SSSD is not recognizing the "ldap_user_object_class" configuration, and attempting to search based on "posixAccount"
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
sssd |
Fix Released
|
Unknown
|
|||
sssd (Ubuntu) |
Incomplete
|
Undecided
|
Unassigned |
Bug Description
I have an openLDAP and Kerberos-v5 server on Ubuntu Server 22.04, and an SSSD client running Ubuntu 22.10. The LDAP has a custom schema called "domainAccount". I've configured sssd.conf on the client with the "ldap_user_
Dec 23 11:31:33 ldapserver slapd[6070]: conn=2604 fd=44 ACCEPT from IP=clientIP:55434 (IP=0.0.0.0:389)
Dec 23 11:31:33 ldapserver slapd[6070]: conn=2604 op=0 BIND dn="cn=
Dec 23 11:31:33 ldapserver slapd[6070]: conn=2604 op=0 BIND dn="cn=
Dec 23 11:31:33 ldapserver slapd[6070]: conn=2604 op=0 RESULT tag=97 err=0 qtime=0.000049 etime=0.000158 text=
Dec 23 11:31:33 ldapserver slapd[6070]: conn=2604 op=1 SRCH base="dc=
Dec 23 11:31:33 ldapserver slapd[6070]: conn=2604 op=1 SRCH attr=uid userPassword uidNumber gidNumber cn homeDirectory loginShell gecos description objectClass
Dec 23 11:31:33 ldapserver slapd[6070]: conn=2604 op=1 SEARCH RESULT tag=101 err=0 qtime=0.000022 etime=0.000227 nentries=0 text=
Dec 23 11:31:33 ldapserver slapd[6070]: conn=2604 fd=44 closed (connection lost)
When I restart sssd with debug_level 9 on the client, in the log file for the domain block, I see this:
(2022-12-23 11:25:49): [be[subdomain.
So sssd is reading the config in sssd.conf, but does not appear to be respecting it when binding to the ldap server? I'll paste my sssd.conf, though the current state is a snapshot of what has been an extreme iterative process of slinging syntax at it from various guides.
[sssd]
config_file_version = 2
debug_level = 9
domains = subdomain.
[domain/
debug_level = 9
cache_credentials = True
id_provider = ldap
ldap_uri = ldap://
ldap_search_base = dc=subdomain,
ldap_user_
ldap_group_
ldap_default_
ldap_default_
ldap_id_
ldap_tls_reqcert = demand
ldap_tls_cacert = /etc/ssl/
ldap_tls_cacertdir = /etc/ssl/certs
auth_provider = krb5
krb5_server = ldapserver.
krb5_kpasswd = ldapserver.
krb5_realm = SUBDOMAIN.
#enumerate = true
#chpass_provider = ldap
#access_provider = ldap
#ldap_search_
#ldap_network_
#ldap_access_order = filter
#ldap_access_filter = memberOf=
Changed in sssd: | |
status: | Unknown → Fix Released |
Hello,
Thanks for taking the time to report this bug.
Would you mind also providing the full client/server log files (with any sensitive information removed) and also your kerberos/openldap setup (config files, etc)?
I am setting this bug to incomplete for now. Once you provide the requested information, please, set this bug back to new.