mirror of
https://salsa.debian.org/freeipa-team/freeipa.git
synced 2025-02-25 18:55:28 -06:00
DNS Locations: Always create DNS related privileges
DNS privileges are important for handling DNS locations which can be created without DNS servers in IPA topology. We will also need this privileges presented for future feature 'External DNS support' https://fedorahosted.org/freeipa/ticket/2008 Reviewed-By: Petr Spacek <pspacek@redhat.com> Reviewed-By: Jan Cholasta <jcholast@redhat.com>
This commit is contained in:
parent
fd4386d5c9
commit
29a8615cf3
@ -80,6 +80,22 @@ objectClass: nestedgroup
|
|||||||
cn: Delegation Administrator
|
cn: Delegation Administrator
|
||||||
description: Role administration
|
description: Role administration
|
||||||
|
|
||||||
|
dn: cn=DNS Administrators,cn=privileges,cn=pbac,$SUFFIX
|
||||||
|
changetype: add
|
||||||
|
objectClass: top
|
||||||
|
objectClass: groupofnames
|
||||||
|
objectClass: nestedgroup
|
||||||
|
cn: DNS Administrators
|
||||||
|
description: DNS Administrators
|
||||||
|
|
||||||
|
dn: cn=DNS Servers,cn=privileges,cn=pbac,$SUFFIX
|
||||||
|
changetype: add
|
||||||
|
objectClass: top
|
||||||
|
objectClass: groupofnames
|
||||||
|
objectClass: nestedgroup
|
||||||
|
cn: DNS Servers
|
||||||
|
description: DNS Servers
|
||||||
|
|
||||||
dn: cn=Service Administrators,cn=privileges,cn=pbac,$SUFFIX
|
dn: cn=Service Administrators,cn=privileges,cn=pbac,$SUFFIX
|
||||||
changetype: add
|
changetype: add
|
||||||
objectClass: top
|
objectClass: top
|
||||||
|
@ -12,19 +12,3 @@ aci: (targetattr = "*")(version 3.0; acl "Allow read access"; allow (read,search
|
|||||||
aci: (target = "ldap:///idnsname=*,cn=dns,$SUFFIX")(version 3.0;acl "Add DNS entries in a zone";allow (add) userattr = "parent[1].managedby#GROUPDN";)
|
aci: (target = "ldap:///idnsname=*,cn=dns,$SUFFIX")(version 3.0;acl "Add DNS entries in a zone";allow (add) userattr = "parent[1].managedby#GROUPDN";)
|
||||||
aci: (target = "ldap:///idnsname=*,cn=dns,$SUFFIX")(version 3.0;acl "Remove DNS entries from a zone";allow (delete) userattr = "parent[1].managedby#GROUPDN";)
|
aci: (target = "ldap:///idnsname=*,cn=dns,$SUFFIX")(version 3.0;acl "Remove DNS entries from a zone";allow (delete) userattr = "parent[1].managedby#GROUPDN";)
|
||||||
aci: (targetattr = "a6record || aaaarecord || afsdbrecord || aplrecord || arecord || certrecord || cn || cnamerecord || dhcidrecord || dlvrecord || dnamerecord || dnsclass || dnsttl || dsrecord || hinforecord || hiprecord || idnsallowdynupdate || idnsallowquery || idnsallowsyncptr || idnsallowtransfer || idnsforwarders || idnsforwardpolicy || idnsname || idnssecinlinesigning || idnssoaexpire || idnssoaminimum || idnssoamname || idnssoarefresh || idnssoaretry || idnssoarname || idnssoaserial || idnsupdatepolicy || idnszoneactive || ipseckeyrecord || keyrecord || kxrecord || locrecord || mdrecord || minforecord || mxrecord || naptrrecord || nsecrecord || nsec3paramrecord || nsrecord || nxtrecord || ptrrecord || rprecord || rrsigrecord || sigrecord || spfrecord || srvrecord || sshfprecord || tlsarecord || txtrecord || unknownrecord ")(target = "ldap:///idnsname=*,cn=dns,$SUFFIX")(version 3.0;acl "Update DNS entries in a zone";allow (write) userattr = "parent[0,1].managedby#GROUPDN";)
|
aci: (targetattr = "a6record || aaaarecord || afsdbrecord || aplrecord || arecord || certrecord || cn || cnamerecord || dhcidrecord || dlvrecord || dnamerecord || dnsclass || dnsttl || dsrecord || hinforecord || hiprecord || idnsallowdynupdate || idnsallowquery || idnsallowsyncptr || idnsallowtransfer || idnsforwarders || idnsforwardpolicy || idnsname || idnssecinlinesigning || idnssoaexpire || idnssoaminimum || idnssoamname || idnssoarefresh || idnssoaretry || idnssoarname || idnssoaserial || idnsupdatepolicy || idnszoneactive || ipseckeyrecord || keyrecord || kxrecord || locrecord || mdrecord || minforecord || mxrecord || naptrrecord || nsecrecord || nsec3paramrecord || nsrecord || nxtrecord || ptrrecord || rprecord || rrsigrecord || sigrecord || spfrecord || srvrecord || sshfprecord || tlsarecord || txtrecord || unknownrecord ")(target = "ldap:///idnsname=*,cn=dns,$SUFFIX")(version 3.0;acl "Update DNS entries in a zone";allow (write) userattr = "parent[0,1].managedby#GROUPDN";)
|
||||||
|
|
||||||
dn: cn=DNS Administrators,cn=privileges,cn=pbac,$SUFFIX
|
|
||||||
changetype: add
|
|
||||||
objectClass: top
|
|
||||||
objectClass: groupofnames
|
|
||||||
objectClass: nestedgroup
|
|
||||||
cn: DNS Administrators
|
|
||||||
description: DNS Administrators
|
|
||||||
|
|
||||||
dn: cn=DNS Servers,cn=privileges,cn=pbac,$SUFFIX
|
|
||||||
changetype: add
|
|
||||||
objectClass: top
|
|
||||||
objectClass: groupofnames
|
|
||||||
objectClass: nestedgroup
|
|
||||||
cn: DNS Servers
|
|
||||||
description: DNS Servers
|
|
||||||
|
0
install/updates/37-locations.update
Normal file
0
install/updates/37-locations.update
Normal file
@ -274,3 +274,19 @@ default:objectClass: groupofnames
|
|||||||
default:objectClass: top
|
default:objectClass: top
|
||||||
default:cn: Vault Administrators
|
default:cn: Vault Administrators
|
||||||
default:description: Vault Administrators
|
default:description: Vault Administrators
|
||||||
|
|
||||||
|
|
||||||
|
# Locations - always create DNS related privileges
|
||||||
|
dn: cn=DNS Administrators,cn=privileges,cn=pbac,$SUFFIX
|
||||||
|
default:objectClass: top
|
||||||
|
default:objectClass: groupofnames
|
||||||
|
default:objectClass: nestedgroup
|
||||||
|
default:cn: DNS Administrators
|
||||||
|
default:description: DNS Administrators
|
||||||
|
|
||||||
|
dn: cn=DNS Servers,cn=privileges,cn=pbac,$SUFFIX
|
||||||
|
default:objectClass: top
|
||||||
|
default:objectClass: groupofnames
|
||||||
|
default:objectClass: nestedgroup
|
||||||
|
default:cn: DNS Servers
|
||||||
|
default:description: DNS Servers
|
||||||
|
Loading…
Reference in New Issue
Block a user