Re: [Freeipa-users] Problem generating Oracle ZFS Storage Appliance host and nfs principals and keys to IPA/Free IPA.
I pursued that idea myself earlier but when getting the huge warranty void message when accessing a shell + that the file system was read-only i gave up. I will definitely look at it again and read the information you provided, thank you for your help. From: freeipa-users-boun...@redhat.com [freeipa-users-boun...@redhat.com] on behalf of Sigbjorn Lie [sigbj...@nixtra.com] Sent: Tuesday, December 18, 2012 21:48 To: freeipa-users@redhat.com Subject: Re: [Freeipa-users] Problem generating Oracle ZFS Storage Appliance host and nfs principals and keys to IPA/Free IPA. On 12/18/2012 06:24 AM, Johan Petersson wrote: Hi, Unfortunately i still get the same error from the Appliance even after having added both host and nfs principals in the IPA web interface. "failed to create principal 'host/zfs1.home@HOME': libkadm5clnt error: 43787522 (Operation requires ``add'' privilege)" I get the impression that the Appliance does not recognize existing principals since i still get the same create principal error. So it seems that it does not cope with pre existing principals, at least not from IPA Server. I will contact Oracle about this issue and see what they say. Thank you for your help, Johan. We have these ZFS Storage Appliances at work too. There is a way to access the root shell of the ZFS Storage Appliance. It's been a long time since I've done it, but a quick googelig turned up this: http://weblogs.java.net/blog/kohsuke/archive/2009/01/under_the_hood.html Hopefully the "scp" commands still exists when you get access to the shell of the Solaris OS, so you can copy the pre-created keytab into /etc/krb5/krb5.keytab. CAUTION! The /etc/krb5/krb5.keytab is by default shared between the CIFS server and the NFS server. This file will already contain the keytab for the CIFS/SMB service if you have already joined the ZFS Storage Appliance to AD. In which case copy the pre-created keytab from IPA into /etc/krb5/krb5.keytab-IPA, and use ktutil to merge the two files together. I see I've kept the keytab from my AD in the beginning of the file and added the keytab from IPA to the end of the file. I do recall there being some significance to doing it this way. I've written this howto for NexentaStor a while back. Perhaps this will be of some assistance to complete the configuration of the ZFS Storage Appliance too? https://www.redhat.com/archives/freeipa-users/2011-July/msg00033.html Please let me know how you get on. Regards, Siggi ___ Freeipa-users mailing list Freeipa-users@redhat.com https://www.redhat.com/mailman/listinfo/freeipa-users
Re: [Freeipa-users] Problem generating Oracle ZFS Storage Appliance host and nfs principals and keys to IPA/Free IPA.
On 12/18/2012 06:24 AM, Johan Petersson wrote: Hi, Unfortunately i still get the same error from the Appliance even after having added both host and nfs principals in the IPA web interface. "failed to create principal 'host/zfs1.home@HOME': libkadm5clnt error: 43787522 (Operation requires ``add'' privilege)" I get the impression that the Appliance does not recognize existing principals since i still get the same create principal error. So it seems that it does not cope with pre existing principals, at least not from IPA Server. I will contact Oracle about this issue and see what they say. Thank you for your help, Johan. We have these ZFS Storage Appliances at work too. There is a way to access the root shell of the ZFS Storage Appliance. It's been a long time since I've done it, but a quick googelig turned up this: http://weblogs.java.net/blog/kohsuke/archive/2009/01/under_the_hood.html Hopefully the "scp" commands still exists when you get access to the shell of the Solaris OS, so you can copy the pre-created keytab into /etc/krb5/krb5.keytab. CAUTION! The /etc/krb5/krb5.keytab is by default shared between the CIFS server and the NFS server. This file will already contain the keytab for the CIFS/SMB service if you have already joined the ZFS Storage Appliance to AD. In which case copy the pre-created keytab from IPA into /etc/krb5/krb5.keytab-IPA, and use ktutil to merge the two files together. I see I've kept the keytab from my AD in the beginning of the file and added the keytab from IPA to the end of the file. I do recall there being some significance to doing it this way. I've written this howto for NexentaStor a while back. Perhaps this will be of some assistance to complete the configuration of the ZFS Storage Appliance too? https://www.redhat.com/archives/freeipa-users/2011-July/msg00033.html Please let me know how you get on. Regards, Siggi ___ Freeipa-users mailing list Freeipa-users@redhat.com https://www.redhat.com/mailman/listinfo/freeipa-users
Re: [Freeipa-users] Problem generating Oracle ZFS Storage Appliance host and nfs principals and keys to IPA/Free IPA.
