From Fedora Project Wiki
(Add known issues) |
(Tweaks, and remove login stuff: different test) |
||
(6 intermediate revisions by the same user not shown) | |||
Line 2: | Line 2: | ||
|description=Join the current machine to an Active Directory domain using sssd as an AD client, without entering administrative credentials. | |description=Join the current machine to an Active Directory domain using sssd as an AD client, without entering administrative credentials. | ||
|setup= | |setup= | ||
# | # You need the following software: | ||
# | #* control-center 3.8.1.5 or later | ||
#* realmd 0.14.0 or later | |||
# Verify that your [[QA:Testcase_Active_Directory_Setup|Active Directory domain access works, or set a domain up]]. | |||
# [[ | |||
# You need a domain user account and administrator account, or both. If you have both, enter the use account as the user you're going to add below. | # You need a domain user account and administrator account, or both. If you have both, enter the use account as the user you're going to add below. | ||
# Your machine must have a configured host name. Do not proceed if you host name is <code>localhost</code> or similar. | # Your machine must have a configured host name. Do not proceed if you host name is <code>localhost</code> or similar. | ||
#: <pre>$ hostname</pre> | #: <pre>$ hostname</pre> | ||
# Remove the following packages, they should be installed by realmd as necessary. | # Remove the following packages, they should be installed by realmd as necessary. | ||
#: <pre>$ yum remove sssd samba-client adcli</pre> | #: <pre>$ yum remove sssd samba-client adcli</pre> | ||
Line 18: | Line 15: | ||
|actions= | |actions= | ||
# Run <code>gnome-control-center</code> from a terminal. | # Run <code>gnome-control-center</code> from a terminal. | ||
# Choose the '' | # Choose the ''Users'' panel. | ||
# Click the ''Unlock'' button. | # Click the ''Unlock'' button. | ||
#: You should get a Policy Kit authorization prompt. | #: You should get a Policy Kit authorization prompt. | ||
Line 57: | Line 54: | ||
#: Look at the <code>permitted-logins:</code> line. | #: Look at the <code>permitted-logins:</code> line. | ||
#: You should also see <code>login-policy: allow-permitted-logins</code>. | #: You should also see <code>login-policy: allow-permitted-logins</code>. | ||
}} | }} | ||
Line 71: | Line 60: | ||
You can see verbose output in the terminal that you started gnome-control-center from. | You can see verbose output in the terminal that you started gnome-control-center from. | ||
[[Category:Active_Directory_Test_Cases]] [[Category:realmd_Test_Cases]] | |||
[[Category: |
Latest revision as of 10:36, 9 May 2013
Description
Join the current machine to an Active Directory domain using sssd as an AD client, without entering administrative credentials.
Setup
- You need the following software:
- control-center 3.8.1.5 or later
- realmd 0.14.0 or later
- Verify that your Active Directory domain access works, or set a domain up.
- You need a domain user account and administrator account, or both. If you have both, enter the use account as the user you're going to add below.
- Your machine must have a configured host name. Do not proceed if you host name is
localhost
or similar.$ hostname
- Remove the following packages, they should be installed by realmd as necessary.
$ yum remove sssd samba-client adcli
- Make sure you are not joined to a domain. Use
realm list
to check, andrealm leave
to leave.
How to test
- Run
gnome-control-center
from a terminal. - Choose the Users panel.
- Click the Unlock button.
- You should get a Policy Kit authorization prompt.
- Click the add [+] button in the lower left.
- Choose the Enterprise login pane.
- Enter an invalid domain, invalid user, and invalid password for the account.
- Click on Add. You should see a problem icon on the domain.
- Enter the valid domain, invalid user, and invalid password for the account.
- Click on Add. You should see a problem icon on the user.
- Enter the valid domain, valid user, and invalid password for the account.
- Click on Add. You should see a problem icon on the password.
- Enter the right password.
- Click on Add
- If you user a non-administrative user, you may be prompted for administrative credentials. It is tricky to duplicate this at times. Active Directory is an odd one like that :)
Expected Results
- The user should now be listed in the User Accounts panel of the GNOME Control Center.
- Check that the domain is now configured.
$ realm list
- Make sure the domain is listed.
- Make sure you have a
configured: kerberos-membership
line in the output. - Make note of the
login-formats
line for the next command.
- Check that you can resolve domain accounts on the local computer.
$ getent passwd 'AD\User'
- Make sure to use the quotes around the user name.
- You should see an output line that looks like passwd(5) output. It should contain an appropriate home directory, and a shell.
- Use the
login-formats
you saw above, to build a remote user name. It will be in the form ofDOMAIN\User
, where DOMAIN is the first part of your full Active Directory domain name.
- Check that you have an appropriate entry in your hosts keytab.
sudo klist -k
- You should see several lines, with your host name. For example
2 HOSTNAME$@AD.EXAMPLE.COM
- Check that you can use your keytab with kerberos
sudo kinit -k 'HOSTNAME$@AD.EXAMPLE.COM'
- Make sure to use quotes around the argument, because of the characters in there. Make sure the hostname and domain are capitalized.
- Use the principal from the output of the
klist
command above. Use the one that's capitalized and looks likeHOSTNAME$@DOMAIN
. - There should be no output from this command.
- The user should show up here:
$ realm list
- Look at the
permitted-logins:
line. - You should also see
login-policy: allow-permitted-logins
.
Troubleshooting
You can see verbose output in the terminal that you started gnome-control-center from.