CentOS 7 SSSD LDAP against Windows Server DC fails to authenticateCentOS 6 SSSD SSH/Console Login IssuesCan sssd-ldap authenticate non-posix users?LDAP authentication on CentOS 7Configuring Synology NAS as freeIPA clientLDAP client can connect to LDAP host but can't see LDAP usersLinux AD integration, unable to login when using Windows Server 2012 DChow to control ldap users access using groupdn?NFSv4 + SSSD + Active Directory: 'nobody' permissions when ldap_id_mapping disabledHow to set up System Security Services Daemon(SSSD) to authenticate users against Azure Active DirectorySSSD authenticate against parent domain

Surely they can fit?

What's the word for the soldier salute?

Is taking modulus on both sides of an equation valid?

tikz: not so precise graphic

A cryptic tricolour

Why was Thor doubtful about his worthiness to Mjolnir?

Is it a bad idea to replace pull-up resistors with hard pull-ups?

Do atomic orbitals "pulse" in time?

Can the sorting of a list be verified without comparing neighbors?

When a land becomes a creature, is it untapped?

Size of a folder with du

Was this character’s old age look CGI or make-up?

As programers say: Strive to be lazy

How can I answer high-school writing prompts without sounding weird and fake?

Why does the Earth follow an elliptical trajectory rather than a parabolic one?

Would an 8% reduction in drag outweigh the weight addition from this custom CFD-tested winglet?

Early arrival in Australia, early hotel check in not available

Why do Thanos's punches not kill Captain America or at least cause some mortal injuries?

Should these notes be played as a chord or one after another?

What stroke width Instagram is using for its icons and how to get same results?

How are Core iX names like Core i5, i7 related to Haswell, Ivy Bridge?

Is the schwa sound consistent?

Why did the ICC decide not to probe alleged US atrocities in Afghanistan?

What is the significance of 4200 BCE in context of farming replacing foraging in Europe?



CentOS 7 SSSD LDAP against Windows Server DC fails to authenticate


CentOS 6 SSSD SSH/Console Login IssuesCan sssd-ldap authenticate non-posix users?LDAP authentication on CentOS 7Configuring Synology NAS as freeIPA clientLDAP client can connect to LDAP host but can't see LDAP usersLinux AD integration, unable to login when using Windows Server 2012 DChow to control ldap users access using groupdn?NFSv4 + SSSD + Active Directory: 'nobody' permissions when ldap_id_mapping disabledHow to set up System Security Services Daemon(SSSD) to authenticate users against Azure Active DirectorySSSD authenticate against parent domain






.everyoneloves__top-leaderboard:empty,.everyoneloves__mid-leaderboard:empty,.everyoneloves__bot-mid-leaderboard:empty height:90px;width:728px;box-sizing:border-box;








0















I'm having an issue for authenticating via LDAP from a CentOS 7 machine to a Windows Server 2012 R2 DC via SSSD.



Linux WS100 3.10.0-957.10.1.el7.x86_64 #1 SMP Mon Mar 18 15:06:45 UTC 2019 x86_64 x86_64 x86_64 GNU/Linux


ldapsearch can successfully query the directory, via plain LDAP, with no problems



ldapsearch -x -h dc.company.local -D "cn=some user,cn=users,dc=company,dc=local" -w thePassword -b "cn=users,dc=company,dc=local" -s sub "(cn=*)" cn mail sn


And these are the steps done to configure SSSD to this purpose



yum install sssd sssd-client
authconfig --enablesssd --enablesssdauth --ldapserver=dc.company.local --ldapbasedn="cn=users,dc=company,dc=local" --update


/etc/nsswitch.conf contains the entries for sss



passwd: files sss
shadow: files sss
group: files sss


And /etc/sssd/sssd.conf is configured this way:



[sssd]
domains = company.local
config_file_version = 2
services = nss, pam

[domain/company.local]
id_provider = ldap
auth_provider = ldap
ldap_schema = ad
ldap_uri = ldap://dc.company.local
ldap_search_base = cn=users,dc=company,dc=local
ldap_default_bind_dn = cn=some user,cn=users,dc=company,dc=local
ldap_default_authtok_type = password
ldap_default_authtok = thePassword
override_homedir = /home/%u


But su - username nor su - username@company.local does not work. There are network transactions to the domain controller as inspected by tcpdump, but I suppose the credentials are not correctly formatted for the schema I use (ad).



