Is it any way to simulate such login from every user to generate Kerberos keys?
I also tried to migrate user statuses with the simple custom script like below and got strange output. #!/bin/bash
echo -e "${ADM_PW}" | kinit admin DIS_USERS=$(tail -n +2 ldap_dis.txt)
for USR in ${DIS_USERS}; do ipa user-disable ${USR} done
cat ldap_dis.txt SOME_NOT_REQ_STRING test.1 test.2 test.3
ipa user-disable test.1 (started inside the FreeIPA docker container) working as expected, but output from the same command in the script look like below
Password for admin@SOMEDOMAIN.COM: ----------------------------------------- "isabled user account "test.1 ----------------------------------------- ----------------------------------- "isabled user account "test.2 ----------------------------------- ----------------------------------- "isabled user account "test.3 -----------------------------------