On Tue, 2012-12-18 at 05:24 +, Johan Petersson wrote: > Hi, > > Unfortunately i still get the same error from the Appliance even after having > added both host and nfs principals in the IPA web interface. > > "failed to create principal 'host/zfs1.home@HOME': libkadm5clnt error: > 43787522 (Operation requires ``add'' privilege)" > > I get the impression that the Appliance does not recognize existing > principals since i still get the same create principal error. > So it seems that it does not cope with pre existing principals, at least not > from IPA Server. > I will contact Oracle about this issue and see what they say. Is there any support for using this appliance in an Active Directory domain ? It is possible that they have alternative instructions there. IIRC AD also does not allow you to create principals via the kadmin interface. However they may have tied the 'AD option; if any in knots so that it also doesn't work with anything but a real AD. IT would be nice to hear how Oracle justifies requiring high credentials on an appliance otherwise. Simo. -- Simo Sorce * Red Hat, Inc * New York ___ Freeipa-users mailing list Freeipa-users@redhat.com https://www.redhat.com/mailman/listinfo/freeipa-users
Re: [Freeipa-users] Problem generating Oracle ZFS Storage Appliance host and nfs principals and keys to IPA/Free IPA.
Hi, Unfortunately i still get the same error from the Appliance even after having added both host and nfs principals in the IPA web interface. "failed to create principal 'host/zfs1.home@HOME': libkadm5clnt error: 43787522 (Operation requires ``add'' privilege)" I get the impression that the Appliance does not recognize existing principals since i still get the same create principal error. So it seems that it does not cope with pre existing principals, at least not from IPA Server. I will contact Oracle about this issue and see what they say. Thank you for your help, Johan. From: Simo Sorce [s...@redhat.com] Sent: Tuesday, December 18, 2012 03:20 To: Johan Petersson Cc: freeipa-users@redhat.com Subject: Re: [Freeipa-users] Problem generating Oracle ZFS Storage Appliance host and nfs principals and keys to IPA/Free IPA. On Tue, 2012-12-18 at 00:15 +, Johan Petersson wrote: > Hi, Hi Johan, see inline. > When trying to generate a host and nfs principal + keys from the > Oracle ZFS 7120/7320 Appliance i get the following error message (note > that the information pasted are from a simulator but i get exactly the > same error from our real Appliances). > I can't generate a key on the IPA server and copy it to the Appliance > unfortunately it does not support that since it has a specialised > webinterface and CLI. > The Appliance wants to generate the principals and keys itself after i > add the Kerberos information realm/KDC and admin principal. > > > NTP is synced and DNS is working with reverse, no firewalls and > SELinux disabled. > > > I have tested on both Red Hat/CentOS 6.3 and fedora 17 as IPA servers > with the same results. > > > Any ideas on what is wrong and if it is possible to get it working? > > > > > An unanticipated system error occurred: > > > failed to create principal 'host/zfs1.home@HOME': libkadm5clnt error: > 43787522 (Operation requires ``add'' privilege) > we do not allow tools the permissions to perform add operations via the kadmin interface, this is done by explicitly disallowing certin internal DAL operations in out driver, so it is not configurable. This is because that interface is not rich enough to provide all the information we normally associate to principals in LDAP entries. Does the appliance work if you pre-create the principal ? It sounds very odd that these 