We have a CentOS 7 system integrated with Active Directory. Achieved using realmd, SSSD and krb5-workstation together with a ktpass-generated keytab.
Apache’s mod_auth_kerb allows users to authenticate via their AD accounts, and authorise with “require user” directive. But so far we fail to authorise via AD group membership. i.e. adding AuthLDAPUrl and “require ldap-group”
directives to httpd.conf results in access being denied. Using ldapsearch with GSSAPI (or password entry) works as expected.
After looking at debug logs and tcpdump output, I (possibly incorrectly) put the issue down to being unsure how to get krb5_aname_to_localname to function appropriately with the KrbLocalUserMapping directive of apache’s mod_auth_kerb.
It does do some transformation, converting to lowercase. However the realm part is not stripped off. Example output from apache error_log:
[Thu Jan 25 11:53:33.969841 2018] [auth_kerb:debug] [pid 2176]
src/mod_auth_kerb.c(1855): [client 192.168.254.170:65016]
kerb_authenticate_a_name_to_local_name Test12 at X.Y.Z -> test12 at x.y.z
(All other examples I found have output of format:
… Test12 at X.Y.Z -> Test12 )
I have tried experimenting with auth_to_local tags in the [realms] sections of
/etc/krb5.conf, but could see no evidence of the rules being invoked. i.e. Same output in the apache error log regardless.
This then appears to get passed on for use in subsequent ldap authorisations
(apache mod_authnz_ldap). This does not work for us as we need to authorise against stripped user names (Active Directory sAMAccount or similar; our userPrincipalName is a different format: Test12 at Q.Y.Z, so can’t workaround using that).
I previously posted a similar messages to email@example.com but got no feedback. Hopefully this list might be more appropriate.
Grateful for any advice, Ewae.