From Fedora Project Wiki
(Add about permitting one login) |
m (Stefw moved page QA:Testcase Active Directory realmd permit one login to QA:Testcase Active Directory realmd login: Simpler name) |
(No difference)
|
Revision as of 15:04, 16 October 2012
Description
Permit a domain account to log in locally, and then test that login.
Setup
- If you are linked to your Active Directory domain via VPN, then this Test case will not work.
- Verify that your Active Directory domain access works. If you don't have an Active Directory domain, you can set one up.
- Run through the test case to join the domain.
- Verify that you are joined to the domain with the following command
$ realm list
- Make sure you have a
configured: kerberos-membership
line in the output. - Note the
login-formats:
line.
- Check that you cannot resolve domain accounts on the local computer.
- Use the
login-formats
you saw above, to build a remote user name. It will be in the form ofDOMAIN\User
, where DOMAIN is the first part of your full Active Directory domain name. $ getent passwd 'AD\User'
- Use the
How to test
- Perform the permit command.
$ realm permit --realm=ad.example.com 'AD\User'
- You will be prompted for Policy Kit authorization.
- You will not be prompted for a password.
- This should proceed quickly, not take more that 10 seconds.
- On a successful permit there will be no output.
- The user should show up here:
$ realm list
- Look at the
permitted-logins:
line.
- Go to GDM by logging out, or by Switch User from the user menu.
- Choose the Not Listed? option.
- Verify that you can see the short name listed with a hint as to how to log in.
- Type
DOMAIN\User
in the box.- The case of the domain and user should not matter, but they are separated by a backslash.
- The domain part is the part of your Active Directory domain prior to the first dot.
- Type the user domain password, and press enter.
Expected Results
- You should be logged into the Fedora desktop.
- Open a terminal, and type:
$ id
- Look at the output to verify that you are logged in as a domain user.
Troubleshooting
If the above explodes, try to log in from a VT console, and see if there is any interesting output there.
If you are connected to your domain controller via VPN, the above test case will not work.