'appliances' really require you to give them credentials that have very high privileges, so high as to be able to actually add principals into a kerberos database. I would consider that a very serious bug and security issue in the appliance. Note that the kadmin interface can be allowed to change principals, including getting a new keytab. That will require you to manually edit the ACL file that is not normally configured as we do not need to allow modifications via the kadmin interface in normal IPA domains. So if this appliance can deal with just modifying a principal to get a keytab as opposed to try to create one from scratch then you may be able to configure FreeIPA's kadmin to do that. > Exception type: coXmlrpcFault > Native message: failed to create principal 'host/zfs1.home@HOME': > libkadm5clnt error: 43787522 (Operation requires ``add'' privilege) > Mapped stack trace: > > > Native file: line ? > Native stack trace: > Message: > Wrapped exception: > Stack trace: > > > > at https://192.168.0.112:215/lib/crazyolait/index.js:370:21 > Additional native members: > faultCode: 600 > faultString: failed to create principal 'host/zfs1.home@HOME': > libkadm5clnt error: 43787522 (Operation requires ``add'' privilege) > coStack: top.akMulticall(argv: "[object Object]", > abort:true, func: "function (ret, err, idx) {\n\t\t\tif (err > && err.faultName !== 'EAK_KRB5_NOENT') {\n\t\t\t\takHandleFault(err, > { set: widget.aknsn_vs });\n\t\t\t\treturn;\n\t\t\t}\n\t\t > \tcommitprop(callback);\n\t\t}") > nasServiceNFS.prototype.commit(callback: "function (err) {\n > \t\tif (akHandleFault(err, {\n\t\tset: view.aksvc_current_set\n\t > \t})) {\n\t\t\tif (callback)\n\t\t\t\tcallback(true);\n\t\t > \tview.changed(true);\n\t\t\treturn;\n\t\t}\n\n\t\t/*\n\n\n\t\t */\n\t > \tview.changed(false);\n\n\t\tif (enable === false) {\n\t\t\tif > (callback)\n\t\t\t\tcallback();\n\t\t\treturn;\n\t\t}\n\n\t > \takService.svc.setCompositeState(view.aksvc_id,\n\t\t > akSvc.AK_SVC_STATE_ONLINE, function (ret, err) {\n\t\t\tif > (akHandleFault(err)) {\n\t\t\t\tif (callback)\n\t\t\t\t > \tcallback(true);\n\t\t\t} else {\n\t\t\t\tif (callback)\n\t\t\t\t > \tcallback();\n\t\t\t}\n\t\t});\n\t}") > ak
Re: [Freeipa-users] Problem generating Oracle ZFS Storage Appliance host and nfs principals and keys to IPA/Free IPA.
On Tue, 2012-12-18 at 00:15 +, Johan Petersson wrote: > Hi, Hi Johan, see inline. > When trying to generate a host and nfs principal + keys from the > Oracle ZFS 7120/7320 Appliance i get the following error message (note > that the information pasted are from a simulator but i get exactly the > same error from our real Appliances). > I can't generate a key on the IPA server and copy it to the Appliance > unfortunately it does not support that since it has a specialised > webinterface and CLI. > The Appliance wants to generate the principals and keys itself after i > add the Kerberos information realm/KDC and admin principal. > > > NTP is synced and DNS is working with reverse, no firewalls and > SELinux disabled. > > > I have tested on both Red Hat/CentOS 6.3 and fedora 17 as IPA servers > with the same results. > > > Any ideas on what is wrong and if it is possible to get it working? > > > > > An unanticipated system error occurred: > > > failed to create principal 'host/zfs1.home@HOME': libkadm5clnt error: > 43787522 (Operation requires ``add'' privilege) > we do not allow tools the permissions to perform add operations via the kadmin interface, this is done by explicitly disallowing certin internal DAL operations in out driver, so it is not configurable. This is because that interface is not rich enough to provide all the information we