Hello all,
For the past few days I have been trying to integrate TrueNAS (24.10) with an LDAP domain. The process has been quite frustrating with little success to say the least.
I will preface this that while I am new to LDAP, my problems appear to be more on the TrueNAS side.
As for some deployment details, the LDAP server is an OpenLDAP deployment, running in a docker container under TrueNAS, using the github osixia/docker-openldap image. (Link redacted, due to new user limitations).
With that out of the way, let me get to the point:
- First, is Samba authentication via LDAP still supported? I have seen references on the forums to the removal of support for NTLM, needed to facilitate this. However, the documentation still says that LDAP is supported, provided specific attributes are populated. Which of these two is correct?
- I am experiencing strange issues with stale groups, users, and attributes present in the TrueNAS Credentials → User UI. This is irrespective of whether the “Disable LDAP User/Group Cache” checkbox in the Directory Services → LDAP menu is selected or not. There is no effect on this by manually clearing the sssd cache (
sudo sss_cache -E
). Rebooting the system works, but is inconvenient. - Not all attributes of the user seem to be settable from the LDAP data. For example, I have been unable to set the “Authorized keys” field in TrueNAS by populating the “sshPublicKey” attribute in the LDAP database. I have also been unable to set the “Allow password login”, so that the users can log in with the password for the first time and copy their ssh keys that way. Looking through the LDAP plugin for middleware, these do not appear to be used despite being pulled from the database (according to the query logged by the LDAP server).
- Attempting to remap attributes (using the Auxilliary Parameters) causes an error (sssd cannot start) Specifically:
map passwd homeDirectory "/mnt/pool/home_share/$uid"
results in a comically long error message, since it includes previous service log. An abridged error log can be found below.
Any response/help would be appreciated, especially regarding the first point. If Samba auth does not work with OpenLDAP, then there is nothing to be done but to switch to AD or FreeIPA.
.
.
.
Mar 05 18:16:25 systemd[1]: Starting sssd.service - System Security Services Daemon...
Mar 05 18:16:25 sssd[17703]: SSSD couldn't load the configuration database [1432158325]: Error while parsing configuration file
Mar 05 18:16:25 systemd[1]: sssd.service: Main process exited, code=exited, status=4/NOPERMISSION
Mar 05 18:16:25 systemd[1]: sssd.service: Failed with result 'exit-code'.
Mar 05 18:16:25 systemd[1]: Failed to start sssd.service - System Security Services Daemon.
Mar 05 18:16:32 systemd[1]: Starting sssd.service - System Security Services Daemon...
Mar 05 18:16:32 sssd[17776]: SSSD couldn't load the configuration database [1432158325]: Error while parsing configuration file
Mar 05 18:16:32 systemd[1]: sssd.service: Main process exited, code=exited, status=4/NOPERMISSION
Mar 05 18:16:32 systemd[1]: sssd.service: Failed with result 'exit-code'.
Mar 05 18:16:32 systemd[1]: Failed to start sssd.service - System Security Services Daemon.
Mar 05 18:35:27 systemd[1]: Starting sssd.service - System Security Services Daemon...
Mar 05 18:35:27 sssd[24441]: SSSD couldn't load the configuration database [1432158325]: Error while parsing configuration file
Mar 05 18:35:27 systemd[1]: sssd.service: Main process exited, code=exited, status=4/NOPERMISSION
Mar 05 18:35:27 systemd[1]: sssd.service: Failed with result 'exit-code'.
Mar 05 18:35:27 systemd[1]: Failed to start sssd.service - System Security Services Daemon.