Bug 2038964 - sssd uses the off-line server to check gpo and whole authentication fails
Summary: sssd uses the off-line server to check gpo and whole authentication fails
Keywords:
Status: NEW
Alias: None
Product: Red Hat Enterprise Linux 8
Classification: Red Hat
Component: sssd
Version: 8.4
Hardware: All
OS: Linux
unspecified
medium
Target Milestone: rc
: ---
Assignee: sssd-maint
QA Contact: sssd-qe
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2022-01-10 16:23 UTC by Abhijit Roy
Modified: 2023-08-14 08:27 UTC (History)
7 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed:
Type: Bug
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Issue Tracker RHELPLAN-107311 0 None None None 2022-01-10 16:25:58 UTC
Red Hat Issue Tracker SSSD-4247 0 None None None 2022-01-11 08:08:04 UTC

Description Abhijit Roy 2022-01-10 16:23:49 UTC
Description of problem:

SSSD can not properly fail over during authentication and access control to other
DCs even if there are multiple listed in the kdcinfo file.

Workaround:  'krb5_kdcinfo_lookahead = 1:0' suggested by Sumit.

sssd uses the off-line server to check gpo and whole authentication
fails.

Version-Release number of selected component (if applicable):


How reproducible:


Steps to Reproduce:
1.
2.
3.

Actual results:


Expected results:


Additional info:


Related ticket(s):

https://pagure.io/SSSD/sssd/issue/3973

https://pagure.io/SSSD/sssd/issue/3974

https://pagure.io/SSSD/sssd/issue/3975


Note You need to log in before you can comment on or make changes to this bug.