normally associate to principals in LDAP entries. Does the appliance work if you pre-create the principal ? It sounds very odd that these 'appliances' really require you to give them credentials that have very high privileges, so high as to be able to actually add principals into a kerberos database. I would consider that a very serious bug and security issue in the appliance. Note that the kadmin interface can be allowed to change principals, including getting a new keytab. That will require you to manually edit the ACL file that is not normally configured as we do not need to allow modifications via the kadmin interface in normal IPA domains. So if this appliance can deal with just modifying a principal to get a keytab as opposed to try to create one from scratch then you may be able to configure FreeIPA's kadmin to do that. > Exception type: coXmlrpcFault > Native message: failed to create principal 'host/zfs1.home@HOME': > libkadm5clnt error: 43787522 (Operation requires ``add'' privilege) > Mapped stack trace: > > > Native file: line ? > Native stack trace: > Message: > Wrapped exception: > Stack trace: > > > > at https://192.168.0.112:215/lib/crazyolait/index.js:370:21 > Additional native members: > faultCode: 600 > faultString: failed to create principal 'host/zfs1.home@HOME': > libkadm5clnt error: 43787522 (Operation requires ``add'' privilege) > coStack: top.akMulticall(argv: "[object Object]", > abort:true, func: "function (ret, err, idx) {\n\t\t\tif (err > && err.faultName !== 'EAK_KRB5_NOENT') {\n\t\t\t\takHandleFault(err, > { set: widget.aknsn_vs });\n\t\t\t\treturn;\n\t\t\t}\n\t\t > \tcommitprop(callback);\n\t\t}") > nasServiceNFS.prototype.commit(callback: "function (err) {\n > \t\tif (akHandleFault(err, {\n\t\tset: view.aksvc_current_set\n\t > \t})) {\n\t\t\tif (callback)\n\t\t\t\tcallback(true);\n\t\t > \tview.changed(true);\n\t\t\treturn;\n\t\t}\n\n\t\t/*\n\n\n\t\t */\n\t > \tview.changed(false);\n\n\t\tif (enable === false) {\n\t\t\tif > (callback)\n\t\t\t\tcallback();\n\t\t\treturn;\n\t\t}\n\n\t > \takService.svc.setCompositeState(view.aksvc_id,\n\t\t > akSvc.AK_SVC_STATE_ONLINE, function (ret, err) {\n\t\t\tif > (akHandleFault(err)) {\n\t\t\t\tif (callback)\n\t\t\t\t > \tcallback(true);\n\t\t\t} else {\n\t\t\t\tif (callback)\n\t\t\t\t > \tcallback();\n\t\t\t}\n\t\t});\n\t}") > akSvcView.prototype.commitToServer(enable:false, callback: > "function (error) {\n\t\t\takStopWaiting(function () {\n\t\t\t\tif > (view.aksvc_done && !error)\n\t\t\t\t\tview.aksvc_done();\n\t\t\t});\n > \t\t}") > akSvcView.prototype.commit(callback:null) > ( "[object Object]", "[object > MouseEvent]") > (e: "[object MouseEvent]") > [akEventListenerWrap,click,undefined](e: "[object > MouseEvent]") > > > faultName: EAK_KADM5 > > > In the kadmind.log on the IPA server i get the following: > > > Dec 17 23:12:05 server.home kadmind[3614](Notice): Request: > kadm5_init, admin@HOME, success, client=admin@HOME, > service=kadmin/server.home@HOME, addr=192.168.0.112, vers=2, flavor=6 > Dec 17 23:12:05 server.home kadmind[3614](Notice): Unauthorized > request: kadm5_create_principal, host/zfs1.home@HOME, > client=admin@HOME, service=kadmin/server.home@HOME, addr=192.168.0.112 > > > And in the krb5kdc.log: > > > Dec 17 23:15:23 server.home krb5kdc[4015](info): AS_REQ (7 etypes {18 > 17 16 23 24 3 1}) 192.168.0.112: CLIENT_NOT_FOUND: root/zfs1.home@HOME > for krbtgt/HOME@HOME, Client not found in Kerberos database > Dec 17 23:15:23 server.home krb5kdc[4016](info): AS_REQ (7 etypes {18 > 17 16 23 24 3 1}) 192.168.0
Re: [Freeipa-users] Problem generating Oracle ZFS Storage Appliance host and nfs principals and keys to IPA/Free IPA.
