@win.mydomain.com

 When I look at the entries in the "cn=users,cn=compat" tree, the realm
 portion of the user name is all lower case.  Incidentally, these same
 user
 names are also all lowercase in the "memberUid" option on the groups
 above.
 example:
 # 123...@win.mydomain.com, users, compat, ipa.mydomain.com
 dn: uid=123...@win.mydomain.com,cn=users,cn=compat,dc=ipa,dc=myd
 omain,dc=com
 homeDirectory: /home/win.mydomain.com/123456
 uid: 123...@win.mydomain.com

 Was this by design ?

 Users and groups for AD users are inserted into the compat tree on
>>> demand, when a request comes mentioning them via LDAP query. The name is
>>> taken from the LDAP query.
>>>
>>> So it is your application(s) that are asking fully qualified user/group
>>> names with domain part capitalized.
>>>
>>>
>>> The reason I ask, is that when I try to use the "kinit" feature on our
>>>
 Solaris 10 systems (which is joined to the IPA domain) for this windows
 user, I get an error.

 [~]$ kinit
 Password for 123...@win.mydomain.com:
 kinit(v5): KDC reply did not match expectations while getting initial
 credentials

 If I run it like this:
 [~]$ kinit 123...@win.mydomain.com
 Password for 123...@win.mydomain.com:
 [~]$ klist
 Ticket cache: FILE:/tmp/krb5cc_1683378846
 Default principal: 123...@win.mydomain.com

 Valid startingExpiresService principal
 05/30/17 11:44:35  05/30/17 21:44:40  krbtgt/
 win.mydomain@win.mydomain.com
renew until 06/06/17 11:44:35

 I believe this is due to the fact that the Solaris 10 system is using
 the
 lowercase entry in the compat tree above.  Here is the result of the ID
 command on this user:
 [~]$ id
 uid=1683378846(123...@win.mydomain.com) gid=1683378846(
 123...@win.mydomain.com)

 I know this is a work around but I would prefer to make this easier on
 the
 end users.  Any suggestions ?

 You mix up Kerberos principals and user identities. They are different.
>>> In Kerberos protocol realm is case-sensitive. WIN.MYDOMAIN.COM is not
>>> the same realm as win.mydomain.com. On Active Directory side this is
>>> hidden behind the Windows UI facade but on UNIX systems Kerberos
>>> libraries aren't hiding this fact.
>>>
>>> That's why you get "KDC reply did not match expectations .." error
>>> message -- a realm name is used as part of Kerberos exchange and it is
>>> expected to be all upper cases.
>>>
>>> On identity front you have probably configured your Solaris systems to
>>> look up identities with upper cased fqdn and compat tree plugin inserts
>>> those as it is. I certainly don't see this behavior with other systems.
>>>
>>> --
>>> / Alexander Bokovoy
>>>
>>>
> 

[Freeipa-users] Re: Compat tree question

2017-05-30 Thread Alexander Bokovoy via FreeIPA-users

On ti, 30 touko 2017, Robert Johnson via FreeIPA-users wrote:

So I took a brand new user that I have never used in the system before (I
checked that the entry was not in the compat tree) and just ran an "id"
command on Solaris system.  I then looked in the /var/log/dirsrv/slapd-/access log file on the ipa server, for the query and from the log
file, the query came in as all caps.

example:
[~]$: id 831...@win.mydomin.com

[~]$: cat /var/log/dirsrv/slapd-/access |grep 831413
[30/May/2017:13:34:38.637498942 -0400] conn=94124 op=622 SRCH
base="cn=users,cn=compat,dc=ipa,dc=mydomain,dc=com" scope=1
filter="(&(objectClass=posixAccount)(uid=831...@win.mydomin.com))"
attrs="cn uid uidNumber gidNumber gecos description homeDirectory
loginShell"
[30/May/2017:13:34:38.651811322 -0400] conn=94124 op=622 RESULT err=0
tag=101 nentries=1 etime=0

However, the entry in the compat tree is all lowercase just like I
reported.  I can reproduce this easily.

memberUid value comes from SSSD look up. SSSD normalizes all names to
low case.

For group names, I'm not sure they are normalized, though.




