[SSSD-users] Re: CentOS 7, SSSD against LDAP: finds user but will not log them in, "Authentication failure" when trying to su

2022-12-07 Thread patrick . hush
Off the top, the LDAP server can not resolve in DNS, so it's setting the LDAP server name to the IP, the IP is not in your cert as a SAN that I can see. > On 12/07/2022 12:10 AM Jarett DeAngelis wrote: > > > Hi Sumit, > > Thank you! You made me realize I never updated PAM using

[SSSD-users] Re: Access Filters

2020-06-10 Thread patrick . hush
Rather than filtering off a single group, why not use the simple_allow_groups key value? This will allow mulitiple groups to access the system should the need ever arise. For the local users, that is outside sssd for the most part, look at your pam configs and nsswitch. > On June 10, 2020

[SSSD-users] Re: Can I map an LDAP value of 123456 to a user name of u123456 ?

2020-03-11 Thread patrick . hush
Why on earth would you assign a numeric value to a uid? Just do a ldapmodify and replace the uid with a valid userid (eg. jsmith) and replace uidNumber with the previous value, then get rid of the: ldap_user_uid_number = uid ldap_user_gid_number = uid stuff, you can do this in one ldif with dn:

[SSSD-users] Re: Can I map an LDAP value of 123456 to a user name of u123456 ?

2020-03-10 Thread patrick . hush
In LDAP what are the uidNumber and uid attributes for a sample user? > On March 10, 2020 at 2:45 PM Michael Lake wrote: > > Hi > > But I'd still have the problem that my UNIX username needs to be POSIX > compliant. So if my number is 123456 and my email is mike.l...@uts.edu.au >

[SSSD-users] Re: Encrypted communication to DC

2020-02-26 Thread patrick . hush
When 389 is used for start_tls, think of it as a unecrypted handshake sort of like this: client: Yo bro sup, want to encrypt our connections? server: Ya man, what can you do? client: I support these ciphers server: no shit, me too, lets do AES-Foo56 server: here is my cert client: oh sweet I can

[SSSD-users] Re: session management by sssd (when using LDAP as an authentication and authorization server)

2020-02-19 Thread patrick . hush
This is NOT an OUD issue, it's not really and issue for sssd either. Look at your sssd.conf, are you caching? What is the time to live? What does your pam auth for session section look like is sss optional or required? Can you post your sssd.conf, pam.d/system-auth? (strip out the sensitive

[SSSD-users] Re: restrict sudo su -

2020-01-20 Thread patrick . hush
I'm trying to determine if he is just using the pam stack and local sudoers or sssd/nsswitch to lookup/AuthZ sudoers in LDAP. ___ sssd-users mailing list -- sssd-users@lists.fedorahosted.org To unsubscribe send an email to

[SSSD-users] Re: restrict sudo su -

2020-01-17 Thread patrick . hush
Are you using a SUDO domain? and LDAP as your sudo and id provider? What does your sssd look like? If you have the Sudoers object class in ldap you can use match users/groups, deny certain hosts, or certain users/groups.. sudoUser: %MyGroup sudoUser: !YourGroup sudoHost:

[SSSD-users] Re: Problem getting sssd to work with LDAP authentication

2019-08-12 Thread patrick . hush
I'm just going to leave this here: Read RFC 2307 and pay attention to section 5.2. Affected library functions. Good luck! > On August 12, 2019 at 12:21 PM Jane Eason wrote: > > > We do not have the uid number in LDAP. > > In our LDAP uid is the username, so LDAP has e.g. uid=bob. There is a

[SSSD-users] Re: Problem getting sssd to work with LDAP authentication

2019-08-12 Thread patrick . hush
[(&(uid=myuser)(objectclass=inetorgperson)(&(uid=*)(!(uid=0][ou=people,ou=primary,ou=eid,dc=my,dc=edu]. what does an ldapsearch with objectclass=inetorgperson uid=\* return? and do you also have a uidnumber attribute? > On August 12, 2019 at 12:55 AM Jakub Hrozek wrote: > > > On Fri,

[SSSD-users] Re: Problem getting sssd to work with LDAP authentication

2019-08-09 Thread patrick . hush
What does your LDAP domain section look like and why are you not using the POSIX object class for uids? > On August 9, 2019 at 12:01 PM Jane Eason wrote: > > > Hello, > > We are attempting to get LDAP logins set up with sssd on RHEL 7.6. > > sssd is able to look up the user against the