On 12/17/2012 07:15 PM, Johan Petersson wrote: > Hi, > > When trying to generate a host and nfs principal + keys from the > Oracle ZFS 7120/7320 Appliance i get the following error message (note > that the information pasted are from a simulator but i get exactly the > same error from our real Appliances). > I can't generate a key on the IPA server and copy it to the Appliance > unfortunately it does not support that since it has a specialised > webinterface and CLI. > The Appliance wants to generate the principals and keys itself after i > add the Kerberos information realm/KDC and admin principal. > > NTP is synced and DNS is working with reverse, no firewalls and > SELinux disabled. > > I have tested on both Red Hat/CentOS 6.3 and fedora 17 as IPA servers > with the same results. > > Any ideas on what is wrong and if it is possible to get it working? > > > An unanticipated system error occurred: > > failed to create principal 'host/zfs1.home@HOME': libkadm5clnt error: > 43787522 (Operation requires ``add'' privilege) Do you have this principal already precreated? It seems that the client tries to create a principal using its kadmin library. I am not sure it would work. The protocol we use in ipa-getkeytab is not a kadmin protocol. As far as I recall it does an LDAP extended operation. > > Exception type: coXmlrpcFault > Native message: failed to create principal 'host/zfs1.home@HOME': > libkadm5clnt error: 43787522 (Operation requires ``add'' privilege) > Mapped stack trace: > > Native file: line ? > Native stack trace: > Message: > Wrapped exception: > Stack trace: > > > at https://192.168.0.112:215/lib/crazyolait/index.js:370:21 > Additional native members: > faultCode: 600 > faultString: failed to create principal 'host/zfs1.home@HOME': > libkadm5clnt error: 43787522 (Operation requires ``add'' privilege) > coStack: top.akMulticall(argv: "[object Object]", > abort:true, func: "function (ret, err, idx) {\n\t\t\tif (err > && err.faultName !== 'EAK_KRB5_NOENT') {\n\t\t\t\takHandleFault(err, { > set: widget.aknsn_vs > });\n\t\t\t\treturn;\n\t\t\t}\n\t\t\tcommitprop(callback);\n\t\t}") > nasServiceNFS.prototype.commit(callback: "function (err) > {\n\t\tif (akHandleFault(err, {\n\t\tset: > view.aksvc_current_set\n\t\t})) {\n\t\t\tif > (callback)\n\t\t\t\tcallback(true);\n\t\t\tview.changed(true);\n\t\t\treturn;\n\t\t}\n\n\t\t/*\n\n\n\t\t > */\n\t\tview.changed(false);\n\n\t\tif (enable === false) {\n\t\t\tif > (callback)\n\t\t\t\tcallback();\n\t\t\treturn;\n\t\t}\n\n\t\takService.svc.setCompositeState(view.aksvc_id,\n\t\t >akSvc.AK_SVC_STATE_ONLINE, function (ret, err) {\n\t\t\tif > (akHandleFault(err)) {\n\t\t\t\tif > (callback)\n\t\t\t\t\tcallback(true);\n\t\t\t} else {\n\t\t\t\tif > (callback)\n\t\t\t\t\tcallback();\n\t\t\t}\n\t\t});\n\t}") > akSvcView.prototype.commitToServer(enable:false, callback: > "function (error) {\n\t\t\takStopWaiting(function () {\n\t\t\t\tif > (view.aksvc_done && > !error)\n\t\t\t\t\tview.aksvc_done();\n\t\t\t});\n\t\t}") > akSvcView.prototype.commit(callback:null) > ( "[object Object]", "[object