[Freeipa-users] Re: using SPAKE

2019-10-18 Thread Charles Hedrick via FreeIPA-users
Thanks. So if we’re going to continue using FAST, it would be nice to get “kinit -n” working properly. We currently use external certificates. The KDC generates certificates for kinit -n if we don’t supply an external cert, and they work, but then I have to get them on all the clients, and upd

[Freeipa-users] Re: using SPAKE

2019-10-18 Thread Robbie Harwood via FreeIPA-users
Charles Hedrick via FreeIPA-users writes: > I’d like to avoid having to use a second cache to armor 2FA > requests. My impression was that SPAKE was supposed to fix this. I > just installed a new kdc (replica of an old one) in Centos 8. It > understands SPAKE, offering it as preauthebtication for

[Freeipa-users] using SPAKE

2019-10-18 Thread Charles Hedrick via FreeIPA-users
I’d like to avoid having to use a second cache to armor 2FA requests. My impression was that SPAKE was supposed to fix this. I just installed a new kdc (replica of an old one) in Centos 8. It understands SPAKE, offering it as preauthebtication for normal users. But a user with 2FA is not offered

[Freeipa-users] Re: Internal vs External CA

2019-10-18 Thread Rob Crittenden via FreeIPA-users
Kristian Petersen wrote: > OK I must have missed that and I think I have the root cert now.  I ran  > ipa-cacert-manage -n Digicert_Root -t C,, install > DigiCert_Global_Root_CA.crt > The message I got back said that this cert was installed successfully. > > So now I tried adding the others using

[Freeipa-users] Re: cannot create PTR record - too many address components

2019-10-18 Thread Stephen Ingram via FreeIPA-users
On Thu, Oct 17, 2019 at 11:36 PM Alexander Bokovoy wrote: > On to, 17 loka 2019, Stephen Ingram via FreeIPA-users wrote: > >I'm trying to setup service discovery for our printers on the network > using > >a CUPS bonjour tutorial. Specifically the record I'm trying to create is: > > > >_ipp._tcp

[Freeipa-users] Re: Internal vs External CA

2019-10-18 Thread Kristian Petersen via FreeIPA-users
OK I must have missed that and I think I have the root cert now. I ran ipa-cacert-manage -n Digicert_Root -t C,, install DigiCert_Global_Root_CA.crt The message I got back said that this cert was installed successfully. So now I tried adding the others using the same command as above (with a diff

[Freeipa-users] ipa-replica-install

2019-10-18 Thread Joseph, Matthew via FreeIPA-users
Hello, I'm currently running into an issue when trying to do the ipa-replica-install. I did the ipa-replica-prepare command and copied the replica gpg file to the new replica server and run the following command to do the install Ipa-replica-install -setup-ca -setup-dns -no-forwarders /var/lib/

[Freeipa-users] Re: Windows clients and domain_realm mappings

2019-10-18 Thread Alexander Bokovoy via FreeIPA-users
On pe, 18 loka 2019, Pieter Baele wrote: >By adding a domain_realm mapping to a windows client, also describe on >FreeIPA-users before, the routing problem is solved. But I (and especially >the AD admins ;-) ) would prefer to solve the underlying issue. Don't use external trust, use forest trust.

[Freeipa-users] Re: Windows clients and domain_realm mappings

2019-10-18 Thread Pieter Baele via FreeIPA-users
On Fri, Oct 18, 2019 at 8:26 AM Alexander Bokovoy wrote: > On pe, 18 loka 2019, Pieter Baele wrote: > >All Windows clients are properly enrolled into the AD domain. > > > >We can't use two-way trust because of reasons you explained here before. A > >one-way external trust is used. All perfectly e