From Fedora Project Wiki
Description
Deny a domain account permission to log in locally.
Setup
- If you are linked to your Active Directory domain via VPN, then this Test case will not work.
- Verify that your Active Directory domain access works. If you don't have an Active Directory domain, you can set one up.
- Run through the test case to join the domain.
- Run through the test case to login using domain account.
- Verify that you can log into as a domain account from GDM.
- Then log out of that user.
How to test
- Perform the permit command.
$ realm deny --realm=ad.example.com 'AD\User'
- Make sure to use the
DOMAIN\User
of the user you logged in as above. - You will be prompted for Policy Kit authorization.
- You will not be prompted for a password.
- This should proceed quickly, not take more that 10 seconds.
- On a successful permit there will be no output.
- The user should no longer show up here:
$ realm list
- Look at the
permitted-logins:
line. - You should also see
login-policy: allow-permitted-logins
.
- Go to GDM by logging out, or by Switch User from the user menu.
- Choose the Not Listed? option.
- Verify that you can see the short name listed with a hint as to how to log in.
- Type
DOMAIN\User
in the box.- The case of the domain and user should not matter, but they are separated by a backslash.
- The domain part is the part of your Active Directory domain prior to the first dot.
- Type the user domain password, and press enter.
Expected Results
- You should briefly see Permission denied and you should be unable to log in.
Troubleshooting
Try from a VT console, and see if there is any interesting output there.
If you are connected to your domain controller via VPN, the above test case will not work.