mirror of
https://salsa.debian.org/freeipa-team/freeipa.git
synced 2024-12-27 17:31:45 -06:00
policy and config sample data
This commit is contained in:
parent
9cb3a07aca
commit
82455fdb12
64
install/static/test/data/aci_find.json
Normal file
64
install/static/test/data/aci_find.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"error": null,
|
||||
"id": 0,
|
||||
"result": {
|
||||
"count": 54,
|
||||
"result": [
|
||||
"(targetattr != \"userPassword || krbPrincipalKey || sambaLMPassword || sambaNTPassword || passwordHistory || krbMKey\")(version 3.0;acl \"Enable Anonymous access\";allow (read,search,compare) userdn = \"ldap:///anyone\";)",
|
||||
"(targetattr != \"userPassword || krbPrincipalKey || sambaLMPassword || sambaNTPassword || passwordHistory || krbMKey || ipaUniqueId\")(version 3.0;acl \"Admin can manage any entry\";allow (all) groupdn = \"ldap:///cn=admins,cn=groupss,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
|
||||
"(targetattr = \"userPassword || krbPrincipalKey || sambaLMPassword || sambaNTPassword\")(version 3.0;acl \"Self can write own password\";allow (write) userdn = \"ldap:///self\";)",
|
||||
"(targetattr = \"userPassword || krbPrincipalKey || sambaLMPassword || sambaNTPassword || passwordHistory\")(version 3.0;acl \"Admins can write passwords\";allow (add,delete,write) groupdn = \"ldap:///cn=admins,cn=groups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
|
||||
"(targetattr = \"userPassword || krbPrincipalKey || sambaLMPassword || sambaNTPassword || passwordHistory\")(version 3.0;acl \"Password change service can read/write passwords\";allow (read,write) userdn = \"ldap:///krbprincipalname=kadmin/changepw@AYOUNG.BOSTON.DEVEL.REDHAT.COM,cn=AYOUNG.BOSTON.DEVEL.REDHAT.COM,cn=kerberos,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
|
||||
"(targetattr = \"userPassword || krbPrincipalKey || krbPasswordExpiration || sambaLMPassword || sambaNTPassword || passwordHistory\")(version 3.0;acl \"KDC System Account can access passwords\";allow (all) userdn = \"ldap:///uid=kdc,cn=sysaccounts,cn=etc,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
|
||||
"(targetattr = \"krbLastSuccessfulAuth || krbLastFailedAuth || krbLoginFailedCount\")(version 3.0;acl \"KDC System Account can update some fields\";allow (write) userdn = \"ldap:///uid=kdc,cn=sysaccounts,cn=etc,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
|
||||
"(targetattr = \"krbPrincipalName || krbCanonicalName || krbUPEnabled || krbMKey || krbTicketPolicyReference || krbPrincipalExpiration || krbPasswordExpiration || krbPwdPolicyReference || krbPrincipalType || krbPwdHistory || krbLastPwdChange || krbPrincipalAliases || krbExtraData || krbLastSuccessfulAuth || krbLastFailedAuth || krbLoginFailedCount\")(version 3.0;acl \"Only the KDC System Account has access to kerberos material\";allow (read,search,compare) userdn = \"ldap:///uid=kdc,cn=sysaccounts,cn=etc,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
|
||||
"(targetattr != \"aci || userPassword || krbPrincipalKey || sambaLMPassword || sambaNTPassword || passwordHistory || ipaUniqueId\")(targetfilter = \"(|(objectClass=person)(objectClass=krbPrincipalAux)(objectClass=posixAccount)(objectClass=groupOfNames)(objectClass=posixGroup))\")(version 3.0;acl \"Account Admins can manage Users and Groups\";allow (add,delete,read,write) groupdn = \"ldap:///cn=admins,cn=groups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
|
||||
"(targetattr = \"krbMaxPwdLife || krbMinPwdLife || krbPwdMinDiffChars || krbPwdMinLength || krbPwdHistoryLength\")(targetfilter = \"(objectClass=krbPwdPolicy)\")(version 3.0;acl \"Admins can write password policies\";allow (read,search,compare,write) groupdn = \"ldap:///cn=admins,cn=groups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
|
||||
"(targetattr = \"givenName || sn || cn || displayName || title || initials || loginShell || gecos || homePhone || mobile || pager || facsimileTelephoneNumber || telephoneNumber || street || roomNumber || l || st || postalCode || manager || secretary || description || carLicense || labeledURI || inetUserHTTPURL || seeAlso || employeeType || businessCategory || ou\")(version 3.0;acl \"Self service\";allow (write) userdn = \"ldap:///self\";)",
|
||||
"(targetattr = \"objectClass\")(target = \"ldap:///cn=certificate status,cn=virtual operations,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Get Certificates status from the CA\";allow (write) groupdn = \"ldap:///cn=certificate_status,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
|
||||
"(target = \"ldap:///cn=*,cn=hostgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Add Hosts\";allow (add) groupdn = \"ldap:///cn=addhostgroups,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
|
||||
"(target = \"ldap:///uid=*,cn=users,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Remove Users\";allow (delete) groupdn = \"ldap:///cn=removeusers,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
|
||||
"(targetattr = \"member\")(target = \"ldap:///cn=*,cn=groups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Modify group membership\";allow (write) groupdn = \"ldap:///cn=modifygroupmembership,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
|
||||
"(target = \"ldap:///krbprincipalname=*,cn=services,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Add Services\";allow (add) groupdn = \"ldap:///cn=addservices,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
