Chapter 10. Authentication and Interoperability
Updating a machine account password with adcli
in some cases fails with SELinux error
When attempting to update the machine account password using the
adcli
tool in Red Hat Enterprise Linux 6.10, the system security services daemon (SSSD) sometimes tries to update an internal Samba database that contains also the machine account password. As a consequence, the SELinux access vector cache (AVC) states that SSSD and its subprocesses are not allowed to run Samba's net
command to update the internal Samba database.
To work around this problem, you can add a local SELinux policy by creating a
sssd_samba.te
file with the following content:
module sssd_samba 1.0; require { type sssd_t; type samba_net_exec_t; class file execute; } #============= sssd_t ============== allow sssd_t samba_net_exec_t:file execute;
And then enter the following commands:
# yum install selinux-policy-devel # make -f /usr/share/selinux/devel/Makefile sssd_samba.pp # semodule -i sssd_samba.pp
As a result, SSSD with
adcli
can update Samba's internal database without an SELinux AVC error. (BZ#1558428)
AD users cannot use sudo
on IdM hosts if default_domain_suffix
is set
In a trust between Identity Management (IdM) and Active Directory (AD), AD users cannot run
sudo
commands on IdM hosts if the default_domain_suffix
parameter in the /etc/sssd/sssd.conf
file is set to the AD domain. To work around the problem, remove the default_domain_suffix
parameter from the /etc/sssd/sssd.conf
file. As a result, sudo
policies work as expected both for AD and IdM users.
Note that after you remove the
default_domain_suffix
parameter, AD users must use user_name@domain_name instead of the short version of their user name to log in. (BZ#1550192)