Posted on 10-03-2017 06:55 AM
Anybody else experiencing issues with High Sierra integrating with AD in your environment? We're currently having issues where accounts that should have binding rights not allowing a bind, issues involving changing the password of AD accounts, and sporadic issues where mobile accounts can not be created at a lock screen. The frustrating part is that no issue occurs on all machines, but they occur consistently on the machines where we experience them.
Solved! Go to Solution.
Posted on 10-03-2017 07:05 AM
Well, basically AD integration on High Sierra is broken. Once again, Apple apparently forgot to invite the developer who does AD integration to the OS development party for High Sierra. (example thread)
Yes, that was sarcasm, but it sure seems Apple is consistent with this on their yearly releases. They seem to break it with each new x.x.0 version.
Anyway, I think the answer will be to wait for 10.13.1 to see if they fixed these issues, with any luck. Until then, you will be banging your head against the wall, and that doesn't seem worth it.
Posted on 10-03-2017 07:05 AM
Well, basically AD integration on High Sierra is broken. Once again, Apple apparently forgot to invite the developer who does AD integration to the OS development party for High Sierra. (example thread)
Yes, that was sarcasm, but it sure seems Apple is consistent with this on their yearly releases. They seem to break it with each new x.x.0 version.
Anyway, I think the answer will be to wait for 10.13.1 to see if they fixed these issues, with any luck. Until then, you will be banging your head against the wall, and that doesn't seem worth it.
Posted on 10-03-2017 07:19 AM
Welp, that will do it. Thanks for pointing out what I missed!
Posted on 10-03-2017 12:29 PM
I am not seeing this issue, but we cannot login to bound machines because our home drive mapping in AD has a $ to hide it and Apple has decided it no longer likes it. Worked fine prior, except now because of this you can't even login to the machine unless you use a local account. Fun fun Fun
Posted on 10-03-2017 07:59 PM
I'm not seeing this issue either, I have done an In-Place upgrade on our student loan MacBooks and login is working as expected.
Posted on 10-04-2017 04:42 AM
@retroroscoe We're experiencing the issue as well, but only on newly imaged Macs. When we do an in-place upgrade the problem doesn't exist. Maybe check it as well on a newly imaged Mac to avoid problems later.
Posted on 10-04-2017 09:18 AM
@mm2270 wrote:
Once again, Apple apparently forgot to invite the developer who does AD integration to the OS development party for High Sierra.
Seems like it. This would have been the perfect opportunity to push Enterprise Connect. If they had bothered to test on High Sierra.
#ironNoLongerHot
Posted on 10-04-2017 10:17 AM
No problems on our side with AD login and 10.13
Posted on 10-04-2017 03:15 PM
If a machine is already binded so far I see no issues, it keeps them after the upgrade. Have not had a chance to bind post install or on a new install yet.
Posted on 10-04-2017 04:41 PM
I found this issue after an upgrade I could no longer login as my network (AD) account. Had to follow the advice in another thread about logging in as a local admin account and unbinding / rebinding to AD then I could login again as my AD account. I've put the block in as per this advice. Works a treat: https://www.jamf.com/jamf-nation/discussions/25485/restricting-users-from-updating-to-high-sierra-10-13-issues
Posted on 10-05-2017 06:28 AM
Currently blocking High Sierra with that advice as well. Don't plan on upgrading until at least 10.13.1. Thanks for the heads up!
Posted on 10-05-2017 10:58 AM
We bind to AD and use mobile accounts. After upgrade, login with new users still works, but permissions based on an AD group are no longer honored. Rebind!
Posted on 10-05-2017 11:37 AM
Yeah, in addition to AD passwords not actually changing, we've got users who get admin rights via AD group that don't anymore (if you bind with profiles - seems to work OK if you bind with the Directory Utility and add the group after).
Oh, and no Touch ID for mobile users.
Posted on 11-13-2017 04:14 AM
We are not experiencing that yet. All the AD security groups are still working fine and all the AD users with admin rights can still administer the device. Would love to see how different the setups are from ours.
Posted on 02-05-2018 03:01 PM
Upgrading now through Self Service policy or App Store to 10.13.x breaks the management groups for AD administering the Macs bound to AD. In other words, if you have specified AD groups that manage Macs, and you upgrade from El Cap or Sierra to High Sierra, these groups no longer are elevated to admin after the upgrade DESPITE the GUI showing that they are still a part of the admin group.
Posted on 02-06-2018 07:41 AM
@jamesgreenMattel We are seeing the same issue upon upgrades starting all the way back to 10.13.0, fortunately we apply the rights via a script and I have a policy that reapplies them after the OS updates.
At the end of our OS update policy, I use this command: touch /Library/Company/Logs/HSupgradeComplete.log. then an EA reports on if the file exists and a Smart Group tallies them. I have a cleanup policy that runs based on this smart group to reinstate the rights and reset our Managed Print system.
It's definitely not pretty but it does work around the issue until Apple resolves it.
As for a resolution from Apple, your guess is as good as mine which is why i chose to work around it.
Thanks
Jeff
Posted on 03-19-2018 06:49 AM
@jconte We are experiencing the same issue here as well. Do you ming sharing your script to apply the admin rights?
Posted on 03-19-2018 07:29 AM
Sure no problem,
#!/bin/bash
dseditgroup -o edit -a "Domainmacsupport" -t group admin
dseditgroup -o edit -a "Domainadm" -t group admin
dseditgroup -o edit -a "DomainDesktopAdmins" -t group admin
dseditgroup -o edit -a "DomainExec_Desktopadmin" -t group admin
dseditgroup -o edit -a "DomainLAWDTADMIN" -t group admin
dseditgroup -o edit -a "DomainEngineering_Admin" -t group admin
dseditgroup -o edit -d "DomainHD_Triage" -t group admin
exit 0
Posted on 05-23-2018 08:35 AM
@duffcalifornia , Any RODCs in the forest?
Anyway, I have described here what's happening if you have Read Only Domain Controllers in your environment.
Posted on 07-19-2018 11:36 AM
Yes working around it is the name of the game. I have my own policies and scripts that fix it.