MouseEvent]") > (e: "[object MouseEvent]") > [akEventListenerWrap,click,undefined](e: "[object MouseEvent]") > > faultName: EAK_KADM5 > > In the kadmind.log on the IPA server i get the following: > > Dec 17 23:12:05 server.home kadmind[3614](Notice): Request: > kadm5_init, admin@HOME, success, client=admin@HOME, > service=kadmin/server.home@HOME, addr=192.168.0.112, vers=2, flavor=6 > Dec 17 23:12:05 server.home kadmind[3614](Notice): Unauthorized > request: kadm5_create_principal, host/zfs1.home@HOME, > client=admin@HOME, service=kadmin/server.home@HOME, addr=192.168.0.112 > > And in the krb5kdc.log: > > Dec 17 23:15:23 server.home krb5kdc[4015](info): AS_REQ (7 etypes {18 > 17 16 23 24 3 1}) 192.168.0.112: CLIENT_NOT_FOUND: root/zfs1.home@HOME > for krbtgt/HOME@HOME, Client not found in Kerberos database > Dec 17 23:15:23 server.home krb5kdc[4016](info): AS_REQ (7 etypes {18 > 17 16 23 24 3 1}) 192.168.0.112: CLIENT_NOT_FOUND: host/zfs1.home@HOME > for krbtgt/HOME@HOME, Client not found in Kerberos database > > If i add the host in IPA i instead get: > > Dec 17 23:48:18 server.home krb5kdc[4016](info): ... > CONSTRAINED-DELEGATION s4u-client=admin@HOME > Dec 17 23:48:35 server.home krb5kdc[4016](info): AS_REQ (7 etypes {18 > 17 16 23 24 3 1}) 192.168.0.112: NEEDED_PREAUTH: admin@HOME for > kadmin/server.home@HOME, Additional pre-authentication required > Dec 17 23:48:35 server.home krb5kdc[4015](info): AS_REQ (7 etypes {18 > 17 16 23 24 3 1}) 192.168.0.112: ISSUE: authtime 1355784515, etypes > {rep=18 tkt=18 ses=18}, admin@HOME for kadmin/server.home@HOME > > > ___ > Freeipa-users mailing list > Freeipa-users@redhat.com > https://www.redhat.com/mailman/listinfo/freeipa-users -- Thank you, Dmitri Pal Sr. Engineering Manager for IdM portfolio Red Hat Inc. --- Looking t
[Freeipa-users] Problem generating Oracle ZFS Storage Appliance host and nfs principals and keys to IPA/Free IPA.
Hi, When trying to generate a host and nfs principal + keys from the Oracle ZFS 7120/7320 Appliance i get the following error message (note that the information pasted are from a simulator but i get exactly the same error from our real Appliances). I can't generate a key on the IPA server and copy it to the Appliance unfortunately it does not support that since it has a specialised webinterface and CLI. The Appliance wants to generate the principals and keys itself after i add the Kerberos information realm/KDC and admin principal. NTP is synced and DNS is working with reverse, no firewalls and SELinux disabled. I have tested on both Red Hat/CentOS 6.3 and fedora 17 as IPA servers with the same results. Any ideas on what is wrong and if it is possible to get it working? An unanticipated system error occurred: failed to create principal 'host/zfs1.home@HOME': libkadm5clnt error: 43787522 (Operation requires ``add'' privilege) Exception type: coXmlrpcFault Native message: failed to create principal 'host/zfs1.home@HOME': libkadm5clnt error: 43787522 (Operation requires ``add'' privilege) Mapped stack trace: Native file: line ? Native stack trace: Message: Wrapped exception: Stack trace: at https://192.168.0.112:215/lib/crazyolait/index.js:370:21 Additional native members: faultCode: 600 faultString: failed to create principal 'host/zfs1.home@HOME': libkadm5clnt error: 43787522 (Operation requires ``add'' privilege) coStack: top.akMulticall(argv: "[object Object]", abort:true, func: "function (ret, err, idx) {\n\t\t\tif (err && err.faultName !