i have joined one of my proxmox cluster nodes to my active directory domain, with the intention of allowing a group of particular users in active directory to have sudo privileges in proxmox.
was able to join the host to domain and can id users:
root@prox01-node01:~# id pfaffmanadm...
I am interested in managing the root accounts (the ones with console access, and root permissions in proxmox) with Active directory. This would be for password rotation, and also the ability to easily add and remove users that are allowed to SSH into the Proxmox host for management...
I had a test cluster PVE 5.4 with authentication thru Active Directory (Win 2008 R2) with SSL enabled, worked well.
After upgrade to PVE 6.0 any user got message "Login failed. Please try again" while trying to log on.
In log I see:
Aug 17 07:59:17 pve-test-00114983...
On the PVE 6.0.4 the Active Directory connection stopped working.
With same settings in PVE 5.4.11 it works fine on PVE 6.04 login with Active Directory accounts not possible.
Where I can check this issue in CLI ?
we have set up LDAP to internal AD - Active Directory so that users an use their AD credentials to log into PMG and manage quarantine items.
Initially this was working during testing and now this is no longer working.
any assistance in troubleshooting this issue would be greatly...
Good afternoon. I'm looking for a means to create super user type accounts that are similar to root that authenticate against Active directory. I have AD authentication working but I am unable to fine tune the permissions to allow things for some users/groups to create, stop, out, destroy OSDs...
ich habe ein neues Thema. :)
Ich habe probiert nach der Anleitung die es im Netz gibt, das Proxmox Gateway in meine AD einzubinden.
Leider bekomme ich immer wieder die gleich Fehlermeldung.
add LDAP profile failed: 80090308: LdapErr: DSID-0C09042A, comment: AcceptSecurityContext error...
This seems more a feature request than anything but I thought this would be a good place to start.
My office uses smartcards for authentication of just about everything. Computer logins, web sites, email, etc and all authentication is verified via Active Directory. It has been requested by our...
Steps for Reproduction:
Use Proxmox Virtual Environment 4.2-2
Web GUI login via HTTPs
Active Directory Server
Enter Domain and Realm with leading numbers
Enter AD Server IP