I tried emptying SSSD cache and restarting the daemon, with no difference. I find no related messages in /var/log/secure, and /var/log/sssd/ logs do not point to a misconfiguration.



Can anybody give me a hand? Have you faced a similar issue or may propose another solution doable in a similar setup?



Thank you!










share|improve this question






























    0















    I'm having an issue for authenticating via LDAP from a CentOS 7 machine to a Windows Server 2012 R2 DC via SSSD.



    Linux WS100 3.10.0-957.10.1.el7.x86_64 #1 SMP Mon Mar 18 15:06:45 UTC 2019 x86_64 x86_64 x86_64 GNU/Linux


    ldapsearch can successfully query the directory, via plain LDAP, with no problems



    ldapsearch -x -h dc.company.local -D "cn=some user,cn=users,dc=company,dc=local" -w thePassword -b "cn=users,dc=company,dc=local" -s sub "(cn=*)" cn mail sn


    And these are the steps done to configure SSSD to this purpose



    yum install sssd sssd-client
    authconfig --enablesssd --enablesssdauth --ldapserver=dc.company.local --ldapbasedn="cn=users,dc=company,dc=local" --update


    /etc/nsswitch.conf contains the entries for sss



    passwd: files sss
    shadow: files sss
    group: files sss


    And /etc/sssd/sssd.conf is configured this way:



    [sssd]
    domains = company.local
    config_file_version = 2
    services = nss, pam

    [domain/company.local]
    id_provider = ldap
    auth_provider = ldap
    ldap_schema = ad
    ldap_uri = ldap://dc.company.local
    ldap_search_base = cn=users,dc=company,dc=local
    ldap_default_bind_dn = cn=some user,cn=users,dc=company,dc=local
    ldap_default_authtok_type = password
    ldap_default_authtok = thePassword
    override_homedir = /home/%u


    But su - username nor su - username@company.local does not work. There are network transactions to the domain controller as inspected by tcpdump, but I suppose the credentials are not correctly formatted for the schema I use (ad).



    I tried emptying SSSD cache and restarting the daemon, with no difference. I find no related messages in /var/log/secure, and /var/log/sssd/ logs do not point to a misconfiguration.



    Can anybody give me a hand? Have you faced a similar issue or may propose another solution doable in a similar setup?



    Thank you!










    share|improve this question


























      0












      0








      0








      I'm having an issue for authenticating via LDAP from a CentOS 7 machine to a Windows Server 2012 R2 DC via SSSD.



      Linux WS100 3.10.0-957.10.1.el7.x86_64 #1 SMP Mon Mar 18 15:06:45 UTC 2019 x86_64 x86_64 x86_64 GNU/Linux


      ldapsearch can successfully query the directory, via plain LDAP, with no problems



      ldapsearch -x -h dc.company.local -D "cn=some user,cn=users,dc=company,dc=local" -w thePassword -b "cn=users,dc=company,dc=local" -s sub "(cn=*)" cn mail sn


      And these are the steps done to configure SSSD to this purpose



      yum install sssd sssd-client
      authconfig --enablesssd --enablesssdauth --ldapserver=dc.company.local --ldapbasedn="cn=users,dc=company,dc=local" --update


      /etc/nsswitch.conf contains the entries for sss



      passwd: files sss
      shadow: files sss
      group: files sss


      And /etc/sssd/sssd.conf is configured this way:



      [sssd]
      domains = company.local
      config_file_version = 2
      services = nss, pam

      [domain/company.local]
      id_provider = ldap
      auth_provider = ldap
      ldap_schema = ad
      ldap_uri = ldap://dc.company.local
      ldap_search_base = cn=users,dc=company,dc=local
      ldap_default_bind_dn = cn=some user,cn=users,dc=company,dc=local
      ldap_default_authtok_type = password
      ldap_default_authtok = thePassword
      override_homedir = /home/%u


      But su - username nor su - username@company.local does not work. There are network transactions to the domain controller as inspected by tcpdump, but I suppose the credentials are not correctly formatted for the schema I use (ad).



