Hi all,
We have this code
in principal2uid() where if a kerberos principal starts with nfs/, root/
or host/ we map it up-front to UID 0 and GID 0.
There can be a
setup where explicit mapping of entries is done. Eg-
[realms]
EXAMPLE.COM = {
kdc = 192.168.122.250
admin_server = 192.168.122.250
auth_to_local_names = {
nfs/ldapuser101
= ldapuser101
nfs/ldapuser102
= ldapuser102
}
}
All nfs/user@REALM
principals would get mapped to root user always and that is a problem.
Any reason for having this code?
With kNFS the
mapping works fine and such principals are not mapped to root.
Thanks and regards,
Trishali.