Robert Johnson

On Tue, May 30, 2017 at 1:10 PM, Alexander Bokovoy 
wrote:


On ti, 30 touko 2017, Robert Johnson via FreeIPA-users wrote:


Red Hat Enterprise Linux Server release 7.3
ipa-server-4.4.0-14.el7_3.4.x86_64
389-ds-base-1.3.5.10-15.el7_3.x86_64
sssd-1.14.0-43.el7_3.11.x86_64

When looking at entries in the "cn=groups,cn=compat" tree, I noticed that
the entries for windows groups have the realm portion of the group name in
all caps.  This is true for the comment, the dn and the cn.
example:
# domain us...@win.mydomain.com, groups, compat, ipa.mydomain.com
dn: cn=domain us...@win.mydomain.com
,cn=groups,cn=compat,dc=ipa,dc=mydomain,dc=com
memberUid: 123...@win.mydomain.com
cn: domain us...@win.mydomain.com

When I look at the entries in the "cn=users,cn=compat" tree, the realm
portion of the user name is all lower case.  Incidentally, these same user
names are also all lowercase in the "memberUid" option on the groups
above.
example:
# 123...@win.mydomain.com, users, compat, ipa.mydomain.com
dn: uid=123...@win.mydomain.com,cn=users,cn=compat,dc=ipa,dc=myd
omain,dc=com
homeDirectory: /home/win.mydomain.com/123456
uid: 123...@win.mydomain.com

Was this by design ?


Users and groups for AD users are inserted into the compat tree on
demand, when a request comes mentioning them via LDAP query. The name is
taken from the LDAP query.

So it is your application(s) that are asking fully qualified user/group
names with domain part capitalized.


The reason I ask, is that when I try to use the "kinit" feature on our

Solaris 10 systems (which is joined to the IPA domain) for this windows
user, I get an error.

[~]$ kinit
Password for 123...@win.mydomain.com:
kinit(v5): KDC reply did not match expectations while getting initial
credentials

If I run it like this:
[~]$ kinit 123...@win.mydomain.com
Password for 123...@win.mydomain.com:
[~]$ klist
Ticket cache: FILE:/tmp/krb5cc_1683378846
Default principal: 123...@win.mydomain.com

Valid startingExpiresService principal
05/30/17 11:44:35  05/30/17 21:44:40  krbtgt/
win.mydomain@win.mydomain.com
   renew until 06/06/17 11:44:35

I believe this is due to the fact that the Solaris 10 system is using the
lowercase entry in the compat tree above.  Here is the result of the ID
command on this user:
[~]$ id
uid=1683378846(123...@win.mydomain.com) gid=1683378846(
123...@win.mydomain.com)

I know this is a work around but I would prefer to make this easier on the
end users.  Any suggestions ?


You mix up Kerberos principals and user identities. They are different.
In Kerberos protocol realm is case-sensitive. WIN.MYDOMAIN.COM is not
the same realm as win.mydomain.com. On Active Directory side this is
hidden behind the Windows UI facade but on UNIX systems Kerberos
libraries aren't hiding this fact.

That's why you get "KDC reply did not match expectations .." error
message -- a realm name is used as part of Kerberos exchange and it is
expected to be all upper cases.

On identity front you have probably configured your Solaris systems to
look up identities with upper cased fqdn and compat tree plugin inserts
those as it is. I certainly don't see this behavior with other systems.

--
/ Alexander Bokovoy




___
FreeIPA-users mailing list -- freeipa-users@lists.fedorahosted.org
To unsubscribe send an email to freeipa-users-le...@lists.fedorahosted.org



--
/ Alexander Bokovoy
___
FreeIPA-users mailing list -- freeipa-users@lists.fedorahosted.org
To unsubscribe send an email to freeipa-users-le...@lists.fedorahosted.org


[Freeipa-users] Re: Compat tree question

2017-05-30 Thread Robert Johnson via FreeIPA-users
So I took a brand new user that I have never used in the system before (I
checked that the entry was not in the compat tree) and just ran an "id"
command on Solaris system.  I then looked in the /var/log/dirsrv/slapd-/access log file on the ipa server, for the query and from the log
file, the query came in as all caps.

