-
Notifications
You must be signed in to change notification settings - Fork 251
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
sssd is skipping GPO evaluation with auto_private_groups #7451
Labels
Comments
sumit-bose
added a commit
to sumit-bose/sssd
that referenced
this issue
Jun 20, 2024
SSSD does not handle the root user (UID==0) and treats all accounts with UID 0 as non-Posix accounts. The primary GID of those accounts is 0 as well and as a result for those accounts in MPG domains the check for a collisions of the primary GID should be skipped. The current code might e.g. cause issues during GPO evaluation when adding a host account into the cache which does not have any UID or GID set in AD and SSSD is configured to read UID and GID from AD. Resolves: SSSD#7451
alexey-tikhonov
pushed a commit
that referenced
this issue
Jun 21, 2024
SSSD does not handle the root user (UID==0) and treats all accounts with UID 0 as non-Posix accounts. The primary GID of those accounts is 0 as well and as a result for those accounts in MPG domains the check for a collisions of the primary GID should be skipped. The current code might e.g. cause issues during GPO evaluation when adding a host account into the cache which does not have any UID or GID set in AD and SSSD is configured to read UID and GID from AD. Resolves: #7451 Reviewed-by: Alejandro López <[email protected]> Reviewed-by: Tomáš Halman <[email protected]> (cherry picked from commit 986bb72)
alexey-tikhonov
pushed a commit
to alexey-tikhonov/sssd
that referenced
this issue
Nov 19, 2024
SSSD does not handle the root user (UID==0) and treats all accounts with UID 0 as non-Posix accounts. The primary GID of those accounts is 0 as well and as a result for those accounts in MPG domains the check for a collisions of the primary GID should be skipped. The current code might e.g. cause issues during GPO evaluation when adding a host account into the cache which does not have any UID or GID set in AD and SSSD is configured to read UID and GID from AD. Resolves: SSSD#7451 Reviewed-by: Alejandro López <[email protected]> Reviewed-by: Tomáš Halman <[email protected]> (cherry picked from commit 986bb72) (cherry picked from commit d234cf5)
alexey-tikhonov
pushed a commit
that referenced
this issue
Nov 21, 2024
SSSD does not handle the root user (UID==0) and treats all accounts with UID 0 as non-Posix accounts. The primary GID of those accounts is 0 as well and as a result for those accounts in MPG domains the check for a collisions of the primary GID should be skipped. The current code might e.g. cause issues during GPO evaluation when adding a host account into the cache which does not have any UID or GID set in AD and SSSD is configured to read UID and GID from AD. Resolves: #7451 Reviewed-by: Alejandro López <[email protected]> Reviewed-by: Tomáš Halman <[email protected]> (cherry picked from commit 986bb72) (cherry picked from commit d234cf5) Reviewed-by: Justin Stephenson <[email protected]>
Pushed PR: #7706
|
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
This issue is cloned from https://issues.redhat.com/browse/RHEL-41047
Additionally it should be mentioned that UIDs and GIDs should be read from AD, i.e.
ldap_id_mapping = False
The text was updated successfully, but these errors were encountered: