In /etc/krb5.conf, under the "rdns = false" line in "[lib defaults]" section, add following line:
"dns_lookup_kdc = true"
In krb5.conf, add the following lines in "[domain realm]" section.
Domain dns name = DOMAIN DNS NAME
.Domain dns name = DOMAIN DNS NAME
In krb5.conf, make sure that the "default_ccache_name = KEYRING:persistent:%{uid}" is same. Here we have noticed an issue in RHEL 7.1 and 7.2 that, if the cache type is mentioned as FILE, it fails to generate the cache and if it gets generated, the VDA fails to get registered.
Also, in krb5.conf, make sure that the kdc addresses are correctly pointing to the Domain controller addresses.
In /etc/security/pam_winbind.conf, please make sure that "krb5_auth = yes" and "mkhomedir = yes"
In pam_winbind.conf, if "krb5_ccache_type = FILE", please leave it as it is (however it does not make any change as cache type is KEYRING)
Once these are done, please join the system to domain, however there are some steps which can be different from the product documentation. In product documentation, it specifies only to edit the config files and use command line to add to domain. For easiness install "authconfig-gtk" to install the authentication configuration GUI tool.
Use command "yum install authconfig-gtk" to install. After installation is over, go to "Activities overview" and search for Authentication. It will bring up the Authentication tool. Select Winbind and enter the parameters exactly like in below screen shot.
Before clicking on "Join domain", navigate to Active Directory Users and Computers in Domain Controller and Pre-stage a computer account with name in correct case.
Click on "Join domain" button and make sure to enter the domain administrative credentials correctly and click ok. Wait for a while to make sure no errors encountered and then click apply to exit the tool.
Before trying to login as user, reboot the system.
Once system is boot up, login to the system with a domain user account to test. If there is any failure to create homedir, the login will fail, then need to troubleshoot on that aspect.
Once the domain join is done, please test the domain join and krb5 auth with following commands as root.
Kinit -k
Klist -ket
Net ads info
Net ads status
Net ads testjoin
Sometimes, the above commands can fail as the local root account is not a domain user. In this scenario, please make a new domain user with "root" as name and add the user to domain admins group. However, do not login as Domain\root, use the local root itself. Now the above commands will give the result.
Also, the "net ads keytab" commands can be used to see the keytab contents and flush the contents. Please do not do those if no specific need for that, otherwise it can mess up the domain membership of the system. This can even accidentally delete the SPN for the VDA's account in AD.
Once the above steps are complete, please download the proper installer file for the VDA agent 1.1 and install it as per the documentation.
Once successfully installed, please execute script /usr/local/sbin/ctxsetup.sh with correct parameters and reboot the system.
On system is boot up, please check the status of Winbind, Ctxhdx and ctxvda services with following commands.
a./sbin/service ctxhdx status -l
b./sbin/service ctxvda status -l
c./sbin/service winbind status -l