mirror of
https://salsa.debian.org/freeipa-team/freeipa.git
synced 2025-02-25 18:55:28 -06:00
Convert Role default permissions to managed
Part of the work for: https://fedorahosted.org/freeipa/ticket/4346 Reviewed-By: Martin Kosek <mkosek@redhat.com>
This commit is contained in:
parent
f881f06364
commit
820a60420d
8
ACI.txt
8
ACI.txt
@ -146,8 +146,16 @@ dn: cn=System: Read Group Password Policy,cn=permissions,cn=pbac,dc=ipa,dc=examp
|
|||||||
aci: (targetattr = "cn || cospriority || krbmaxpwdlife || krbminpwdlife || krbpwdfailurecountinterval || krbpwdhistorylength || krbpwdlockoutduration || krbpwdmaxfailure || krbpwdmindiffchars || krbpwdminlength || objectclass")(targetfilter = "(objectclass=krbpwdpolicy)")(version 3.0;acl "permission:System: Read Group Password Policy";allow (compare,read,search) groupdn = "ldap:///cn=System: Read Group Password Policy,cn=permissions,cn=pbac,dc=ipa,dc=example";)
|
aci: (targetattr = "cn || cospriority || krbmaxpwdlife || krbminpwdlife || krbpwdfailurecountinterval || krbpwdhistorylength || krbpwdlockoutduration || krbpwdmaxfailure || krbpwdmindiffchars || krbpwdminlength || objectclass")(targetfilter = "(objectclass=krbpwdpolicy)")(version 3.0;acl "permission:System: Read Group Password Policy";allow (compare,read,search) groupdn = "ldap:///cn=System: Read Group Password Policy,cn=permissions,cn=pbac,dc=ipa,dc=example";)
|
||||||
dn: cn=System: Read Realm Domains,cn=permissions,cn=pbac,dc=ipa,dc=example
|
dn: cn=System: Read Realm Domains,cn=permissions,cn=pbac,dc=ipa,dc=example
|
||||||
aci: (targetattr = "associateddomain || cn || objectclass")(targetfilter = "(objectclass=domainrelatedobject)")(version 3.0;acl "permission:System: Read Realm Domains";allow (compare,read,search) userdn = "ldap:///all";)
|
aci: (targetattr = "associateddomain || cn || objectclass")(targetfilter = "(objectclass=domainrelatedobject)")(version 3.0;acl "permission:System: Read Realm Domains";allow (compare,read,search) userdn = "ldap:///all";)
|
||||||
|
dn: cn=System: Add Roles,cn=permissions,cn=pbac,dc=ipa,dc=example
|
||||||
|
aci: (targetfilter = "(objectclass=groupofnames)")(version 3.0;acl "permission:System: Add Roles";allow (add) groupdn = "ldap:///cn=System: Add Roles,cn=permissions,cn=pbac,dc=ipa,dc=example";)
|
||||||
|
dn: cn=System: Modify Role Membership,cn=permissions,cn=pbac,dc=ipa,dc=example
|
||||||
|
aci: (targetattr = "member")(targetfilter = "(objectclass=groupofnames)")(version 3.0;acl "permission:System: Modify Role Membership";allow (write) groupdn = "ldap:///cn=System: Modify Role Membership,cn=permissions,cn=pbac,dc=ipa,dc=example";)
|
||||||
|
dn: cn=System: Modify Roles,cn=permissions,cn=pbac,dc=ipa,dc=example
|
||||||
|
aci: (targetattr = "cn || description")(targetfilter = "(objectclass=groupofnames)")(version 3.0;acl "permission:System: Modify Roles";allow (write) groupdn = "ldap:///cn=System: Modify Roles,cn=permissions,cn=pbac,dc=ipa,dc=example";)
|
||||||
dn: cn=System: Read Roles,cn=permissions,cn=pbac,dc=ipa,dc=example
|
dn: cn=System: Read Roles,cn=permissions,cn=pbac,dc=ipa,dc=example
|
||||||
aci: (targetattr = "businesscategory || cn || description || member || memberhost || memberof || memberuser || o || objectclass || ou || owner || seealso")(targetfilter = "(objectclass=groupofnames)")(version 3.0;acl "permission:System: Read Roles";allow (compare,read,search) groupdn = "ldap:///cn=System: Read Roles,cn=permissions,cn=pbac,dc=ipa,dc=example";)
|
aci: (targetattr = "businesscategory || cn || description || member || memberhost || memberof || memberuser || o || objectclass || ou || owner || seealso")(targetfilter = "(objectclass=groupofnames)")(version 3.0;acl "permission:System: Read Roles";allow (compare,read,search) groupdn = "ldap:///cn=System: Read Roles,cn=permissions,cn=pbac,dc=ipa,dc=example";)
