Bug 2148737
| Summary: | UPN check cannot be disabled explicitly but requires krb5_validate = false' as a work-around | |||
|---|---|---|---|---|
| Product: | Red Hat Enterprise Linux 9 | Reporter: | Alexey Tikhonov <atikhono> | |
| Component: | sssd | Assignee: | Sumit Bose <sbose> | |
| Status: | CLOSED ERRATA | QA Contact: | Jakub Vavra <jvavra> | |
| Severity: | high | Docs Contact: | ||
| Priority: | unspecified | |||
| Version: | 9.1 | CC: | jvavra, pasik, pbrezina, sgadekar, tscherf | |
| Target Milestone: | rc | Keywords: | Triaged, ZStream | |
| Target Release: | --- | Flags: | pm-rhel:
mirror+
|
|
| Hardware: | Unspecified | |||
| OS: | Unspecified | |||
| Whiteboard: | sync-to-jira | |||
| Fixed In Version: | sssd-2.8.2-1.el9 | Doc Type: | If docs needed, set a value | |
| Doc Text: | Story Points: | --- | ||
| Clone Of: | ||||
| : | 2148988 (view as bug list) | Environment: | ||
| Last Closed: | 2023-05-09 08:20:01 UTC | Type: | Bug | |
| Regression: | --- | Mount Type: | --- | |
| Documentation: | --- | CRM: | ||
| Verified Versions: | Category: | --- | ||
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | ||
| Cloudforms Team: | --- | Target Upstream Version: | ||
| Embargoed: | ||||
| Bug Depends On: | ||||
| Bug Blocks: | 2148988 | |||
|
Description
Alexey Tikhonov
2022-11-27 16:07:26 UTC
Upstream PR: https://github.com/SSSD/sssd/pull/6452 Pushed PR: https://github.com/SSSD/sssd/pull/6452 * `master` * 51b11db8b99a77ba5ccf6f850c2e81b5a6ee9f79 - pac: relax default check * b3d7a4f6d4e1d4fa1bd33b296cd4301973f1860c - ipa: do not add guessed principal to the cache * 91789449b7a8b20056e1edfedd8f8cf92f7a0a2a - PAC: allow to disable UPN check * `sssd-2-8` * 35a28524e407bf4b05a17c7c7f0b48799a18e8bf - pac: relax default check * a3304cc6b27b2f0678d0dcb4130865aa09442f5d - ipa: do not add guessed principal to the cache * b00c72d29b172a91b3eac5bc7b8ed275b883ec61 - PAC: allow to disable UPN check Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory (sssd bug fix and enhancement update), and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHBA-2023:2514 |