Re: [Freeipa-users] sudo with freeIPA

2014-08-26 Thread Lukas Slebodnik
On (25/08/14 08:33), Megan . wrote: ok. Changed debug_level to 7. I already it in the domain section (first line). Not sure if this makes a difference [root@map1 pam.d]# cat system-auth #%PAM-1.0 # This file is auto-generated. # User changes will be destroyed the next time authconfig is

Re: [Freeipa-users] sudo with freeIPA

2014-08-26 Thread Lukas Slebodnik
On (25/08/14 14:54), William Graboyes wrote: Hi Megan, I had the same problem with CENTOS 6.5 and free-ipa. I did a ton of searching, and IIRC the conclusion was a bug in that version of sssd, I don't remember all of the details, however I do remember the work around. Create a system account

Re: [Freeipa-users] sudo with freeIPA

2014-08-26 Thread Jakub Hrozek
On 25 Aug 2014, at 23:54, William Graboyes wgrabo...@cenic.org wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Hi Megan, I had the same problem with CENTOS 6.5 and free-ipa. Megan had a different problem. We were able to get to the root cause in an off-list discussion, the

Re: [Freeipa-users] Custom kinit

2014-08-26 Thread Yago Fernández Pinilla
Thanks for the info! I will work more on this and comment my progress On Mon, Aug 25, 2014 at 5:48 PM, Rob Crittenden rcrit...@redhat.com wrote: Yago Fernández Pinilla wrote: I'm using FreeIpa 3.3.5. And according to what I saw, using the API, seems to be the best option. For the

Re: [Freeipa-users] Custom kinit

2014-08-26 Thread Yago Fernández Pinilla
I have checked what you told me. What I would like to do is: having a user and a password, authenticate against the kerberos server using a python script (not using kinit) and then be able to access to the ticket that is returned back by kerberos. User - Service -- Kerberos The user

Re: [Freeipa-users] users AD can not sudo in centos 6.5

2014-08-26 Thread alireza baghery
sorry for delay file sssd.conf: == domain/example.com] debug_level = 6 cache_credentials = True krb5_store_password_if_offline = True ipa_domain = l.example.com id_provider = ipa auth_provider = ipa access_provider = ipa ipa_hostname = client1.l.example.com chpass_provider = ipa

Re: [Freeipa-users] users AD can not sudo in centos 6.5

2014-08-26 Thread Lukas Slebodnik
On (26/08/14 16:50), alireza baghery wrote: sorry for delay file sssd.conf: == domain/example.com] debug_level = 6 cache_credentials = True krb5_store_password_if_offline = True ipa_domain = l.example.com id_provider = ipa auth_provider = ipa access_provider = ipa ipa_hostname =

Re: [Freeipa-users] Fedora Core IPTables or FirewallID?

2014-08-26 Thread brendan kearney
systemctl stop firewalld systemctl disable firewalld systemctl stop iptables systemctl disable iptables sudo iptables -nvL This is not a recommended config, as a firewall will save your bacon without you realizing it. Fwbuilder is a great package in the fedora repos that will write excellent

Re: [Freeipa-users] Fedora Core IPTables or FirewallID?

2014-08-26 Thread Rob Crittenden
brendan kearney wrote: systemctl stop firewalld systemctl disable firewalld systemctl stop iptables systemctl disable iptables sudo iptables -nvL This is not a recommended config, as a firewall will save your bacon without you realizing it. Fwbuilder is a great package in the fedora

Re: [Freeipa-users] Fedora Core IPTables or FirewallID?

2014-08-26 Thread Chris Whittle
Here is what I found that seems to work from http://adam.younglogic.com/2013/04/firewall-d-for-freeipa/ It only has to be ran once... cat /etc/firewalld/services/kerberos.xml EOD ?xml version=1.0 encoding=utf-8? service shortkerberos/short descriptionKerberos/description port protocol=tcp

[Freeipa-users] Create a non-user

2014-08-26 Thread Chris Whittle
So I have a user called mac_slave that is used to verify a that a user is active or not and also used to bind a mac laptop to freeipa's ldap. What I want to do is limit what that used can do and see, for example I wwant to keep them from logging in to my macs (i think i can do that by moving them

Re: [Freeipa-users] Fedora Core IPTables or FirewallID?

2014-08-26 Thread Mark Heslin
Chris, My understanding is that firewalld services are where we're heading but I'm not entirely sure how much or how little of these are fully supported/available yet. I've copied Thomas - he'll know :-) -m On 08/26/2014 10:26 AM, Chris Whittle wrote: Here is what I found that seems to

Re: [Freeipa-users] Installing a new Cert

2014-08-26 Thread Chris Whittle
This actually died after restart so I ended up starting over... So here is the process I did that looks like it works and also survives restart Step 1 - Before install http://stackoverflow.com/questions/23374894/mod-nss-with-apache-public-certificate-issue?noredirect=1#comment36504881_23374894

[Freeipa-users] Monitoring FreeIPA with SNMP

2014-08-26 Thread Dimitar Georgievski
I have successfully enabled SNMP monitoring of FreeIPA server following the instructions available at RedHat's portal: https://access.redhat.com/documentation/en-US/Red_Hat_Directory_Server/9.0/html/Administration_Guide/Monitoring_DS_Using_SNMP.html The problem is I cannot retrieve any metrics

Re: [Freeipa-users] Monitoring FreeIPA with SNMP

2014-08-26 Thread Dimitar Georgievski
Problem resolved. I completely forgot to check the access privileges in /etc/snmp/snmpd.conf. By default NET-SNMP configures the agent to provide access to .iso.org.dod.internet.mgmt. sub-tree only. The redhat sub-tree is under .iso.org.dod.internet.private.enterprises. I had to add a view on this

Re: [Freeipa-users] Cert Renewal

2014-08-26 Thread Rob Crittenden
Ott, Dennis wrote: No services are currently running on the replica (and I am hesitant to start them) but, my recollection is that I did the replica server installation with the --setup-ca option. Also, there are /var/lib/dirsrv/slapd-PKI-IPA/ and /etc/pki-ca/ directories in place on the

Re: [Freeipa-users] Installing a new Cert

2014-08-26 Thread Martin Kosek
Thanks for sharing your (rather painful) experience, I am glad you made it working in the end. Just note that we are currently (read FreeIPA 4.0.x and FreeIPA 4.1) working making the cert operations in the installers smoother so that after so that people like you would have much easier job.

Re: [Freeipa-users] Custom kinit

2014-08-26 Thread Dmitri Pal
On 08/26/2014 11:43 AM, Yago Fernández Pinilla wrote: I have checked what you told me. What I would like to do is: having a user and a password, authenticate against the kerberos server using a python script (not using kinit) and then be able to access to the ticket that is returned back by

[Freeipa-users] Migration works on 3 but not 4?

2014-08-26 Thread Kat
Hi all... Migrating from Open LDAP and it works fine to FreeIPA to 3.x but 4.x I get migration errors? /Constraint violation: invalid password syntax - passwords with storage scheme are not allowed/ I did find one reference to this in the archives, but it references 389-ds 1.3.2.20 and i