|
||||||
|
dn: cn=System: Remove Roles,cn=permissions,cn=pbac,dc=ipa,dc=example
|
||||||
|
aci: (targetfilter = "(objectclass=groupofnames)")(version 3.0;acl "permission:System: Remove Roles";allow (delete) groupdn = "ldap:///cn=System: Remove Roles,cn=permissions,cn=pbac,dc=ipa,dc=example";)
|
||||||
dn: cn=System: Read SELinux User Maps,cn=permissions,cn=pbac,dc=ipa,dc=example
|
dn: cn=System: Read SELinux User Maps,cn=permissions,cn=pbac,dc=ipa,dc=example
|
||||||
aci: (targetattr = "accesstime || cn || description || hostcategory || ipaenabledflag || ipaselinuxuser || ipauniqueid || member || memberhost || memberuser || objectclass || seealso || usercategory")(targetfilter = "(objectclass=ipaselinuxusermap)")(version 3.0;acl "permission:System: Read SELinux User Maps";allow (compare,read,search) userdn = "ldap:///all";)
|
aci: (targetattr = "accesstime || cn || description || hostcategory || ipaenabledflag || ipaselinuxuser || ipauniqueid || member || memberhost || memberuser || objectclass || seealso || usercategory")(targetfilter = "(objectclass=ipaselinuxusermap)")(version 3.0;acl "permission:System: Read SELinux User Maps";allow (compare,read,search) userdn = "ldap:///all";)
|
||||||
dn: cn=System: Read Services,cn=permissions,cn=pbac,dc=ipa,dc=example
|
dn: cn=System: Read Services,cn=permissions,cn=pbac,dc=ipa,dc=example
|
||||||
|
@ -159,40 +159,6 @@ objectClass: ipapermission
|
|||||||
cn: Modify Services
|
cn: Modify Services
|
||||||
member: cn=Service Administrators,cn=privileges,cn=pbac,$SUFFIX
|
member: cn=Service Administrators,cn=privileges,cn=pbac,$SUFFIX
|
||||||
|
|
||||||
# Delegation administration
|
|
||||||
|
|
||||||
dn: cn=Add Roles,cn=permissions,cn=pbac,$SUFFIX
|
|
||||||
changetype: add
|
|
||||||
objectClass: top
|
|
||||||
objectClass: groupofnames
|
|
||||||
objectClass: ipapermission
|
|
||||||
cn: Add Roles
|
|
||||||
member: cn=Delegation Administrator,cn=privileges,cn=pbac,$SUFFIX
|
|
||||||
|
|
||||||
dn: cn=Remove Roles,cn=permissions,cn=pbac,$SUFFIX
|
|
||||||
changetype: add
|
|
||||||
objectClass: top
|
|
||||||
objectClass: groupofnames
|
|
||||||
objectClass: ipapermission
|
|
||||||
cn: Remove Roles
|
|
||||||
member: cn=Delegation Administrator,cn=privileges,cn=pbac,$SUFFIX
|
|
||||||
|
|
||||||
dn: cn=Modify Roles,cn=permissions,cn=pbac,$SUFFIX
|
|
||||||
changetype: add
|
|
||||||
objectClass: top
|
|
||||||
objectClass: groupofnames
|
|
||||||
objectClass: ipapermission
|
|
||||||
cn: Modify Roles
|
|
||||||
member: cn=Delegation Administrator,cn=privileges,cn=pbac,$SUFFIX
|
|
||||||
|
|
||||||
dn: cn=Modify Role membership,cn=permissions,cn=pbac,$SUFFIX
|
|
||||||
changetype: add
|
|
||||||
objectClass: top
|
|
||||||
objectClass: groupofnames
|
|
||||||
objectClass: ipapermission
|
|
||||||
cn: Modify Role membership
|
|
||||||
member: cn=Delegation Administrator,cn=privileges,cn=pbac,$SUFFIX
|
|
||||||
|
|
||||||
dn: cn=Manage service keytab,cn=permissions,cn=pbac,$SUFFIX
|
dn: cn=Manage service keytab,cn=permissions,cn=pbac,$SUFFIX
|
||||||
changetype: add
|
changetype: add
|
||||||
objectClass: top
|
objectClass: top
|
||||||
@ -257,16 +223,6 @@ aci: (target = "ldap:///krbprincipalname=*,cn=services,cn=accounts,$SUFFIX")(ver
|
|||||||
aci: (target = "ldap:///krbprincipalname=*,cn=services,cn=accounts,$SUFFIX")(version 3.0;acl "permission:Remove Services";allow (delete) groupdn = "ldap:///cn=Remove Services,cn=permissions,cn=pbac,$SUFFIX";)
|
aci: (target = "ldap:///krbprincipalname=*,cn=services,cn=accounts,$SUFFIX")(version 3.0;acl "permission:Remove Services";allow (delete) groupdn = "ldap:///cn=Remove Services,cn=permissions,cn=pbac,$SUFFIX";)