      I tried emptying SSSD cache and restarting the daemon, with no difference. I find no related messages in /var/log/secure, and /var/log/sssd/ logs do not point to a misconfiguration.



      Can anybody give me a hand? Have you faced a similar issue or may propose another solution doable in a similar setup?



      Thank you!










      share|improve this question
















      I'm having an issue for authenticating via LDAP from a CentOS 7 machine to a Windows Server 2012 R2 DC via SSSD.



      Linux WS100 3.10.0-957.10.1.el7.x86_64 #1 SMP Mon Mar 18 15:06:45 UTC 2019 x86_64 x86_64 x86_64 GNU/Linux


      ldapsearch can successfully query the directory, via plain LDAP, with no problems



      ldapsearch -x -h dc.company.local -D "cn=some user,cn=users,dc=company,dc=local" -w thePassword -b "cn=users,dc=company,dc=local" -s sub "(cn=*)" cn mail sn


      And these are the steps done to configure SSSD to this purpose



      yum install sssd sssd-client
      authconfig --enablesssd --enablesssdauth --ldapserver=dc.company.local --ldapbasedn="cn=users,dc=company,dc=local" --update


      /etc/nsswitch.conf contains the entries for sss



      passwd: files sss
      shadow: files sss
      group: files sss


      And /etc/sssd/sssd.conf is configured this way:



      [sssd]
      domains = company.local
      config_file_version = 2
      services = nss, pam

      [domain/company.local]
      id_provider = ldap
      auth_provider = ldap
      ldap_schema = ad
      ldap_uri = ldap://dc.company.local
      ldap_search_base = cn=users,dc=company,dc=local
      ldap_default_bind_dn = cn=some user,cn=users,dc=company,dc=local
      ldap_default_authtok_type = password
      ldap_default_authtok = thePassword
      override_homedir = /home/%u


      But su - username nor su - username@company.local does not work. There are network transactions to the domain controller as inspected by tcpdump, but I suppose the credentials are not correctly formatted for the schema I use (ad).



      I tried emptying SSSD cache and restarting the daemon, with no difference. I find no related messages in /var/log/secure, and /var/log/sssd/ logs do not point to a misconfiguration.



      Can anybody give me a hand? Have you faced a similar issue or may propose another solution doable in a similar setup?



      Thank you!







      active-directory ldap centos7 sssd






      share|improve this question















      share|improve this question













      share|improve this question




      share|improve this question








      edited May 2 at 10:44







      tallaferrox

















      asked May 2 at 10:35









      tallaferroxtallaferrox

      11




      11




















          1 Answer
          1






          active

          oldest

          votes


















          0














          You should probably be using id_provider = ad rather than ldap which is what I use in my SSSD configuration against AD. auth_provider defaults to the same value as id_provider so you can omit that and using the ad backend implies ldap_schema = ad too.






          share|improve this answer























          • I tried, leaving only id_provider = ad, and then the service cannot be started (Failed to read keytab [default]: No such file or directory). I'd like to clarify that I do not want to bind the machine to AD, only enable LDAP-based logins.

            – tallaferrox
            May 2 at 11:05












          • Yes, sssd-ad(5) mentions that the machine is required to be joined to AD, (it would then have a keytab file). I would update your question to clarify the situation.

            – bodgit
            May 2 at 12:29











          • Many thanks bodgit, just comment that I'd like not to bind the machine to AD...

