Bug 1891056
| Summary: | ipa-kdb: support subordinate/superior UPN suffixes | |||
|---|---|---|---|---|
| Product: | Red Hat Enterprise Linux 8 | Reporter: | Thorsten Scherf <tscherf> | |
| Component: | ipa | Assignee: | Thomas Woerner <twoerner> | |
| Status: | CLOSED ERRATA | QA Contact: | ipa-qe <ipa-qe> | |
| Severity: | high | Docs Contact: | Josip Vilicic <jvilicic> | |
| Priority: | unspecified | |||
| Version: | 8.2 | CC: | abokovoy, frenaud, jvilicic, ksiddiqu, ndehadra, pasik, rcritten, sumenon, tmihinto, tscherf, twoerner | |
| Target Milestone: | rc | Keywords: | ZStream | |
| Target Release: | 8.0 | Flags: | pm-rhel:
mirror+
|
|
| Hardware: | Unspecified | |||
| OS: | Unspecified | |||
| Whiteboard: | ||||
| Fixed In Version: | ipa-4.9.0-0.2.rc2 | Doc Type: | Enhancement | |
| Doc Text: |
.AD users can now log in to IdM with UPN suffixes subordinate to known UPN suffixes
Previously, Active Directory (AD) users could not log into Identity Management (IdM) with a Universal Principal Name (UPN) (for example, `sub1.ad-example.com`) that is a subdomain of a known UPN suffix (for example, `ad-example.com`) because internal Samba processes filtered subdomains as duplicates of any Top Level Names (TLNs). This update validates UPNs by testing if they are subordinate to the known UPN suffixes. As a result, users can now log in using subordinate UPN suffixes in the described scenario.
|
Story Points: | --- | |
| Clone Of: | ||||
| : | 1914823 1914824 (view as bug list) | Environment: | ||
| Last Closed: | 2021-05-18 15:48:21 UTC | Type: | Bug | |
| Regression: | --- | Mount Type: | --- | |
| Documentation: | --- | CRM: | ||
| Verified Versions: | Category: | --- | ||
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | ||
| Cloudforms Team: | --- | Target Upstream Version: | ||
| Embargoed: | ||||
| Bug Depends On: | ||||
| Bug Blocks: | 1914823, 1914824 | |||
|
Description
Thorsten Scherf
2020-10-23 17:16:41 UTC
Upstream ticket: https://pagure.io/freeipa/issue/8554 Fixed upstream master: https://pagure.io/freeipa/c/8b6d1ab854387840f7526d6d59ddc7102231957f Fixed upstream ipa-4-8: https://pagure.io/freeipa/c/1f0702bf9231a4898a2d58325fc51c71fea25047 Additional commits:
commit 442038c41aef9ce07d0491a08bec406ede5f6686
Author: Sudhir Menon <sumenon>
Date: Wed Nov 11 14:55:32 2020 +0530
ipatests: support subordinate upn suffixes
This test adds new UPN Suffix on the AD side
within the ad.test subtree i.e new.ad.test and this
UPN is then assigned to aduser and then try to
kinit using aduser along with the UPN set, to ensure
that the kinit succeeds
Signed-off-by: Sudhir Menon <sumenon>
Reviewed-By: Alexander Bokovoy <abokovoy>
commit 0da6a57b406f538edf187c44760885c237261183
Author: Alexander Bokovoy <abokovoy>
Date: Tue Nov 24 16:03:36 2020 +0200
ad trust: accept subordinate domains of the forest trust root
Commit 8b6d1ab854387840f7526d6d59ddc7102231957f added support for
subordinate UPN suffixes but missed the case where subordinate UPN is a
subdomain of the forest root domain and not mentioned in the UPN
suffixes list.
Correct this situation by applying the same check to the trusted domain
name as well.
Fixes: https://pagure.io/freeipa/issue/8554
Signed-off-by: Alexander Bokovoy <abokovoy>
Reviewed-By: Alexander Bokovoy <abokovoy>
Fixed upstream
master:
https://pagure.io/freeipa/c/442038c41aef9ce07d0491a08bec406ede5f6686
https://pagure.io/freeipa/c/0da6a57b406f538edf187c44760885c237261183
Fixed upstream ipa-4-8: https://pagure.io/freeipa/c/d5cca835d5439331c05475d0ad2f993ac6f8b615 https://pagure.io/freeipa/c/6b224e57672e3f73f93bb9eddd9031e945529a1e Fixed upstream ipa-4-9: https://pagure.io/freeipa/c/7e605e958ef6d41584afc238433669c15458ac67 https://pagure.io/freeipa/c/381cc5e8eae1b7437fc15cb699983887d398f498 Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory (Moderate: idm:DL1 and idm:client security, bug fix, and enhancement update), and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHSA-2021:1846 |