|
||||
"(targetattr = \"cn || description\")(target = \"ldap:///cn=*,cn=hostgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Modify Hosts\";allow (write) groupdn = \"ldap:///cn=modifyhostgroups,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
|
||||
"(target = \"ldap:///fqdn=*,cn=computers,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Add Hosts\";allow (add) groupdn = \"ldap:///cn=addhosts,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
|
||||
"(target = \"ldap:///cn=*,cn=groups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Add Groups\";allow (add) groupdn = \"ldap:///cn=addgroups,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
|
||||
"(targetattr = \"cn || description\")(target = \"ldap:///cn=*,cn=rolegroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Modify Roles\";allow (write) groupdn = \"ldap:///cn=modifyroles,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
|
||||
"(targetattr = \"memberhost || externalhost || memberuser || member\")(target = \"ldap:///ipauniqueid=*,cn=ng,cn=alt,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Modify netgroup membership\";allow (write) groupdn = \"ldap:///cn=modifynetgroupmembership,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
|
||||
"(targetattr = \"userCertificate\")(target = \"ldap:///krbprincipalname=*,cn=services,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Modify Services\";allow (write) groupdn = \"ldap:///cn=modifyservices,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
|
||||
"(target = \"ldap:///automountmapname=*,cn=automount,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Remove automount maps\";allow (delete) groupdn = \"ldap:///cn=removeautomount,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
|
||||
"(target = \"ldap:///automountkey=*,automountmapname=*,cn=automount,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Remove automount keys\";allow (delete) groupdn = \"ldap:///cn=removeautomount,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
|
||||
"(target = \"ldap:///krbprincipalname=*,cn=services,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Remove Services\";allow (delete) groupdn = \"ldap:///cn=removeservices,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
|
||||
"(target = \"ldap:///uid=*,cn=users,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Add Users\";allow (add) groupdn = \"ldap:///cn=addusers,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
|
||||
"(targetattr = \"givenName || sn || cn || displayName || title || initials || loginShell || gecos || homePhone || mobile || pager || facsimileTelephoneNumber || telephoneNumber || street || roomNumber || l || st || postalCode || manager || secretary || description || carLicense || labeledURI || inetUserHTTPURL || seeAlso || employeeType || businessCategory || ou || mepManagedEntry || objectclass\")(target = \"ldap:///uid=*,cn=users,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Modify Users\";allow (write) groupdn = \"ldap:///cn=modifyusers,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
|
||||
"(targetattr = \"member\")(target = \"ldap:///cn=ipausers,cn=groups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Add user to default group\";allow (write) groupdn = \"ldap:///cn=add_user_to_default_group,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
|
||||
"(target = \"ldap:///automountkey=*,automountmapname=*,cn=automount,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Add automount keys\";allow (add) groupdn = \"ldap:///cn=addautomount,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
|
||||
"(target = \"ldap:///ipauniqueid=*,cn=entitlements,cn=etc,dc=greyoak,dc=com\")(version 3.0;acl \"Remove entitlement entries\";allow (delete) groupdn = \"ldap:///cn=removeentitlements,cn=taskgroups,cn=accounts,dc=greyoak,dc=com\";)",
|
||||
"(targetattr = \"krbPrincipalName || enrolledBy || objectClass\")(target = \"ldap:///fqdn=*,cn=computers,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Enroll a host\";allow (write) groupdn = \"ldap:///cn=enroll_host,cn=taskgroups, cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
|
||||
"(targetattr = \"userPassword || krbPrincipalKey || sambaLMPassword || sambaNTPassword || passwordHistory\")(version 3.0;acl \"change_password\";allow (write) groupdn = \"ldap:///cn=change_password,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
|
||||
"(target = \"ldap:///ipauniqueid=*,cn=ng,cn=alt,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Remove netgroups\";allow (delete) groupdn = \"ldap:///cn=removenetgroups,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
|
||||
"(targetattr = \"description\")(target = \"ldap:///ipauniqueid=*,cn=ng,cn=alt,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Modify netgroups\";allow (write) groupdn = \"ldap:///cn=modifynetgroups,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
|
||||
"(targetattr = \"member\")(target = \"ldap:///cn=*,cn=rolegroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Modify role group membership\";allow (write) groupdn = \"ldap:///cn=modifyrolegroupmembership,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
|
||||
"(targetattr = \"objectClass\")(target = \"ldap:///cn=request certificate,cn=virtual operations,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Request Certificates from the CA\";allow (write) groupdn = \"ldap:///cn=request_certs,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