            – tallaferrox
            May 2 at 14:36











          Your Answer








          StackExchange.ready(function()
          var channelOptions =
          tags: "".split(" "),
          id: "2"
          ;
          initTagRenderer("".split(" "), "".split(" "), channelOptions);

          StackExchange.using("externalEditor", function()
          // Have to fire editor after snippets, if snippets enabled
          if (StackExchange.settings.snippets.snippetsEnabled)
          StackExchange.using("snippets", function()
          createEditor();
          );

          else
          createEditor();

          );

          function createEditor()
          StackExchange.prepareEditor(
          heartbeatType: 'answer',
          autoActivateHeartbeat: false,
          convertImagesToLinks: true,
          noModals: true,
          showLowRepImageUploadWarning: true,
          reputationToPostImages: 10,
          bindNavPrevention: true,
          postfix: "",
          imageUploader:
          brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
          contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
          allowUrls: true
          ,
          onDemand: true,
          discardSelector: ".discard-answer"
          ,immediatelyShowMarkdownHelp:true
          );



          );













          draft saved

          draft discarded


















          StackExchange.ready(
          function ()
          StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fserverfault.com%2fquestions%2f965543%2fcentos-7-sssd-ldap-against-windows-server-dc-fails-to-authenticate%23new-answer', 'question_page');

          );

          Post as a guest















          Required, but never shown

























          1 Answer
          1






          active

          oldest

          votes








          1 Answer
          1






          active

          oldest

          votes









          active

          oldest

          votes






          active

          oldest

          votes









          0














          You should probably be using id_provider = ad rather than ldap which is what I use in my SSSD configuration against AD. auth_provider defaults to the same value as id_provider so you can omit that and using the ad backend implies ldap_schema = ad too.






          share|improve this answer























          • I tried, leaving only id_provider = ad, and then the service cannot be started (Failed to read keytab [default]: No such file or directory). I'd like to clarify that I do not want to bind the machine to AD, only enable LDAP-based logins.

            – tallaferrox
            May 2 at 11:05












          • Yes, sssd-ad(5) mentions that the machine is required to be joined to AD, (it would then have a keytab file). I would update your question to clarify the situation.

            – bodgit
            May 2 at 12:29











          • Many thanks bodgit, just comment that I'd like not to bind the machine to AD...

            – tallaferrox
            May 2 at 14:36















          0














          You should probably be using id_provider = ad rather than ldap which is what I use in my SSSD configuration against AD. auth_provider defaults to the same value as id_provider so you can omit that and using the ad backend implies ldap_schema = ad too.






          share|improve this answer























          • I tried, leaving only id_provider = ad, and then the service cannot be started (Failed to read keytab [default]: No such file or directory). I'd like to clarify that I do not want to bind the machine to AD, only enable LDAP-based logins.

            – tallaferrox
            May 2 at 11:05












          • Yes, sssd-ad(5) mentions that the machine is required to be joined to AD, (it would then have a keytab file). I would update your question to clarify the situation.

            – bodgit
            May 2 at 12:29











          • Many thanks bodgit, just comment that I'd like not to bind the machine to AD...

            – tallaferrox
            May 2 at 14:36













          0












          0








          0







          You should probably be using id_provider = ad rather than ldap which is what I use in my SSSD configuration against AD. auth_provider defaults to the same value as id_provider so you can omit that and using the ad backend implies ldap_schema = ad too.






          share|improve this answer













          You should probably be using id_provider = ad rather than ldap which is what I use in my SSSD configuration against AD. auth_provider defaults to the same value as id_provider so you can omit that and using the ad backend implies ldap_schema = ad too.







          share|improve this answer












          share|improve this answer



          share|improve this answer










          answered May 2 at 10:55









          bodgitbodgit

          3,8091025




          3,8091025












          • I tried, leaving only id_provider = ad, and then the service cannot be started (Failed to read keytab [default]: No such file or directory). I'd like to clarify that I do not want to bind the machine to AD, only enable LDAP-based logins.

            – tallaferrox
            May 2 at 11:05












          • Yes, sssd-ad(5) mentions that the machine is required to be joined to AD, (it would then have a keytab file). I would update your question to clarify the situation.

