On 28/03/2025 13:50, Alexander Bokovoy wrote:
On Пят, 28 сак 2025, Jostein Fossheim wrote:
On 2025-03-28 08:42, Alexander Bokovoy wrote:

Sure, what's surprising here? From IPA side you can access resources on
the trusted AD forest side if you have inbound trust. You cannot do that
from Windows machines because their UI calls into some DCE RPC APIs we
do not support on IPA side. They also try to call into Global Catalog
and the primary LDAP instances while expecting those to have AD LDAP
schema and DIT structure. IPA is not supporting those so no wonder
things fail.


One strange observation after playing more with SIDs. I was trying to add the admin-user from IPA's sid to a local group,.

The domain controller of course don't have any local groups or users. Well, it has some, look at this:


PS C:\Users\Administrator> Get-LocalGroup

Name                                    Description
----                                    -----------
Cert Publishers                         Members of this group are permitted to publish certificates to the directory RAS and IAS Servers                     Servers in this group can access remote access properties of users Allowed RODC Password Replication Group Members in this group can have their passwords replicated to all read-only d... Denied RODC Password Replication Group  Members in this group cannot have their passwords replicated to any read-onl...

PS C:\Users\Administrator> Add-LocalGroupMember -Group "Cert Publishers" -Member "S-1-5-21-355267255-715991334-1594671509-500"


PS C:\Users\Administrator> Get-LocalGroupMember "Cert Publishers"

ObjectClass Name              PrincipalSource
----------- ----              ---------------
User        IPA-NAS-LAB\admin ActiveDirectory


PS C:\Users\Administrator>

It seems that via this powershell-command it is actually able to resolve the SID, from the IPA-domain, but this puzzles me, and I cannot understand why, the SID is not resolved when i look at the previous mentioned NTFS-acls in the gui?

Welcome to Windows Security Tab world. ;)

I was not completely able to let this rest, so I dived deeper into the mystical name-resolving that occurred via powershell.

It turns out that the SID in question has been added to the Foreign Security Principials subtree in LDAP, but only visible through an ldap search or ldap browser other than "Active Directory Users and Computers" ADSI Edit for example. And it turns out that I can actually create an Domain Local Group, and ad the Foreign Security Principial to that group via its DN.

And now I have an AD group which contain my IPA-NAS-LDAP\admin user (and it do actually resolve in the "Active Directory Users and Computers"-view as well. And this group I can assign other Rights in my Active Directory. I have only tested with file-services so far though and I can indeed regulate access control for my IPA-users, so I am quite satisfied so far

I can show more practically examples and investigate this further, the next few days, and try to understand exactly why the Foreign Security Principial was created in the ldap tree.

It should be fairly trivial to import all sids via a scripted automation or a similar mechanism.

It looks rather promising when it comes to let IPA-users access (at least) file-services on the windows-servers (I have only tested smb not NTFSv4.1).

Best Regards,

Jostein



--
_______________________________________________
FreeIPA-users mailing list -- [email protected]
To unsubscribe send an email to [email protected]
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedorahosted.org/archives/list/[email protected]
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue

Reply via email to