Hi,I suppose realmd configured sssd.
You may need to authorize your users to login. (By using AD gpo or managing it locally).The parameter is access_provider.But you can also use realm command to allow locally some AD group.Also sssd has some logs. You can edit sssd.conf to modify the log level.Red hat has a good documentation on this subject and it was really helpfull for me as I had to integrate centos and Debian (from 8 to 10). (I configured access locally not by GPO)I may give you more precise information when I will be at work.
Regards
On Sun, Feb 21, 2021 at 6:10 PM Tibz Loufok <thi...@gmail.com> wrote:Hi,I suppose realmd configured sssd.Yes.You may need to authorize your users to login. (By using AD gpo or managing it locally).The parameter is access_provider.But you can also use realm command to allow locally some AD group.Also sssd has some logs. You can edit sssd.conf to modify the log level.Red hat has a good documentation on this subject and it was really helpfull for me as I had to integrate centos and Debian (from 8 to 10). (I configured access locally not by GPO)I may give you more precise information when I will be at work.I appreciate the response, and look forward to more precise info, should you be able to provide it.I've dug through quite a bit of Redhat documentation, but most of it is still beyond me, especially since the specifics don't match Debian setups
Also, about every other hit is behind a paywall, though. For example, just now I searched for "access_provider", and the first hit I tried was a Redhat link, and ran into a paywall. Arg.Again, thanks for the response!
Brand new Debian box (tried Buster, then when that didn;' work, upgraded tp unstable - meh, it's a test box to get things sorted out before production use).Minimal setup (unchecked everything in TaskSel step during install; later used TaskSel to add X11/Mate).su'd to rootapt install'd aptitude, realmd, packagekit(packagekit grabbed the needed dependencies, such as sssd and samba (at least parts of them, and maybe part of KRB5 (the keytab thing-y), and [mostly] configured them)Ran "realm join MY.DOMAIN -U my_add-to-domain_user"getent passwd domain_user successfully returns data on the domain user:acutech@21260-debianvm:~$ getent passwd gl...@my.domain
gl...@my.domain:*:495633057:495600513:glerp:/home/gl...@my.domain:/bin/bash
....
But the domain user can't log in via ssh (a local user can ssh in).techman@21260-debianvm:~$ ssh -l gl...@my.domain 21260-debianvm
gl...@my.domain@21260-debianvm's password:
Connection closed by 127.0.1.1 port 22Here are a few relevant lines from /var/log/auth.log:Feb 21 17:04:54 21260-debianvm sshd[5284]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=127.0.0.1 user=gl...@my.domain
Feb 21 17:04:54 21260-debianvm sshd[5284]: pam_sss(sshd:auth): authentication success; logname= uid=0 euid=0 tty=ssh ruser= rhost=127.0.0.1 user=gl...@my.domain
Feb 21 17:04:54 21260-debianvm sshd[5284]: pam_sss(sshd:account): Access denied for user gl...@my.domain: 6 (Permission denied)
Feb 21 17:04:54 21260-debianvm sshd[5284]: Failed password for gl...@my.domain from 127.0.0.1 port 59998 ssh2Feb 21 17:04:54 21260-debianvm sshd[5284]: fatal: Access denied for user gl...@my.domain by PAM account configuration [preauth]
On Mon, Feb 22, 2021 at 1:37 PM Kent West <we...@acu.edu> wrote:
On Mon, Feb 22, 2021 at 7:52 AM Nicholas Geovanis <nickge...@gmail.com> wrote:
On Sun, Feb 21, 2021, 5:09 PM Kent West <we...@acu.edu> wrote:
Brand new Debian box (tried Buster, then when that didn;' work, upgraded tp unstable - meh, it's a test box to get things sorted out before production use).
....
su'd to rootapt install'd aptitude, realmd, packagekit(packagekit grabbed the needed dependencies, such as sssd and samba (at least parts of them, and maybe part of KRB5 (the keytab thing-y), and [mostly] configured them)Ran "realm join MY.DOMAIN -U my_add-to-domain_user"getent passwd domain_user successfully returns data on the domain user:acutech@21260-debianvm:~$ getent passwd gl...@my.domain
gl...@my.domain:*:495633057:495600513:glerp:/home/gl...@my.domain:/bin/bash
........
Here are a few relevant lines from /var/log/auth.log:Feb 21 17:04:54 21260-debianvm sshd[5284]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=127.0.0.1 user=gl...@my.domain
Feb 21 17:04:54 21260-debianvm sshd[5284]: pam_sss(sshd:auth): authentication success; logname= uid=0 euid=0 tty=ssh ruser= rhost=127.0.0.1 user=gl...@my.domain
Feb 21 17:04:54 21260-debianvm sshd[5284]: pam_sss(sshd:account): Access denied for user gl...@my.domain: 6 (Permission denied)
Feb 21 17:04:54 21260-debianvm sshd[5284]: Failed password for gl...@my.domain from 127.0.0.1 port 59998 ssh2Feb 21 17:04:54 21260-debianvm sshd[5284]: fatal: Access denied for user gl...@my.domain by PAM account configuration [preauth]
So I think what this is telling you is that authentication succeeded for the "auth" clause in the "sshd" section of the PAM config file (pam_sss). But then authentication failed in the "account" clause of the sshd section.So the question is why there?
I built another virtual machine on another Debian box, following the same steps. That one worked.I compared all the files I could think of (/etc/pam.d/ files, /etc/nsswitch.conf, /etc/ssd/ssd_config, etc), and made them identical. Didn't help.I then rebuilt the offending machine, removed it from the domain, followed the same steps again, and now ... it works.Go figure.