example:
[~]$: id 831...@win.mydomin.com

[~]$: cat /var/log/dirsrv/slapd-/access |grep 831413
[30/May/2017:13:34:38.637498942 -0400] conn=94124 op=622 SRCH
base="cn=users,cn=compat,dc=ipa,dc=mydomain,dc=com" scope=1
filter="(&(objectClass=posixAccount)(uid=831...@win.mydomin.com))"
attrs="cn uid uidNumber gidNumber gecos description homeDirectory
loginShell"
[30/May/2017:13:34:38.651811322 -0400] conn=94124 op=622 RESULT err=0
tag=101 nentries=1 etime=0

However, the entry in the compat tree is all lowercase just like I
reported.  I can reproduce this easily.

Robert Johnson

On Tue, May 30, 2017 at 1:10 PM, Alexander Bokovoy 
wrote:

> On ti, 30 touko 2017, Robert Johnson via FreeIPA-users wrote:
>
>> Red Hat Enterprise Linux Server release 7.3
>> ipa-server-4.4.0-14.el7_3.4.x86_64
>> 389-ds-base-1.3.5.10-15.el7_3.x86_64
>> sssd-1.14.0-43.el7_3.11.x86_64
>>
>> When looking at entries in the "cn=groups,cn=compat" tree, I noticed that
>> the entries for windows groups have the realm portion of the group name in
>> all caps.  This is true for the comment, the dn and the cn.
>> example:
>> # domain us...@win.mydomain.com, groups, compat, ipa.mydomain.com
>> dn: cn=domain us...@win.mydomain.com
>> ,cn=groups,cn=compat,dc=ipa,dc=mydomain,dc=com
>> memberUid: 123...@win.mydomain.com
>> cn: domain us...@win.mydomain.com
>>
>> When I look at the entries in the "cn=users,cn=compat" tree, the realm
>> portion of the user name is all lower case.  Incidentally, these same user
>> names are also all lowercase in the "memberUid" option on the groups
>> above.
>> example:
>> # 123...@win.mydomain.com, users, compat, ipa.mydomain.com
>> dn: uid=123...@win.mydomain.com,cn=users,cn=compat,dc=ipa,dc=myd
>> omain,dc=com
>> homeDirectory: /home/win.mydomain.com/123456
>> uid: 123...@win.mydomain.com
>>
>> Was this by design ?
>>
> Users and groups for AD users are inserted into the compat tree on
> demand, when a request comes mentioning them via LDAP query. The name is
> taken from the LDAP query.
>
> So it is your application(s) that are asking fully qualified user/group
> names with domain part capitalized.
>
>
> The reason I ask, is that when I try to use the "kinit" feature on our
>> Solaris 10 systems (which is joined to the IPA domain) for this windows
>> user, I get an error.
>>
>> [~]$ kinit
>> Password for 123...@win.mydomain.com:
>> kinit(v5): KDC reply did not match expectations while getting initial
>> credentials
>>
>> If I run it like this:
>> [~]$ kinit 123...@win.mydomain.com
>> Password for 123...@win.mydomain.com:
>> [~]$ klist
>> Ticket cache: FILE:/tmp/krb5cc_1683378846
>> Default principal: 123...@win.mydomain.com
>>
>> Valid startingExpiresService principal
>> 05/30/17 11:44:35  05/30/17 21:44:40  krbtgt/
>> win.mydomain@win.mydomain.com
>>renew until 06/06/17 11:44:35
>>
>> I believe this is due to the fact that the Solaris 10 system is using the
>> lowercase entry in the compat tree above.  Here is the result of the ID
>> command on this user:
>> [~]$ id
>> uid=1683378846(123...@win.mydomain.com) gid=1683378846(
>> 123...@win.mydomain.com)
>>
>> I know this is a work around but I would prefer to make this easier on the
>> end users.  Any suggestions ?
>>
> You mix up Kerberos principals and user identities. They are different.
> In Kerberos protocol realm is case-sensitive. WIN.MYDOMAIN.COM is not
> the same realm as win.mydomain.com. On Active Directory side this is
> hidden behind the Windows UI facade but on UNIX systems Kerberos
> libraries aren't hiding this fact.
>
> That's why you get "KDC reply did not match expectations .." error
> message -- a realm name is used as part of Kerberos exchange and it is
> expected to be all upper cases.
>
> On identity front you have probably configured your Solaris systems to
> look up identities with upper cased fqdn and compat tree plugin inserts
> those as it is. I certainly don't see this behavior with other systems.
>
> --
> / Alexander Bokovoy
>
___
FreeIPA-users mailing list -- freeipa-users@lists.fedorahosted.org
To unsubscribe send an email to freeipa-users-le...@lists.fedorahosted.org


