You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
It is possible to fix this issue by removing SID attribute and an object class that requires it and then calling ipa config-mod --add-sids --enable-sids to regenerate missing SIDs. Since old SIDs are invalid in the new environment and IPA does not have SID history, they can be removed unless SIDs were used on Windows side to assign permissions. We don't generally support that yet without Global Catalog feature, though.
The text was updated successfully, but these errors were encountered:
So I guess a query for SIDs that don't match the domain SID would be the best way to find errant entries. How can I determine the domain SID for the IPA install?
With hardening against CVE-2020-25717, FreeIPA KDC now performs a number of checks for SIDs of user accounts. Namely:
On freeipa-users@ there it was already reported that if users were migrated from an old installation with the help of
ipa migrate-ds
, they would have SIDs generated in the older IPA deployment and thus would be different to the SID in the current IPA setup. Reference: https://lists.fedorahosted.org/archives/list/[email protected]/thread/4S4QQDC4FBVTA4GYWWVBPKGYN3MF4UJ6/Add a check for that.
It is possible to fix this issue by removing SID attribute and an object class that requires it and then calling
ipa config-mod --add-sids --enable-sids
to regenerate missing SIDs. Since old SIDs are invalid in the new environment and IPA does not have SID history, they can be removed unless SIDs were used on Windows side to assign permissions. We don't generally support that yet without Global Catalog feature, though.The text was updated successfully, but these errors were encountered: