Show Table of Contents
Chapter 30. Authentication and Interoperability
sssdcomponent, BZ#1081046- The
accountExpiresattribute that SSSD uses to see whether an account has expired is not replicated to the Global Catalog by default. As a result, users with expired accounts can be allowed to log in when using GSSAPI authentication. To work around this problem, the Global Catalog support can be disabled by specifyingad_enable_gc=Falsein thesssd.conffile. With this setting, users with expired accounts will be denied access when using GSSAPI authentication. Note that SSSD connects to each LDAP server individually in this scenario, which can increase the connection count. ipacomponent, BZ#1004156- When DNS support is being added for an Identity Management server (for example, by using
ipa-dns-installor by using the--setup-dnsoption with theipa-server-installoripa-replica-installcommands), the script adds a host name of a new Identity Management DNS server to the list of name servers in the primary Identity Management DNS zone (via DNS NS record). However, it does not add the DNS name server record to other DNS zones served by the Identity Management servers. As a consequence, the list of name servers in the non-primary DNS zones has only a limited set of Identity Management name servers serving the DNS zone (only one, without user intervention). When the limited set of Identity Management name servers is not available, these DNS zones are not resolvable. To work around this problem, manually add new DNS name server records to all non-primary DNS zones when a new Identity Management replica is being added. Also, manually remove such DNS name server records when the replica is being decommissioned. Non-primary DNS zones can maintain higher availability by having a manually maintained set of Identity Management name servers serving it. ipacomponent, BZ#971384- The default
Unlock user accountspermission does not include thensaccountlockattribute, which is necessary for a successful unlocking of a user entry. Consequently, a privileged user with this permission assigned cannot unlock another user, and errors like the following are displayed:ipa: ERROR: Insufficient access: Insufficient 'write' privilege to the 'nsAccountLock' attribute of entry 'uid=user,cn=users,cn=accounts,dc=example,dc=com'.
To work around this problem, addnssacountlockto the list of allowed attributes in the aforementioned permission by running the following command:~]#
ipa permission-mod "Unlock user accounts" --attrs={krbLastAdminUnlock,krbLoginFailedCount,nsaccountlock}As a result, users with theUnlock user accountspermission assigned can unlock other users. ipacomponent, BZ#973195- There are multiple problems across different tools used in the Identity Management installation, which prevents installation of user-provided certificates with intermediate certificate authority (CA). One of the errors is that incorrect trust flags are assigned to the intermediate CA certificate when importing a PKCS#12 file. Consequently, the Identity Management server installer fails due to an incomplete trust chain that is returned for Identity Management services. There is no known workaround, certificates not issued by the embedded Certificate Authority must not contain an intermediate CA in their trust chain.
ipacomponent , BZ#988473- Access control to lightweight directory access protocol (LDAP) objects representing trust with Active Directory (AD) is given to the
Trusted Adminsgroup in Identity Management. In order to establish the trust, the Identity Management administrator should belong to a group which is a member of the "Trusted Admins" group and this group should have relative identifier (RID) 512 assigned. To ensure this, run theipa-adtrust-installcommand and then theipa group-show admins --allcommand to verify that the "ipantsecurityidentifier" field contains a value ending with the "-512" string. If the field does not end with "-512", use theipa group-mod admins --setattr=ipantsecurityidentifier=SIDcommand, where SID is the value of the field from theipa group-show admins --allcommand output with the last component value (-XXXX) replaced by the "-512" string. ipacomponent, BZ#1084018- Red Hat Enterprise Linux 7 contains an updated version of
slapi-nis, a Directory Server plug-in, which allows users of Identity Management and the Active Directory service to authenticate on legacy clients. However, theslapi-niscomponent only enables identity and authentication services, but does not allow users to change their password. As a consequence, users logged to legacy clients viaslapi-niscompatibility tree can change their password only via the Identity Management Server Self-Service Web UI page or directly in Active Directory. ipacomponent, BZ#1060349- The
ipa host-addcommand does not verify the existence of AAAA records. As a consequence,ipa host-addfails if no A record is available for the host, although an AAAA record exists. To work around this problem, runipa host-addwith the--forceoption. ipacomponent, BZ#1081626- An IPA master is uninstalled while SSL certificates for services other than IPA servers are tracked by the
certmongerservice. Consequently, an unexpected error can occur, and the uninstallation fails. To work around this problem, startcertmonger, and run theipa-getcertcommand to list the tracked certificates. Then run theipa-getcert stop-tracking -i <Request ID>command to stopcertmongerfrom tracking the certificates, and run the IPA uninstall script again. ipacomponent, BZ#1088683- The
ipa-client-installcommand does not process the--preserve-sssdoption correctly when generating the IPA domain configuration in thesssd.conffile. As a consequence, the original configuration of the IPA domain is overwritten. To work around this problem, reviewsssd.confafter runningipa-client-installto identify and manually fix any unwanted changes. certmongercomponent, BZ#996581- The directory containing a private key or certificate can have an incorrect SELinux context. As a consequence, the
ipa-getcert request -kcommand fails, and an unhelpful error message is displayed. To work around this problem, set the SELinux context on the directory containing the certificate and the key tocert_t. You can resubmit an existing certificate request by running theipa-getcert resubmit -i <Request ID>command. sssdcomponent, BZ#1103249- Under certain circumstances, the algorithm in the Privilege Attribute Certificate (PAC) responder component of the System Security Services Daemon (SSSD) does not effectively handle users who are members of a large number of groups. As a consequence, logging from Windows clients to Red Hat Enterprise Linux clients with Kerberos single sign-on (SSO) can be noticeably slow. There is currently no known workaround available.
ipacomponent, BZ#1033357- The
ipactl restartcommand requires the directory server to be running. Consequently, if this condition is not met,ipactl restartfails with an error message. To work around this problem, use theipactl startcommand to start the directory server before executingipactl restart. Note that theipactl statuscommand can be used to verify if the directory server is running. pki-corecomponent, BZ#1085105- The certificate subsystem fails to install if the system language is set to Turkish. To work around this problem, set the system language to English by putting the following line in the
/etc/sysconfig/i18nfile:LANG="en_US.UTF-8"
Also, remove any other "LANG=" entries in/etc/sysconfig/i18n, then reboot the system. After reboot, you can successfully runipa-server-install, and the original contents of/etc/sysconfig/i18nmay be restored. ipacomponent, BZ#1020563- The
ipa-server-installandipa-replica-installcommands replace the list of NTP servers in the/etc/ntp.conffile with Red Hat Enterprise Linux default servers. As a consequence, NTP servers configured before installing IPA are not contacted, and servers fromrhel.pool.ntp.orgare contacted instead. If those default servers are unreachable, the IPA server does not synchronize its time via NTP. To work around this problem, add any custom NTP servers to/etc/ntp.conf, and remove the default Red Hat Enterprise Linux servers if required. The configured servers are now used for time synchronization after restarting the NTP service by running thesystemctl restart ntpd.servicecommand. gnutlscomponent, BZ#1084080- The
gnutlsutility fails to generate a non-encrypted private key when the user enters an empty password. To work around this problem, use thecerttoolcommand with thepasswordoption as follows:~]$
certtool --generate-privkey --pkcs8 --password "" --outfile pkcs8.key

Where did the comment section go?
Red Hat's documentation publication system recently went through an upgrade to enable speedier, more mobile-friendly content. We decided to re-evaluate our commenting platform to ensure that it meets your expectations and serves as an optimal feedback mechanism. During this redesign, we invite your input on providing feedback on Red Hat documentation via the discussion platform.