Hi all,
We have this code in principal2uid() where if a kerberos principal starts
with nfs/, root/ or host/ we map it up-front to UID 0 and GID 0.
There can be a setup where explicit mapping of entries is done. Eg-
[realms]
EXAMPLE.COM = {
kdc = 192.168.122.250
admin_server = 192.168.122.250
auth_to_local_names = {
nfs/ldapuser101 = ldapuser101
nfs/ldapuser102 = ldapuser102
}
}
All nfs/user@REALM principals would get mapped to root user always and
that is a problem. Any reason for having this code?
With kNFS the mapping works fine and such principals are not mapped to
root.
Thanks and regards,
Trishali.