-
Notifications
You must be signed in to change notification settings - Fork 403
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Update active-directory-client.md #1098
base: master
Are you sure you want to change the base?
Conversation
Without ad_gpo_access_control = permissive in the [domain] section of the SSSD conf I could not log in to my Server 2022 AD from PopOS. I've found dozens of places on the internet where people have complained that they can not log in, just like the issue I had. None of those people seemed to find the fix. If this isn't added we should at least leave it as a comment for those who can't log in on their AD instance.
@jacobgkau is this correct? |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I set up a Windows Server 2022 virtual machine with an Active Directory domain (since this article was last tested with Windows Server 2019), and I was unable to recreate the failure to log in with the current instructions (without this extra line.)
Additionally, SSSD documentation (as well as Red Hat documentation) indicates that permissive
is the default value for this setting, so we shouldn't need to set it manually.
@TimInLasVegas Can you please elaborate on your Windows Server 2022 configuration, as well as your Pop!_OS configuration besides what the support article covers? Can you link to some of the "dozens" of related complaints you're referring to?
Looking through the comments of my personal YouTube video on this topic, one Ubuntu user said adding I am seeing some SSSD bug reports searching for the two settings that might point me towards a Windows Server configuration that will trigger the issue. |
I tried creating a group policy object and removing the If I remove (I tried testing with |
@TimInLasVegas it sounds like from @jacobgkau 's testing it could be a configuration on your end, is that correct @jacobgkau ? |
Unless someone can provide a different way to recreate the issue from what I found, then that would seem to be the case. The handful of people I found discussing this workaround does make me think a note about checking the server-side configuration or else adding the option might still be useful, though (just in a separate code block from the recommended configuration.) |
Without ad_gpo_access_control = permissive in the [domain] section of the SSSD conf I could not log in to my Server 2022 AD from PopOS. I've found dozens of places on the internet where people have complained that they can not log in, just like the issue I had. None of those people seemed to find the fix. If this isn't added we should at least leave it as a comment for those who can't log in on their AD instance.