For what it's worth, I have verified that I can run this on the client and it
returns the override object immediately:
ldapsearch -x -H ldaps://arb-01.engipa.example.com -D 'cn=Directory Manager '
-W -b 'cn=Default Trust View,cn=views,cn=accounts,dc=engipa,dc=example,dc=com'
-s sub
> On Wed, Mar 06, 2019 at 11:24:20PM -0000, Charles Ulrich via FreeIPA-users
> wrote:
>
> In the log snippet the client runs into a timeout, the IPA server didn't
> send a reply for 6s. Since you say that you can authenticate in general
> on the client I guess this might only
Hello, good people of FreeIPA-users,
Short version:
I've run into an issue where a SSH public key authentication doesn't work on
the FreeIPA client. When I run `sss_ssh_authorizedkeys `
on the client, there is a brief hang (10-15 seconds, maybe?) and then it
returns nothing. The same command
Hello,
Hopefully this might be a straightforward question.
I have testing instance of FreeIPA version 4.6.4 installed on CentOS 7 from the
distro's default repos. I have it configured for a one-way trust to an Active
Directory deployment. On the client side, I have installed and configured the
Alrighty, maybe I'll give that a spin. Thanks for your time.
Charles
___
FreeIPA-users mailing list -- freeipa-users@lists.fedorahosted.org
To unsubscribe send an email to freeipa-users-le...@lists.fedorahosted.org
Fedora Code of Conduct:
Sorry, yes I guess that would have been critical information. I installed
FreeIPA on CentOS 7 from the default repositories which is version 4.6.4. So I
guess that explains that.
Is 4.6 considered stable? Is there a way to run 4.7 on CentOS in a production
environment?
Thanks,
Charles
Hello,
I'm setting up a test instance of FreeIPA with a one-way trust to the
organization's AD. So far, that all appears to be working. I can run LDAP
queries to look up users, I can log into the test instance via Kerberos, it's
all golden. What I would like to next is to add certain external