Bug 1003981 - joining AD domains from GUI control center doesn't work correctly
joining AD domains from GUI control center doesn't work correctly
Status: CLOSED DUPLICATE of bug 980861
Product: Red Hat Enterprise Linux 7
Classification: Red Hat
Component: realmd (Show other bugs)
Unspecified Unspecified
high Severity high
: rc
: ---
Assigned To: Stef Walter
BaseOS QE Security Team
Depends On:
  Show dependency treegraph
Reported: 2013-09-03 11:52 EDT by David Spurek
Modified: 2015-03-02 00:28 EST (History)
3 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Last Closed: 2013-09-03 12:33:11 EDT
Type: Bug
Regression: ---
Mount Type: ---
Documentation: ---
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---

Attachments (Terms of Use)
error screenshot (22.57 KB, image/png)
2013-09-03 11:53 EDT, David Spurek
no flags Details

  None (edit)
Description David Spurek 2013-09-03 11:52:56 EDT
Description of problem:
joining AD domains from GUI control center doesn't work correctly.
I am trying scenario described at https://fedoraproject.org/wiki/QA:Testcase_realmd_control_center

Gnome-control-center throw error message with 'Failed to register account' (image with fail is in attachement), user is correct.

If I try realm list after that, computer is joined to the domain.
[root@test-20-8 ~]# realm list
  type: kerberos
  realm-name: SECURITY.BASEOS.QE
  domain-name: security.baseos.qe
  configured: kerberos-member
  server-software: active-directory
  client-software: sssd
  required-package: oddjob
  required-package: oddjob-mkhomedir
  required-package: sssd
  required-package: adcli
  required-package: samba-common
  login-formats: %U@security.baseos.qe
  login-policy: allow-permitted-logins
  permitted-logins: amy-admin@security.baseos.qe

[root@test-20-8 ~]# getent passwd amy-admin@security.baseos.qe

Gnome-control-center was run from terminal and here is the output from terminal:
 * No default domain received via DHCP
 * Resolving: _ldap._tcp.security.baseos.qe
 * Performing LDAP DSE lookup on:
 * Successfully discovered: security.baseos.qe
 * Required files: /usr/sbin/oddjobd, /usr/libexec/oddjob/mkhomedir, /usr/sbin/sssd, /usr/bin/net
 * LANG=C LOGNAME=root /usr/bin/net -s /var/cache/realmd/realmd-smb-conf.4SV22W -U Amy-admin ads join security.baseos.qe
Enter Amy-admin's password:
Using short domain name -- SECURITY
Joined 'TEST-20-8' to dns domain 'security.baseos.qe'
 * LANG=C LOGNAME=root /usr/bin/net -s /var/cache/realmd/realmd-smb-conf.4SV22W -U Amy-admin ads keytab create
Enter Amy-admin's password:
 * /usr/bin/systemctl enable sssd.service
ln -s '/usr/lib/systemd/system/sssd.service' '/etc/systemd/system/multi-user.target.wants/sssd.service'
 * /usr/bin/systemctl restart sssd.service
 * /usr/bin/sh -c /usr/sbin/authconfig --update --enablesssd --enablesssdauth --enablemkhomedir --nostart && /usr/bin/systemctl enable oddjobd.service
 * Successfully enrolled machine in realm
 * /usr/bin/systemctl restart sssd.service
 * Successfully changed permitted logins for realm
user-accounts-cc-panel-Message: Couldn't cache user account: No user with the name Amy-admin@security.baseos.qe found

Version-Release number of selected component (if applicable):

How reproducible:

Steps to Reproduce:
1.provide steps described in link above

Actual results:

Expected results:

Additional info:
Comment 1 David Spurek 2013-09-03 11:53:26 EDT
Created attachment 793248 [details]
error screenshot
Comment 3 Stef Walter 2013-09-03 12:33:11 EDT
This is a duplicate of bug #980861 or one of that family of bugs.

'sss' wasn't in your /etc/nsswitch.conf when accounts-daemon started before you ran the test.

*** This bug has been marked as a duplicate of bug 980861 ***

Note You need to log in before you can comment on or make changes to this bug.