On Fri, Aug 18, 2017 at 12:54 PM, Louis Garcia <louisgtwo@gmail.com> wrote:
On Fri, Aug 18, 2017 at 12:24 PM, Louis Garcia <louisgtwo@gmail.com> wrote:
On Fri, Aug 18, 2017 at 11:58 AM, Louis Garcia <louisgtwo@gmail.com> wrote:
On Fri, Aug 18, 2017 at 4:08 AM, Jakub Hrozek <jhrozek@redhat.com> wrote:
On Fri, Aug 18, 2017 at 08:42:34AM +0200, Lukas Slebodnik wrote:
> On (17/08/17 12:38), Louis Garcia wrote:
> >Sorry to mail you directly but I think the sssd user mailing list is not
> >accepting my emails. I replied twice to this thread yesterday and both
> >bounced.
> >
>

> I have no idea why you have problems to send a mails there.

Sorry, this is partially my fault. I should be watching the moderation
queue, but lately we've been getting so much spam (sometimes one spam
attempt per hour) that I overlooked your e-mail.

You can subscribe to the list and then your messages will go right to
the list w/o the moderation queue!

sssd-users-request@lists.fedorahosted.org

Aug 15 (3 days ago)


to me
Welcome to the "sssd-users" mailing list!

I subscribed here: https://lists.fedorahosted.org/admin/lists/sssd-users.lists.fedorahosted.org/ and I receive all emails from the list but I don't have a user account.
How do I properly subscribe?

 
I test by login out of gnome and login back in. After I open a terminal and run klist

klist: Credentials cache keyring 'persistent:1000:1000' not found

Then I need to kinit and if I klist again

Ticket cache: KEYRING:persistent:1000:1000
Default principal: louisgtwo@MONTCLAIRE.LOCAL

Valid starting       Expires              Service principal
08/18/2017 12:33:50  08/19/2017 12:33:33  krbtgt/MONTCLAIRE.LOCAL@MONTCLAIRE.LOCAL


after that I can ssh and mount nfs4 krb5p. I want to receive my ticket when I login.

I am not sure how to search journald. I used 'journalctl -u pam' with no effect

#cat /etc/pam.d/system-auth
#%PAM-1.0
# This file is auto-generated.
# User changes will be destroyed the next time authconfig is run.
auth        required      pam_env.so
auth        required      pam_faildelay.so delay=2000000
auth        sufficient    pam_fprintd.so
auth        [default=1 ignore=ignore success=ok] pam_succeed_if.so uid >= 1000 quiet
auth        [default=1 ignore=ignore success=ok] pam_localuser.so
auth        sufficient    pam_unix.so nullok try_first_pass
auth        requisite     pam_succeed_if.so uid >= 1000 quiet_success
auth        sufficient    pam_sss.so forward_pass
auth        required      pam_deny.so

account     required      pam_unix.so
account     sufficient    pam_localuser.so
account     sufficient    pam_succeed_if.so uid < 1000 quiet
account     [default=bad success=ok user_unknown=ignore] pam_sss.so
account     required      pam_permit.so

password    requisite     pam_pwquality.so try_first_pass local_users_only retry=3 authtok_type=
password    sufficient    pam_unix.so sha512 shadow nullok try_first_pass use_authtok
password    sufficient    pam_sss.so use_authtok
password    required      pam_deny.so

session     optional      pam_keyinit.so revoke
session     required      pam_limits.so
-session     optional      pam_systemd.so
session     [success=1 default=ignore] pam_succeed_if.so service in crond quiet use_uid
session     required      pam_unix.so
session     optional      pam_sss.so

# cat /etc/pam.d/password-auth
#%PAM-1.0
# This file is auto-generated.
# User changes will be destroyed the next time authconfig is run.
auth        required      pam_env.so
auth        required      pam_faildelay.so delay=2000000
auth        [default=1 ignore=ignore success=ok] pam_succeed_if.so uid >= 1000 quiet
auth        [default=1 ignore=ignore success=ok] pam_localuser.so
auth        sufficient    pam_unix.so nullok try_first_pass
auth        requisite     pam_succeed_if.so uid >= 1000 quiet_success
auth        sufficient    pam_sss.so forward_pass
auth        required      pam_deny.so

account     required      pam_unix.so
account     sufficient    pam_localuser.so
account     sufficient    pam_succeed_if.so uid < 1000 quiet
account     [default=bad success=ok user_unknown=ignore] pam_sss.so
account     required      pam_permit.so

password    requisite     pam_pwquality.so try_first_pass local_users_only retry=3 authtok_type=
password    sufficient    pam_unix.so sha512 shadow nullok try_first_pass use_authtok
password    sufficient    pam_sss.so use_authtok
password    required      pam_deny.so

session     optional      pam_keyinit.so revoke
session     required      pam_limits.so
-session     optional      pam_systemd.so
session     [success=1 default=ignore] pam_succeed_if.so service in crond quiet use_uid
session     required      pam_unix.so
session     optional      pam_sss.so


do I need to login to gdm with my domain realm? louisgtwo@montclaire.local ??