#4099 [RFE] Make SSSD GPO code work with built-in AD group SIDs
Closed: cloned-to-github 3 years ago by pbrezina. Opened 4 years ago by mzidek.

The SSSD code currently ignores AD built-in groups. There is no mapping
to POSIX IDs for these groups and there is no mapping because there are
no corresponding generic groups on the UNIX/Linux side.

For the most part this is OK, but in GPO code it would be good to not
ignore the built-in groups. It is common practice to include the built
in group Administrators to all "allow" GPO access control rules. With
SSSD not supporting it, the groups either need to specifically allow
the user Administrator or some other gorups such as Domain Admins.
This is not convenient and Active Directory actually prints a warning
if the Administrators built-in group is not member of some allow
access control rule (like Allow log on locally) so we should support
this use case.


Metadata Update from @thalman:
- Issue tagged with: Future milestone

4 years ago

SSSD is moving from Pagure to Github. This means that new issues and pull requests
will be accepted only in SSSD's github repository.

This issue has been cloned to Github and is available here:
- https://github.com/SSSD/sssd/issues/5063

If you want to receive further updates on the issue, please navigate to the github issue
and click on subscribe button.

Thank you for understanding. We apologize for all inconvenience.

Metadata Update from @pbrezina:
- Issue close_status updated to: cloned-to-github
- Issue status updated to: Closed (was: Open)

3 years ago

Login to comment on this ticket.

Metadata