            – bodgit
            May 2 at 12:29











          • Many thanks bodgit, just comment that I'd like not to bind the machine to AD...

            – tallaferrox
            May 2 at 14:36

















          • I tried, leaving only id_provider = ad, and then the service cannot be started (Failed to read keytab [default]: No such file or directory). I'd like to clarify that I do not want to bind the machine to AD, only enable LDAP-based logins.

            – tallaferrox
            May 2 at 11:05












          • Yes, sssd-ad(5) mentions that the machine is required to be joined to AD, (it would then have a keytab file). I would update your question to clarify the situation.

            – bodgit
            May 2 at 12:29











          • Many thanks bodgit, just comment that I'd like not to bind the machine to AD...

            – tallaferrox
            May 2 at 14:36
















          I tried, leaving only id_provider = ad, and then the service cannot be started (Failed to read keytab [default]: No such file or directory). I'd like to clarify that I do not want to bind the machine to AD, only enable LDAP-based logins.

          – tallaferrox
          May 2 at 11:05






          I tried, leaving only id_provider = ad, and then the service cannot be started (Failed to read keytab [default]: No such file or directory). I'd like to clarify that I do not want to bind the machine to AD, only enable LDAP-based logins.

          – tallaferrox
          May 2 at 11:05














          Yes, sssd-ad(5) mentions that the machine is required to be joined to AD, (it would then have a keytab file). I would update your question to clarify the situation.

          – bodgit
          May 2 at 12:29





          Yes, sssd-ad(5) mentions that the machine is required to be joined to AD, (it would then have a keytab file). I would update your question to clarify the situation.

          – bodgit
          May 2 at 12:29













          Many thanks bodgit, just comment that I'd like not to bind the machine to AD...

          – tallaferrox
          May 2 at 14:36





          Many thanks bodgit, just comment that I'd like not to bind the machine to AD...

          – tallaferrox
          May 2 at 14:36

















          draft saved

          draft discarded
















































          Thanks for contributing an answer to Server Fault!


          • Please be sure to answer the question. Provide details and share your research!

          But avoid


          • Asking for help, clarification, or responding to other answers.

          • Making statements based on opinion; back them up with references or personal experience.

          To learn more, see our tips on writing great answers.




          draft saved


          draft discarded














          StackExchange.ready(
          function ()
          StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fserverfault.com%2fquestions%2f965543%2fcentos-7-sssd-ldap-against-windows-server-dc-fails-to-authenticate%23new-answer', 'question_page');

          );

