From Fedora Project Wiki

Revision as of 14:04, 16 October 2012 by Stefw (talk | contribs) (Add privileges required to test cases)

Fedora Test Days
Echo-testing-48px.png
Active Directory

Date 2012-10-18
Time all day

Website QA/Fedora_18_test_days
IRC #fedora-test-day (webirc)
Mailing list sssd-devel


Note.png
Can't make the date?
If you come to this page before or after the test day is completed, your testing is still valuable, and you can use the information on this page to test, file any bugs you find at Bugzilla, and add your results to the results section. If this page is more than a month old when you arrive here, please check the current schedule and see if a similar but more recent Test Day is planned or has already happened.

What to test?

Today's installment of Fedora Test Day will focus on Active Directory, in particular using realmd to setup authentication using domain accounts, sssd to handle the active directory authentication, and other involved bits and pieces.

Who's available

The following cast of characters will be available testing, workarounds, bug fixes, and general discussion ...

Prerequisite for Test Day

You need the following before joining in on the test day.

How to test?

At a high level the following are being tested:

  • realmd used together with Active Directory
  • sssd used together with Active Directory
  • gnome-control-center used with Enterprise Logins
  • gnome-online-accounts used with a Kerberos account

You can explore these, and their documentation. Or you can follow the test cases below.

Test Cases

Testcase Description Privileges Approx. time required
AD no krb5.conf Using Active Directory without krb5.conf Any 5 minutes
Discover AD Using realmd to discover information about an Active Directory domain Any 5 minutes
Join AD with sssd Using realmd to join an Active Directory domain with sssd as the client. Domain user 15 minutes
Leave AD Using realmd to leave an Active Directory domain. Domain user 15 minutes
Leave AD with remove Using realmd to leave an Active Directory domain, removing the computer account. Domain user 15 minutes
Join AD with winbind Using realmd to join an Active Directory domain with winbind as the client. Domain user 15 minutes
Permit one login Using realmd permit one domain login Domain user 10 minutes
Deny one login Using realmd deny one domain login Domain user 10 minutes
Permit any login Using realmd permit any domain login Domain user 10 minutes
Deny any login Using realmd deny any domain login Domain user 10 minutes
Join AD automatic Using realmd to join an active directory domain automatically Domain admin 20 minutes
Join AD with OTP Using realmd to join an Active Directory domain with a one time password. Domain admin 20 minutes

Test Results

Log issues and enhancements in one of these places: