RHEL Engineering is moving the tracking of its product development work on RHEL 6 through RHEL 9 to Red Hat Jira (issues.redhat.com). If you're a Red Hat customer, please continue to file support cases via the Red Hat customer portal. If you're not, please head to the "RHEL project" in Red Hat Jira and file new tickets here. Individual Bugzilla bugs in the statuses "NEW", "ASSIGNED", and "POST" are being migrated throughout September 2023. Bugs of Red Hat partners with an assigned Engineering Partner Manager (EPM) are migrated in late September as per pre-agreed dates. Bugs against components "kernel", "kernel-rt", and "kpatch" are only migrated if still in "NEW" or "ASSIGNED". If you cannot log in to RH Jira, please consult article #7032570. That failing, please send an e-mail to the RH Jira admins at rh-issues@redhat.com to troubleshoot your issue as a user management inquiry. The email creates a ServiceNow ticket with Red Hat. Individual Bugzilla bugs that are migrated will be moved to status "CLOSED", resolution "MIGRATED", and set with "MigratedToJIRA" in "Keywords". The link to the successor Jira issue will be found under "Links", have a little "two-footprint" icon next to it, and direct you to the "RHEL project" in Red Hat Jira (issue links are of type "https://issues.redhat.com/browse/RHEL-XXXX", where "X" is a digit). This same link will be available in a blue banner at the top of the page informing you that that bug has been migrated.
Bug 1003981 - joining AD domains from GUI control center doesn't work correctly
Summary: joining AD domains from GUI control center doesn't work correctly
Keywords:
Status: CLOSED DUPLICATE of bug 980861
Alias: None
Product: Red Hat Enterprise Linux 7
Classification: Red Hat
Component: realmd
Version: 7.0
Hardware: Unspecified
OS: Unspecified
high
high
Target Milestone: rc
: ---
Assignee: Stef Walter
QA Contact: BaseOS QE Security Team
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2013-09-03 15:52 UTC by David Spurek
Modified: 2015-03-02 05:28 UTC (History)
3 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2013-09-03 16:33:11 UTC
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)
error screenshot (22.57 KB, image/png)
2013-09-03 15:53 UTC, David Spurek
no flags Details

Description David Spurek 2013-09-03 15:52:56 UTC
Description of problem:
joining AD domains from GUI control center doesn't work correctly.
I am trying scenario described at https://fedoraproject.org/wiki/QA:Testcase_realmd_control_center

Gnome-control-center throw error message with 'Failed to register account' (image with fail is in attachement), user is correct.

If I try realm list after that, computer is joined to the domain.
[root@test-20-8 ~]# realm list
security.baseos.qe
  type: kerberos
  realm-name: SECURITY.BASEOS.QE
  domain-name: security.baseos.qe
  configured: kerberos-member
  server-software: active-directory
  client-software: sssd
  required-package: oddjob
  required-package: oddjob-mkhomedir
  required-package: sssd
  required-package: adcli
  required-package: samba-common
  login-formats: %U.qe
  login-policy: allow-permitted-logins
  permitted-logins: amy-admin.qe
  permitted-groups:

[root@test-20-8 ~]# getent passwd amy-admin.qe
amy-admin.qe:*:89801176:89800513:Amy-admin:/home/security.baseos.qe/amy-admin:/bin/bash

Gnome-control-center was run from terminal and here is the output from terminal:
 * No default domain received via DHCP
 * Resolving: _ldap._tcp.security.baseos.qe
 * Performing LDAP DSE lookup on: 10.34.36.170
 * Successfully discovered: security.baseos.qe
 * Required files: /usr/sbin/oddjobd, /usr/libexec/oddjob/mkhomedir, /usr/sbin/sssd, /usr/bin/net
 * LANG=C LOGNAME=root /usr/bin/net -s /var/cache/realmd/realmd-smb-conf.4SV22W -U Amy-admin ads join security.baseos.qe
Enter Amy-admin's password:
Using short domain name -- SECURITY
Joined 'TEST-20-8' to dns domain 'security.baseos.qe'
 * LANG=C LOGNAME=root /usr/bin/net -s /var/cache/realmd/realmd-smb-conf.4SV22W -U Amy-admin ads keytab create
Enter Amy-admin's password:
 * /usr/bin/systemctl enable sssd.service
ln -s '/usr/lib/systemd/system/sssd.service' '/etc/systemd/system/multi-user.target.wants/sssd.service'
 * /usr/bin/systemctl restart sssd.service
 * /usr/bin/sh -c /usr/sbin/authconfig --update --enablesssd --enablesssdauth --enablemkhomedir --nostart && /usr/bin/systemctl enable oddjobd.service
 * Successfully enrolled machine in realm
 * /usr/bin/systemctl restart sssd.service
 * Successfully changed permitted logins for realm
user-accounts-cc-panel-Message: Couldn't cache user account: No user with the name Amy-admin.qe found

Version-Release number of selected component (if applicable):
realmd-0.14.5-1.el7.x86_64
control-center-3.8.3-1.el7.x86_64
sssd-1.11.0-0.1.beta2.el7.x86_64

How reproducible:
always

Steps to Reproduce:
1.provide steps described in link above
2.
3.

Actual results:


Expected results:


Additional info:

Comment 1 David Spurek 2013-09-03 15:53:26 UTC
Created attachment 793248 [details]
error screenshot

Comment 3 Stef Walter 2013-09-03 16:33:11 UTC
This is a duplicate of bug #980861 or one of that family of bugs.

'sss' wasn't in your /etc/nsswitch.conf when accounts-daemon started before you ran the test.

*** This bug has been marked as a duplicate of bug 980861 ***


Note You need to log in before you can comment on or make changes to this bug.