Recently we have bounded our Linux server to an AD domain. We are now able to do simple operations, as follows:
- Login to our Linux server with AD accounts (also via SSH)
- List and recognize our AD groups with the id command
- Create files, taking ownership on those files and another simple operations
- Create ACL's on the Linux server involving our AD users and groups
However, It seems that our users can not get access with groups other than their primary group.
Steps we have tried
Let's say that an AD user named foo is member of "group_A@domain.dom", "group_B@domain.dom" AD groups, and group_A defined as primary group. We expected that user foo will be able to access files that are own by group_A or group_B, but we have found that the user foo can not get access to files owned (or have permissions) assigned to group_B.
Therefore, our user is member of a lot of ad groups, but only the primary group is effective and can give our user an access on files in the Linux server. This phenomenon seems to occur across all our environment
What can we do to allow our AD users get access via all the groups they're member of and not only their primary group?
Technical Info
We are using Rhel7 Linux server, and we joined it to the windows domain with realm tool. We did not gave our users a POSIX attributes, and there is an auto ID mapping