From Fedora Project Wiki

(Update selinux message to include package name)
(Add about krb5-libs failure)
Line 51: Line 51:
$ sudo grep realmd /var/log/audit/audit.log
$ sudo grep realmd /var/log/audit/audit.log
</pre>
</pre>
* If you see errors about installing '''krb5-libs''' or '''krb5-workstation''' then you need to follow the prerequisites and install those packages from
[http://koji.fedoraproject.org/koji/buildinfo?buildID=412535 krb5-1.11.2-2.fc19]


[[Category:Realmd_Test_Cases]] [[Category:FreeIPA_Test_Cases]]
[[Category:Realmd_Test_Cases]] [[Category:FreeIPA_Test_Cases]]

Revision as of 11:22, 18 April 2013

Description

Join the current machine to a FreeIPA domain. Domain accounts are available on the local machine once this is done.

Setup

  1. This testcase assumes you have already set up a FreeIPA domain (named "ipa.example.org"). If you haven't, you can set one up.
  2. Your machine must have a configured host name. Do not proceed if your host name is localhost or similar.
    $ hostname
  3. Make sure you have realmd-0.13.3-2 or later installed.
    $ yum list realmd

How to test

  1. Perform the join command using IPA's admin account.
    $ realm join --user=admin ipa.example.org
    You will be prompted for a password for the account.
    You will be prompted for Policy Kit authorization.
    On a successful join there will be no output.
    This can take up to a few minutes depending on how far away your FreeIPA domain is.

Expected Results

  1. Check that the domain is now configured.
    $ realm list
    Make sure the domain is listed.
    Make sure you have a configured: kerberos-member line in the output.
    Make note of the login-formats line for the next command.
  2. Check that you can resolve domain accounts on the local computer.
    $ getent passwd admin@ipa.example.org
    You should see an output line that looks like passwd(5) output. It should contain an appropriate home directory, and a shell.
    Use the login-formats you saw above, to build a remote user name. It will be in the form of $user@$fqdn, where fqdn is your fully qualified IPA domain name (e.g. ipa.example.org).
  3. Check that you have an appropriate entry in your hosts keytab.
    sudo klist -k
    You should see several lines, with your host name. For example 1 host/$hostname@$FQDN
  4. Check that you can use your keytab with kerberos
    sudo kinit -k host/client.ipa.example.org@IPA.EXAMPLE.ORG
    Make sure the domain name is capitalized.
    Use the principal from the output of the klist command above. Use the one that's capitalized and looks like host/$hostname@$FQDN.
    There should be no output from this command.
  5. If you have set up the FreeIPA Web UI, you can use it to see that the computer account was created under the Hosts section.



Troubleshooting

Use the --verbose argument to see details of what's being done during a join. Include verbose output in any bug reports.

$ realm join --verbose ipa.example.org
  • RHBZ #952830 If you see SELinux issues, it's because you don't have selinux-policy-3.12.1-32 or later.
    • Please do this and report all AVC's to the above bug.
$ sudo setenforce permissive
... do the test
$ sudo grep realmd /var/log/audit/audit.log
  • If you see errors about installing krb5-libs or krb5-workstation then you need to follow the prerequisites and install those packages from
krb5-1.11.2-2.fc19