== 'EAK_KRB5_NOENT') {\n\t\t\t\takHandleFault(err, { set: widget.aknsn_vs });\n\t\t\t\treturn;\n\t\t\t}\n\t\t\tcommitprop(callback);\n\t\t}") nasServiceNFS.prototype.commit(callback: "function (err) {\n\t\tif (akHandleFault(err, {\n\t\tset: view.aksvc_current_set\n\t\t})) {\n\t\t\tif (callback)\n\t\t\t\tcallback(true);\n\t\t\tview.changed(true);\n\t\t\treturn;\n\t\t}\n\n\t\t/*\n\n\n\t\t */\n\t\tview.changed(false);\n\n\t\tif (enable === false) {\n\t\t\tif (callback)\n\t\t\t\tcallback();\n\t\t\treturn;\n\t\t}\n\n\t\takService.svc.setCompositeState(view.aksvc_id,\n\t\t akSvc.AK_SVC_STATE_ONLINE, function (ret, err) {\n\t\t\tif (akHandleFault(err)) {\n\t\t\t\tif (callback)\n\t\t\t\t\tcallback(true);\n\t\t\t} else {\n\t\t\t\tif (callback)\n\t\t\t\t\tcallback();\n\t\t\t}\n\t\t});\n\t}") akSvcView.prototype.commitToServer(enable:false, callback: "function (error) {\n\t\t\takStopWaiting(function () {\n\t\t\t\tif (view.aksvc_done && !error)\n\t\t\t\t\tview.aksvc_done();\n\t\t\t});\n\t\t}") akSvcView.prototype.commit(callback:null) ( "[object Object]", "[object MouseEvent]") (e: "[object MouseEvent]") [akEventListenerWrap,click,undefined](e: "[object MouseEvent]") faultName: EAK_KADM5 In the kadmind.log on the IPA server i get the following: Dec 17 23:12:05 server.home kadmind[3614](Notice): Request: kadm5_init, admin@HOME, success, client=admin@HOME, service=kadmin/server.home@HOME, addr=192.168.0.112, vers=2, flavor=6 Dec 17 23:12:05 server.home kadmind[3614](Notice): Unauthorized request: kadm5_create_principal, host/zfs1.home@HOME, client=admin@HOME, service=kadmin/server.home@HOME, addr=192.168.0.112 And in the krb5kdc.log: Dec 17 23:15:23 server.home krb5kdc[4015](info): AS_REQ (7 etypes {18 17 16 23 24 3 1}) 192.168.0.112: CLIENT_NOT_FOUND: root/zfs1.home@HOME for krbtgt/HOME@HOME, Client not found in Kerberos database Dec 17 23:15:23 server.home krb5kdc[4016](info): AS_REQ (7 etypes {18 17 16 23 24 3 1}) 192.168.0.112: CLIENT_NOT_FOUND: host/zfs1.home@HOME for krbtgt/HOME@HOME, Client not found in Kerberos database If i add the host in IPA i instead get: Dec 17 23:48:18 server.home krb5kdc[4016](info): ... CONSTRAINED-DELEGATION s4u-client=admin@HOME Dec 17 23:48:35 server.home krb5kdc[4016](info): AS_REQ (7 etypes {18 17 16 23 24 3 1}) 192.168.0.112: NEEDED_PREAUTH: admin@HOME for kadmin/server.home@HOME, Additional pre-authentication required Dec 17 23:48:35 server.home krb5kdc[4015](info): AS_REQ (7 etypes {18 17 16 23 24 3 1}) 192.168.0.112: ISSUE: authtime 1355784515, etypes {rep=18 tkt=18 ses=18}, admin@HOME for kadmin/server.home@HOME ___ Freeipa-users mailing list Freeipa-users@redhat.com https://www.redhat.com/mailman/listinfo/freeipa-users