Chapter 48. Enabling authentication using AD User Principal Names in IdM
Enable Active Directory (AD) users to authenticate to Identity Management (IdM) using their User Principal Names (UPNs). This simplifies authentication in trusted AD forest environments by supporting UPN-based login.
48.1. User principal names in an AD forest trusted by IdM Copy linkLink copied to clipboard!
Active Directory (AD) users in an Identity Management (IdM) trust can use alternative User Principal Names (UPNs) to authenticate — for example, their email address instead of the default Kerberos realm login — by configuring additional UPN suffixes in the AD forest root.
For example, if a company uses the Kerberos realm AD.EXAMPLE.COM, the default UPN for a user is user@ad.example.com. To allow your users to log in using their email addresses, for example user@example.com, you can configure EXAMPLE.COM as an alternative UPN in AD. Alternative UPNs (also known as enterprise UPNs) are especially convenient if your company has recently experienced a merge and you want to provide your users with a unified logon namespace.
UPN suffixes are only visible for IdM when defined in the AD forest root. As an AD administrator, you can define UPNs with the Active Directory Domain and Trust utility or the PowerShell command line tool.
To configure UPN suffixes for users, Red Hat recommends to use tools that perform error validation, such as the Active Directory Domain and Trust utility.
Red Hat recommends against configuring UPNs through low-level modifications, such as using ldapmodify commands to set the userPrincipalName attribute for users, because Active Directory does not validate those operations.
After you define a new UPN on the AD side, run the ipa trust-fetch-domains command on an IdM server to retrieve the updated UPNs. See Ensuring that AD UPNs are up-to-date in IdM.
IdM stores the UPN suffixes for a domain in the multi-value attribute ipaNTAdditionalSuffixes of the subtree cn=trusted_domain_name,cn=ad,cn=trusts,dc=idm,dc=example,dc=com.
48.2. Ensuring that AD UPNs are up-to-date in IdM Copy linkLink copied to clipboard!
Refresh trusted Active Directory forest information in Identity Management (IdM) after modifying User Principal Name (UPN) suffixes to ensure IdM recognizes updated authentication credentials. This keeps your trust configuration synchronized with Active Directory changes.
Prerequisites
- IdM administrator credentials.
Procedure
Enter the
ipa trust-fetch-domainscommand. Note that a seemingly empty output is expected:[root@ipaserver ~]# ipa trust-fetch-domains Realm-Name: ad.example.com ------------------------------- No new trust domains were found ------------------------------- ---------------------------- Number of entries returned 0 ----------------------------
Verification
Enter the
ipa trust-showcommand to verify that the server has fetched the new UPN. Specify the name of the AD realm when prompted:[root@ipaserver ~]# ipa trust-show Realm-Name: ad.example.com Realm-Name: ad.example.com Domain NetBIOS name: AD Domain Security Identifier: S-1-5-21-796215754-1239681026-23416912 Trust direction: One-way trust Trust type: Active Directory domain UPN suffixes: example.comThe output shows that the
example.comUPN suffix is now part of thead.example.comrealm entry.
48.3. Gathering troubleshooting data for AD UPN authentication issues Copy linkLink copied to clipboard!
Collect detailed User Principal Name (UPN) configuration logs from Active Directory (AD) and Identity Management (IdM) environments to diagnose authentication failures with alternate UPNs. This data helps identify misconfigurations in trust relationships.
Prerequisites
- You must be logged in to an IdM Trust Controller or Trust Agent to retrieve information from an AD domain controller.
-
You need
rootpermissions to modify the following configuration files, and to restart IdM services.
Procedure
-
Open the
/usr/share/ipa/smb.conf.emptyconfiguration file in a text editor. Add the following contents to the file.
[global] log level = 10-
Save and close the
/usr/share/ipa/smb.conf.emptyfile. -
Open the
/etc/ipa/server.confconfiguration file in a text editor. If you do not have that file, create one. Add the following contents to the file.
[global] debug = True-
Save and close the
/etc/ipa/server.conffile. Restart the Apache webserver service to apply the configuration changes:
[root@server ~]# systemctl restart httpdRetrieve trust information from your AD domain:
[root@server ~]# ipa trust-fetch-domains <ad.example.com>Review the debugging output and troubleshooting information in the following log files:
-
/var/log/httpd/error_log -
/var/log/samba/log.*
-