[Freeipa-users] Re: Compat tree question

2017-05-30 Thread Alexander Bokovoy via FreeIPA-users

On ti, 30 touko 2017, Robert Johnson via FreeIPA-users wrote:

Red Hat Enterprise Linux Server release 7.3
ipa-server-4.4.0-14.el7_3.4.x86_64
389-ds-base-1.3.5.10-15.el7_3.x86_64
sssd-1.14.0-43.el7_3.11.x86_64

When looking at entries in the "cn=groups,cn=compat" tree, I noticed that
the entries for windows groups have the realm portion of the group name in
all caps.  This is true for the comment, the dn and the cn.
example:
# domain us...@win.mydomain.com, groups, compat, ipa.mydomain.com
dn: cn=domain us...@win.mydomain.com
,cn=groups,cn=compat,dc=ipa,dc=mydomain,dc=com
memberUid: 123...@win.mydomain.com
cn: domain us...@win.mydomain.com

When I look at the entries in the "cn=users,cn=compat" tree, the realm
portion of the user name is all lower case.  Incidentally, these same user
names are also all lowercase in the "memberUid" option on the groups above.
example:
# 123...@win.mydomain.com, users, compat, ipa.mydomain.com
dn: uid=123...@win.mydomain.com,cn=users,cn=compat,dc=ipa,dc=mydomain,dc=com
homeDirectory: /home/win.mydomain.com/123456
uid: 123...@win.mydomain.com

Was this by design ?

Users and groups for AD users are inserted into the compat tree on
demand, when a request comes mentioning them via LDAP query. The name is
taken from the LDAP query.

So it is your application(s) that are asking fully qualified user/group
names with domain part capitalized.


The reason I ask, is that when I try to use the "kinit" feature on our
Solaris 10 systems (which is joined to the IPA domain) for this windows
user, I get an error.

[~]$ kinit
Password for 123...@win.mydomain.com:
kinit(v5): KDC reply did not match expectations while getting initial
credentials

If I run it like this:
[~]$ kinit 123...@win.mydomain.com
Password for 123...@win.mydomain.com:
[~]$ klist
Ticket cache: FILE:/tmp/krb5cc_1683378846
Default principal: 123...@win.mydomain.com

Valid startingExpiresService principal
05/30/17 11:44:35  05/30/17 21:44:40  krbtgt/
win.mydomain@win.mydomain.com
   renew until 06/06/17 11:44:35

I believe this is due to the fact that the Solaris 10 system is using the
lowercase entry in the compat tree above.  Here is the result of the ID
command on this user:
[~]$ id
uid=1683378846(123...@win.mydomain.com) gid=1683378846(
123...@win.mydomain.com)

I know this is a work around but I would prefer to make this easier on the
end users.  Any suggestions ?

You mix up Kerberos principals and user identities. They are different.
In Kerberos protocol realm is case-sensitive. WIN.MYDOMAIN.COM is not
the same realm as win.mydomain.com. On Active Directory side this is
hidden behind the Windows UI facade but on UNIX systems Kerberos
libraries aren't hiding this fact.

That's why you get "KDC reply did not match expectations .." error
message -- a realm name is used as part of Kerberos exchange and it is
expected to be all upper cases.

On identity front you have probably configured your Solaris systems to
look up identities with upper cased fqdn and compat tree plugin inserts
those as it is. I certainly don't see this behavior with other systems.

--
/ Alexander Bokovoy
___
FreeIPA-users mailing list -- freeipa-users@lists.fedorahosted.org
To unsubscribe send an email to freeipa-users-le...@lists.fedorahosted.org