Bug 1831935

Summary: AD authentication with IdM against SQL Server
Product: Red Hat Enterprise Linux 8 Reporter: Dan Kinkead <dkinkead>
Component: ipaAssignee: Thomas Woerner <twoerner>
Status: CLOSED ERRATA QA Contact: ipa-qe <ipa-qe>
Severity: urgent Docs Contact:
Priority: urgent    
Version: 8.2CC: abokovoy, afarley, dpal, fdvorak, iboukris, jaynar, jenander, jjarvis, ksiddiqu, limershe, mheslin, mpolovka, pasik, pcech, rcritten, tscherf
Target Milestone: rcKeywords: Triaged
Target Release: 8.0   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard:
Fixed In Version: ipa-4.8.7-1 Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2020-11-04 02:50:41 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 1900100    

Description Dan Kinkead 2020-05-06 00:28:15 UTC
Description of problem:

When we configure AD auth using ktpass (or ktutil in past), and the RHEL VM is domain joined directly with Windows AD server, S4U2Self protocol functions correctly and we see no issues. But when RHEL VM is joined via IdM, the group refresh process done via S4U2Self protocol fails. That breaks the logged in user’s privilege and overall functionality suffers. 

Version-Release number of selected component (if applicable):


How reproducible:

When running some elevated SQL commands which involve activities such as creating logins or granting/revoking privileges

Steps to Reproduce:
1. Configure AD login to MSSQL with https://access.redhat.com/articles/4094741
2. Create two SQL logins
3. Try to run elevated commands with both users logged in

Actual results:

AD authentication works but then users(who is ever logged in with AD authentication) get kicked out from sessions and when running some elevated SQL commands which involve activities such as creating logins or granting/revoking privileges and in krb5.log we see events like:

-1765328243/Matching credential not found [25649] 1583325123.545595: Getting credentials EXAMPLE2$@NIX.EXAMPLE.COM -> krbtgt/EXAMPLE.COM.COM using ccache MEMORY:pal 25837 [25649] 1583325123.545596: Retrieving EXAMPLE$@NIX.EXAMPLE.COM -> krbtgt/EXAMPLE.COM.COM from MEMORY:pal 25837 with result: -1765328243/Matching credential not found [25649] 1583325123.545597: Retrieving EXAMPLE$@NIX.EXAMPLE.COM -> krbtgt/NIX.EXAMPLE.COM.COM from MEMORY:pal 25837 with result: -1765328243/Matching credential not found

In the client we see the following:

Error:15404 (Could Not obtain information about Windows NT group/User' ' Error Code 0x80090304 

Expected results:

Users to not get kicked out from sessions and commands to work

Additional info:

I will include more details in the next comment.

Comment 10 Alexander Bokovoy 2020-05-11 17:02:08 UTC
This is a bug in FreeIPA, not krb5.

Comment 30 errata-xmlrpc 2020-11-04 02:50:41 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory (Moderate: idm:DL1 and idm:client security, bug fix, and enhancement update), and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHSA-2020:4670