From Fedora Project Wiki

Revision as of 14:24, 18 October 2012 by Stefw (talk | contribs) (typo)

Description

Permit a domain account to log in locally, and then test that login.

Setup

  1. Due to this bug with discussion here, you need to have sss in your /etc/nsswitch.conf when you last booted you system. To do so run this:
    $ sudo authconfig --update --enablesssd; sudo shutdown -r now
  2. If you are linked to your Active Directory domain via VPN, then this Test case will not work.
  3. Verify that your Active Directory domain access works. If you don't have an Active Directory domain, you can set one up.
  4. Run through the test case to join the domain.
  5. Verify that you are joined to the domain with the following command
    $ realm list
    Make sure you have a configured: kerberos-membership line in the output.
    Note the login-formats: line.
  6. Check that you can resolve domain accounts on the local computer.
    Use the login-formats you saw above, to build a remote user name. It will be in the form of DOMAIN\User, where DOMAIN is the first part of your full Active Directory domain name.
    $ getent passwd 'AD\User'

How to test

  1. Perform the permit command.
    $ realm permit --realm=ad.example.com 'AD\User'
    You will be prompted for Policy Kit authorization.
    You will not be prompted for a password.
    This should proceed quickly, not take more that 10 seconds.
    On a successful permit there will be no output.
  2. The user should show up here:
    $ realm list
    Look at the permitted-logins: line.
    You should also see login-policy: allow-permitted-logins.
  3. Go to GDM by logging out, or by Switch User from the user menu.
    On a Live CD if you get automatically logged in again, go to User Accounts and turn off Auto Login for the live cd user.
  4. Choose the Not Listed? option.
    Verify that you can see the short name listed with a hint as to how to log in.
  5. Type DOMAIN\User in the box.
    The case of the domain and user should not matter, but they are separated by a backslash.
    The domain part is the part of your Active Directory domain prior to the first dot.
  6. Type the user domain password, and press enter.

Expected Results

  1. You should be logged into the Fedora desktop.
  2. Open a terminal, and type:
    $ id
    Look at the output to verify that you are logged in as a domain user.



Troubleshooting

If the above explodes, try to log in from a VT console, and see if there is any interesting output there.

If you can log into a VT, but cannot log into GNOME, then you may have run into this bug. See the top of the Setup part of this test case for a solution.

If you are connected to your domain controller via VPN, the above test case will not work.

Known Issue [Group Names]: Group names for the logged in user are not resolved correctly

Known Issue [Selinux]: You need to turn off selinux to complete the permit action. Please do:

$ sudo setenforce 0

Please file the all realmd AVC's at this bug: https://bugzilla.redhat.com/show_bug.cgi?id=867873

$ sudo grep realmd /var/log/audit/audit.log