I have the system set to use CRYPT-SHA512 as password store method. For 
antiquated reasons I need to generate a shadow file from data stored in freeipa.
I would greatly prefer to not have to use the cn=Directory Manager and use a 
different binddn. But it seems only the DM has the ability to actually retrieve 
userpasswd.

The pain point is the password entry. -y file doesn't work - ldap-bind: Invalid 
credentials (49). The stored password is correct and perms are 0600 and in 
/root. The DM is not in the kerberos database so I can't use a keytab and 
-YGSSAPI. The only method that works is the password entered on the cli.
Ugh. That is unpleasant.

This needs to run on a systemd timer to autogenerate the shadow file (and 
passwd and group  files but those are easy) for a few thousand nodes that can't 
fail due to a network outage with freeipa (IdM actually). This is to handle 
user password changes and group membership changes in an HPC environment. I can 
dump in the passwd with expect. Just wondering if there's a way to setup a 
special password hash reading account with a keytab and not use the Directory 
Manager and password.
-- 
Computers amplify human error
Super computers are really cool
_______________________________________________
FreeIPA-users mailing list -- [email protected]
To unsubscribe send an email to [email protected]
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedorahosted.org/archives/list/[email protected]
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure

Reply via email to