|
||||||
aci: (targetattr = "usercertificate")(target = "ldap:///krbprincipalname=*,cn=services,cn=accounts,$SUFFIX")(version 3.0;acl "permission:Modify Services";allow (write) groupdn = "ldap:///cn=Modify Services,cn=permissions,cn=pbac,$SUFFIX";)
|
aci: (targetattr = "usercertificate")(target = "ldap:///krbprincipalname=*,cn=services,cn=accounts,$SUFFIX")(version 3.0;acl "permission:Modify Services";allow (write) groupdn = "ldap:///cn=Modify Services,cn=permissions,cn=pbac,$SUFFIX";)
|
||||||
|
|
||||||
# Delegation administration
|
|
||||||
|
|
||||||
dn: $SUFFIX
|
|
||||||
changetype: modify
|
|
||||||
add: aci
|
|
||||||
aci: (target = "ldap:///cn=*,cn=roles,cn=accounts,$SUFFIX")(version 3.0;acl "permission:Add Roles";allow (add) groupdn = "ldap:///cn=Add Roles,cn=permissions,cn=pbac,$SUFFIX";)
|
|
||||||
aci: (target = "ldap:///cn=*,cn=roles,cn=accounts,$SUFFIX")(version 3.0;acl "permission:Remove Roles";allow (delete) groupdn = "ldap:///cn=Remove Roles,cn=permissions,cn=pbac,$SUFFIX";)
|
|
||||||
aci: (targetattr = "cn || description")(target = "ldap:///cn=*,cn=roles,cn=accounts,$SUFFIX")(version 3.0; acl "permission:Modify Roles";allow (write) groupdn = "ldap:///cn=Modify Roles,cn=permissions,cn=pbac,$SUFFIX";)
|
|
||||||
aci: (targetattr = "member")(target = "ldap:///cn=*,cn=roles,cn=accounts,$SUFFIX")(version 3.0;acl "permission:Modify Role membership";allow (write) groupdn = "ldap:///cn=Modify Role membership,cn=permissions,cn=pbac,$SUFFIX";)
|
|
||||||
|
|
||||||
# Service keytab admin
|
# Service keytab admin
|
||||||
|
|
||||||
dn: $SUFFIX
|
dn: $SUFFIX
|
||||||
|
@ -93,6 +93,36 @@ class role(LDAPObject):
|
|||||||
},
|
},
|
||||||
'default_privileges': {'RBAC Readers'},
|
'default_privileges': {'RBAC Readers'},
|
||||||
},
|
},
|
||||||
|
'System: Add Roles': {
|
||||||
|
'ipapermright': {'add'},
|
||||||
|
'replaces': [
|
||||||
|
'(target = "ldap:///cn=*,cn=roles,cn=accounts,$SUFFIX")(version 3.0;acl "permission:Add Roles";allow (add) groupdn = "ldap:///cn=Add Roles,cn=permissions,cn=pbac,$SUFFIX";)',
|
||||||
|
],
|
||||||
|
'default_privileges': {'Delegation Administrator'},
|
||||||
|
},
|
||||||
|
'System: Modify Role Membership': {
|
||||||
|
'ipapermright': {'write'},
|
||||||
|
'ipapermdefaultattr': {'member'},
|
||||||
|
'replaces': [
|
||||||
|
'(targetattr = "member")(target = "ldap:///cn=*,cn=roles,cn=accounts,$SUFFIX")(version 3.0;acl "permission:Modify Role membership";allow (write) groupdn = "ldap:///cn=Modify Role membership,cn=permissions,cn=pbac,$SUFFIX";)',
|
||||||
|
],
|
||||||
|
'default_privileges': {'Delegation Administrator'},
|
||||||
|
},
|
||||||
|
'System: Modify Roles': {
|
||||||
|
'ipapermright': {'write'},
|
||||||
|
'ipapermdefaultattr': {'cn', 'description'},
|
||||||
|
'replaces': [
|
||||||
|
'(targetattr = "cn || description")(target = "ldap:///cn=*,cn=roles,cn=accounts,$SUFFIX")(version 3.0; acl "permission:Modify Roles";allow (write) groupdn = "ldap:///cn=Modify Roles,cn=permissions,cn=pbac,$SUFFIX";)',
|
||||||
|
],
|
||||||
|
'default_privileges': {'Delegation Administrator'},
|
||||||
|
},
|
||||||
|
'System: Remove Roles': {
|
||||||
|
'ipapermright': {'delete'},
|
||||||
|
'replaces': [
|
||||||
|
'(target = "ldap:///cn=*,cn=roles,cn=accounts,$SUFFIX")(version 3.0;acl "permission:Remove Roles";allow (delete) groupdn = "ldap:///cn=Remove Roles,cn=permissions,cn=pbac,$SUFFIX";)',
|
||||||
|
],
|
||||||
|
'default_privileges': {'Delegation Administrator'},
|
||||||
|
},
|
||||||
}
|
}
|
||||||
|
|
||||||
label = _('Roles')
|
label = _('Roles')
|
||||||
|
Loading…
Reference in New Issue
Block a user