          Post as a guest















          Required, but never shown





















































          Required, but never shown














          Required, but never shown












          Required, but never shown







          Required, but never shown

































          Required, but never shown














          Required, but never shown












          Required, but never shown







          Required, but never shown







          Popular posts from this blog

          Club Baloncesto Breogán Índice Historia | Pavillón | Nome | O Breogán na cultura popular | Xogadores | Adestradores | Presidentes | Palmarés | Historial | Líderes | Notas | Véxase tamén | Menú de navegacióncbbreogan.galCadroGuía oficial da ACB 2009-10, páxina 201Guía oficial ACB 1992, páxina 183. Editorial DB.É de 6.500 espectadores sentados axeitándose á última normativa"Estudiantes Junior, entre as mellores canteiras"o orixinalHemeroteca El Mundo Deportivo, 16 setembro de 1970, páxina 12Historia do BreogánAlfredo Pérez, o último canoneiroHistoria C.B. BreogánHemeroteca de El Mundo DeportivoJimmy Wright, norteamericano do Breogán deixará Lugo por ameazas de morteResultados de Breogán en 1986-87Resultados de Breogán en 1990-91Ficha de Velimir Perasović en acb.comResultados de Breogán en 1994-95Breogán arrasa al Barça. "El Mundo Deportivo", 27 de setembro de 1999, páxina 58CB Breogán - FC BarcelonaA FEB invita a participar nunha nova Liga EuropeaCharlie Bell na prensa estatalMáximos anotadores 2005Tempada 2005-06 : Tódolos Xogadores da Xornada""Non quero pensar nunha man negra, mais pregúntome que está a pasar""o orixinalRaúl López, orgulloso dos xogadores, presume da boa saúde económica do BreogánJulio González confirma que cesa como presidente del BreogánHomenaxe a Lisardo GómezA tempada do rexurdimento celesteEntrevista a Lisardo GómezEl COB dinamita el Pazo para forzar el quinto (69-73)Cafés Candelas, patrocinador del CB Breogán"Suso Lázare, novo presidente do Breogán"o orixinalCafés Candelas Breogán firma el mayor triunfo de la historiaEl Breogán realizará 17 homenajes por su cincuenta aniversario"O Breogán honra ao seu fundador e primeiro presidente"o orixinalMiguel Giao recibiu a homenaxe do PazoHomenaxe aos primeiros gladiadores celestesO home que nos amosa como ver o Breo co corazónTita Franco será homenaxeada polos #50anosdeBreoJulio Vila recibirá unha homenaxe in memoriam polos #50anosdeBreo"O Breogán homenaxeará aos seus aboados máis veteráns"Pechada ovación a «Capi» Sanmartín e Ricardo «Corazón de González»Homenaxe por décadas de informaciónPaco García volve ao Pazo con motivo do 50 aniversario"Resultados y clasificaciones""O Cafés Candelas Breogán, campión da Copa Princesa""O Cafés Candelas Breogán, equipo ACB"C.B. Breogán"Proxecto social"o orixinal"Centros asociados"o orixinalFicha en imdb.comMario Camus trata la recuperación del amor en 'La vieja música', su última película"Páxina web oficial""Club Baloncesto Breogán""C. B. Breogán S.A.D."eehttp://www.fegaba.com

          Vilaño, A Laracha Índice Patrimonio | Lugares e parroquias | Véxase tamén | Menú de navegación43°14′52″N 8°36′03″O / 43.24775, -8.60070

          Cegueira Índice Epidemioloxía | Deficiencia visual | Tipos de cegueira | Principais causas de cegueira | Tratamento | Técnicas de adaptación e axudas | Vida dos cegos | Primeiros auxilios | Crenzas respecto das persoas cegas | Crenzas das persoas cegas | O neno deficiente visual | Aspectos psicolóxicos da cegueira | Notas | Véxase tamén | Menú de navegación54.054.154.436928256blindnessDicionario da Real Academia GalegaPortal das Palabras"International Standards: Visual Standards — Aspects and Ranges of Vision Loss with Emphasis on Population Surveys.""Visual impairment and blindness""Presentan un plan para previr a cegueira"o orixinalACCDV Associació Catalana de Cecs i Disminuïts Visuals - PMFTrachoma"Effect of gene therapy on visual function in Leber's congenital amaurosis"1844137110.1056/NEJMoa0802268Cans guía - os mellores amigos dos cegosArquivadoEscola de cans guía para cegos en Mortágua, PortugalArquivado"Tecnología para ciegos y deficientes visuales. Recopilación de recursos gratuitos en la Red""Colorino""‘COL.diesis’, escuchar los sonidos del color""COL.diesis: Transforming Colour into Melody and Implementing the Result in a Colour Sensor Device"o orixinal"Sistema de desarrollo de sinestesia color-sonido para invidentes utilizando un protocolo de audio""Enseñanza táctil - geometría y color. Juegos didácticos para niños ciegos y videntes""Sistema Constanz"L'ocupació laboral dels cecs a l'Estat espanyol està pràcticament equiparada a la de les persones amb visió, entrevista amb Pedro ZuritaONCE (Organización Nacional de Cegos de España)Prevención da cegueiraDescrición de deficiencias visuais (Disc@pnet)Braillín, un boneco atractivo para calquera neno, con ou sen discapacidade, que permite familiarizarse co sistema de escritura e lectura brailleAxudas Técnicas36838ID00897494007150-90057129528256DOID:1432HP:0000618D001766C10.597.751.941.162C97109C0155020