1. Create a posix user kau1.
2. Create posix group kau1_group1 and non-posix group kau1_group2.
3. Add kau1 as member of kau1_group1 and kau1_group2.
4. Enumerate and Auth as user kau1.
Enumeration shows the posix group.
# id -G -n kau1
kau1 kau1_group1
Auth happens successfully.
# ssh -l kau1 localhost
kau1@localhost's password:
Last login: Mon May 23 17:31:43 2011 from 127.0.0.1
[kau1@rh57-x86 ~]$
Verified that if the user is a member of a non-posix group, the non-posix group
should just be ignored.
Verified in version:
# rpm -qi sssd | head
Name : sssd Relocations: (not relocatable)
Version : 1.5.1 Vendor: Red Hat, Inc.
Release : 34.el5 Build Date: Tue 03 May 2011 10:46:09 PM IST
Install Date: Wed 11 May 2011 02:07:53 PM IST Build Host: x86-004.build.bos.redhat.com
Group : Applications/System Source RPM: sssd-1.5.1-34.el5.src.rpm
Size : 3508089 License: GPLv3+
Signature : (none)
Packager : Red Hat, Inc. <http://bugzilla.redhat.com/bugzilla>
URL : http://fedorahosted.org/sssd/
Summary : System Security Services Daemon
An advisory has been issued which should help the problem
described in this bug report. This report is therefore being
closed with a resolution of ERRATA. For more information
on therefore solution and/or where to find the updated files,
please follow the link below. You may reopen this bug report
if the solution does not work for you.
http://rhn.redhat.com/errata/RHSA-2011-0975.html