The main problem is after I join the domain, I cannot id
a domain user. Be aware I am not rebooting the host, do I need to? I would think I wouldn't need to.
After doing some basic troubleshooting I realized that after I join the domain, I would think that a krb5.conf file would be created in /etc/krb5.conf
but it never does.
I am joining an Ubuntu20.04 host to a Windows 2019 AD server.
I have confirmed the following with a script I created before joining:
[PASS] Checking hostname FQDN has domain 'our.domain' configured
[PASS] Checking hosts file for correct entry of 127.0.1.1
[PASS] Checking DNS resolution.
[PASS] Checking DNS search domain.
[PASS] Checking Time Zone is set properly
[PASS] Checking NTP servers are set properly
[PASS] Checking NTP root distance
[PASS] Checking NTP is syncing properly
dcdiag
on the DCs comes out clean.
/var/log/auth.log
looks clean.
/var/log/sssd/sssd.log
has very little to offer.
/var/log/sssd/sssd_our.domain.log
has very little to offer.
/var/log/sssd/krb5_child
is empty.
I also cannot figure out how to get debug logs to work for sssd or Kerberos.
Here is the sssd.conf file
[sssd]
domains = our.domain
config_file_version = 2
services = nss, pam
[domain/our.domain]
default_shell = /bin/bash
krb5_store_password_if_offline = True
cache_credentials = True
krb5_realm = OUR.DOMAIN
realmd_tags = manages-system joined-with-adcli
id_provider = ad
fallback_homedir = /home/%u@%d
ad_domain = our.domain
use_fully_qualified_names = True
ldap_id_mapping = True
access_provider = simple
simple_allow_groups = Domain Users, Domain Admins, Administrators
Here is /usr/share/pam-configs/mkhomedir
Name: activate-mkhomedir
Default: yes
Priority: 900
Session-Type: Additional
Session:
required pam_mkhomedir.so umask=0022 skel=/etc/skel
I am also performing the following, confirmed user is in the 'Domain Users' group
$ sudo realm permit -g 'Domain Users'
$ sudo realm permit -g 'Domain Admins'
$ sudo realm permit -g 'Administrators'
Can anyone help me change the debug logs without using environmental variables, is there a setting I can set? Or just some direction to go with this...
EDIT: I finally figured out what the problem was with our set up. The problem was we had a multi-homed Active Directory server configured with multiple interfaces serving DNS. This is a big no-no. When SSSD LDAP services tried to get an IP for a DC it was given multiple addresses, and not all the addresses were routable from the clients perspective because they were on different subnets. After removing the other interfaces on the DC and only serving DNS on one interface, we no longer had the issue of sporadic realm joins. So it was never a Kerberos problem, but the types of trouble shooting suggest below was very helpful.