[SSSD-users] Missing group memberships with sssd (when using tokengroups)

2018-07-09 Thread Spike White
All, Below is a writeup of missing AD groups for accounts when using tokengroups. When not using tokengroups, sssd is rock solid. Yes, most of the missing AD groups are universal or global groups -- but not all! For some accounts, even domain-local AD groups are missed from their group

[SSSD-users] Re: sssd id getent and secondary groups in active directory

2018-07-09 Thread Jakub Hrozek
On Mon, Jul 09, 2018 at 01:45:57PM +0200, John Hearns wrote: > One stupid question - is there an easy(ish) way to tell how deep a group > heirarachy exists on a particular site? I don't think so, without trying. However, looking at the code now, the default nesting limit is only two levels deep

[SSSD-users] Re: sssd id getent and secondary groups in active directory

2018-07-09 Thread Ratliff, John
On Fri, 2018-07-06 at 10:55 +0200, Sumit Bose wrote: > > this makes SSSD assume that the user is not a member of any group. > > Please try to set 'ldap_use_tokengroups=False' (see man sssd-ldap for > details) and check if the group memberships are reported more > reliable. > > Afaik the issue

[SSSD-users] Re: recreate machine keytab file

2018-07-09 Thread James Ralston
On Mon, Jul 9, 2018 at 8:19 AM Ondrej Valousek wrote: > Is there any way how can we recreate system keytab file of a machine > joined to AD if the file has been broken/deleted? > > I want to avoid doing join again as this would probably delete the > existing account (with all attributes we have

[SSSD-users] Re: recreate machine keytab file

2018-07-09 Thread John Hearns
Talking about renewing keys. In our setup we use a service account which has the rights to join machines to the domain, the Linux workstations are in s special OU. I run a cron job which calls msktutil --auto-update every day to renew the machine password if over 30 days. As discussed in another

[SSSD-users] Re: sssd id getent and secondary groups in active directory

2018-07-09 Thread John Hearns
One stupid question - is there an easy(ish) way to tell how deep a group heirarachy exists on a particular site? On 9 July 2018 at 13:36, Jakub Hrozek wrote: > On Fri, Jul 06, 2018 at 01:41:38PM +, Ratliff, John wrote: > > > > > > On Fri, 2018-07-06 at 10:55 +0200, Sumit Bose wrote: > > >

[SSSD-users] Re: recreate machine keytab file

2018-07-09 Thread Sumit Bose
On Mon, Jul 09, 2018 at 02:20:31PM +, Ondrej Valousek wrote: > Thanks, > "net ads keytab create" does work, but it populates my keytab with all > accounts (user and computer) that can be found in AD - i.e. pretty dangerous. > I would like to add it some parameter to only will with entries

[SSSD-users] Re: recreate machine keytab file

2018-07-09 Thread John Hodrien
On Mon, 9 Jul 2018, Ondrej Valousek wrote: Thanks, "net ads keytab create" does work, but it populates my keytab with all accounts (user and computer) that can be found in AD - i.e. pretty dangerous. I would like to add it some parameter to only will with entries relevant for my computer -

[SSSD-users] Re: recreate machine keytab file

2018-07-09 Thread Ondrej Valousek
Thanks, "net ads keytab create" does work, but it populates my keytab with all accounts (user and computer) that can be found in AD - i.e. pretty dangerous. I would like to add it some parameter to only will with entries relevant for my computer - i.e. something like: Net ads keytab create

[SSSD-users] Re: recreate machine keytab file

2018-07-09 Thread Sumit Bose
On Mon, Jul 09, 2018 at 12:19:09PM +, Ondrej Valousek wrote: > Hi List, > > Is there any way how can we recreate system keytab file of a machine joined > to AD if the file has been broken/deleted? > I want to avoid doing join again as this would probably delete the existing > account (with

[SSSD-users] recreate machine keytab file

2018-07-09 Thread Ondrej Valousek
Hi List, Is there any way how can we recreate system keytab file of a machine joined to AD if the file has been broken/deleted? I want to avoid doing join again as this would probably delete the existing account (with all attributes we have set). Thanks, Ondrej - The information

[SSSD-users] Re: one user can't be looked up

2018-07-09 Thread Jakub Hrozek
On Fri, Jul 06, 2018 at 09:02:25AM -0700, Peter Moody wrote: > On Tue, Jul 3, 2018 at 11:45 PM Sumit Bose wrote: > > > > On Thu, Jun 28, 2018 at 07:46:29PM -0700, Peter Moody wrote: > > > are there any logs I can provide to help anyone figure out why this is > > > happening? I've (re-)confirmed

[SSSD-users] Re: sssd id getent and secondary groups in active directory

2018-07-09 Thread Jakub Hrozek
On Fri, Jul 06, 2018 at 01:41:38PM +, Ratliff, John wrote: > > > On Fri, 2018-07-06 at 10:55 +0200, Sumit Bose wrote: > > On Thu, Jul 05, 2018 at 08:09:55PM +, Ratliff, John wrote: > > > > > > > (Thu Jul 5 16:04:42 2018) [sssd[be[ads.iu.edu]]] [sdap_print_server] > > (0x2000):