|
||||
"(targetattr = \"userCertificate\")(target = \"ldap:///ipauniqueid=*,cn=entitlements,cn=etc,dc=greyoak,dc=com\")(version 3.0;acl \"Modify entitlements\";allow (write) groupdn = \"ldap:///cn=modifyentitlements,cn=taskgroups,cn=accounts,dc=greyoak,dc=com\";)",
|
||||
"(targetattr = \"member\")(target = \"ldap:///cn=*,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Modify task group membership\";allow (write) groupdn = \"ldap:///cn=modifytaskgroupmembership,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
|
||||
"(target = \"ldap:///cn=*,cn=rolegroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Add Roles\";allow (add) groupdn = \"ldap:///cn=addroles,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
|
||||
"(targetattr = \"objectClass\")(target = \"ldap:///cn=certificate remove hold,cn=virtual operations,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Certificate Remove Hold\";allow (write) groupdn = \"ldap:///cn=certificate_remove_hold,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
|
||||
"(target = \"ldap:///cn=*,cn=rolegroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Remove Roles\";allow (delete) groupdn = \"ldap:///cn=removeroles,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
|
||||
"(target = \"ldap:///automountmapname=*,cn=automount,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Add automount maps\";allow (add) groupdn = \"ldap:///cn=addautomount,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
|
||||
"(targetattr = \"cn || description || l || location || nshardwareplatform || nsosversion\")(target = \"ldap:///fqdn=*,cn=computers,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Modify Hosts\";allow (write) groupdn = \"ldap:///cn=modifyhosts,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
|
||||
"(target = \"ldap:///cn=*,cn=hostgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Remove Hosts\";allow (delete) groupdn = \"ldap:///cn=removehostgroups,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
|
||||
"(target = \"ldap:///ipauniqueid=*,cn=ng,cn=alt,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Add netgroups\";allow (add) groupdn = \"ldap:///cn=addnetgroups,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
|
||||
"(target = \"ldap:///fqdn=*,cn=computers,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Remove Hosts\";allow (delete) groupdn = \"ldap:///cn=removehosts,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
|
||||
"(target = \"ldap:///ipauniqueid=*,cn=entitlements,cn=etc,dc=greyoak,dc=com\")(version 3.0;acl \"Add entitlements\";allow (add) groupdn = \"ldap:///cn=addentitlements,cn=taskgroups,cn=accounts,dc=greyoak,dc=com\";)",
|
||||
"(target = \"ldap:///cn=*,cn=groups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Remove Groups\";allow (delete) groupdn = \"ldap:///cn=removegroups,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
|
||||
"(targetattr = \"objectClass\")(target = \"ldap:///cn=retrieve certificate,cn=virtual operations,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Retrieve Certificates from the CA\";allow (write) groupdn = \"ldap:///cn=retrieve_certs,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
|
||||
"(targetattr = \"objectClass\")(target = \"ldap:///cn=revoke certificate,cn=virtual operations,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Revoke Certificate\";allow (write) groupdn = \"ldap:///cn=revoke_certificate,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
|
||||
"(targetattr = \"krbPrincipalKey || krbLastPwdChange\")(target = \"ldap:///fqdn=*,cn=computers,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Manage host keytab\";allow (write) groupdn = \"ldap:///cn=manage_host_keytab,cn=taskgroups, cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
|
||||
"(targetattr = \"cn || description || gidnumber || objectclass || mepManagedBy\")(target = \"ldap:///cn=*,cn=groups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Modify Groups\";allow (write) groupdn = \"ldap:///cn=modifygroups,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
|
||||
"(targetattr = \"member\")(target = \"ldap:///cn=*,cn=hostgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Modify host group membership\";allow (write) groupdn = \"ldap:///cn=modifyhostgroupmembership,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
|
||||
"(targetattr = \"objectClass\")(target = \"ldap:///cn=request certificate different host,cn=virtual operations,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Request Certificates from a different host\";allow (write) groupdn = \"ldap:///cn=request_cert_different_host,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)"
|
||||
],
|
||||
"summary": "54 ACIs matched"
|
||||
}
|
||||
}
|
17
install/static/test/data/automountlocation_find.json
Normal file
17
install/static/test/data/automountlocation_find.json
Normal file
@ -0,0 +1,17 @@
|
||||
{
|
||||
"error": null,
|
||||
"id": 6,
|
||||
"result": {
|
||||
"count": 1,
|
||||
"result": [
|
||||
{
|
||||
"cn": [
|
||||
"default"
|
||||
],
|
||||
"dn": "cn=default,cn=automount,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com"
|
||||
}
|
||||
],
|
||||
"summary": null,
|
||||
"truncated": false
|
||||
}
|
||||
}
|
14
install/static/test/data/automountlocation_show.json
Normal file
14
install/static/test/data/automountlocation_show.json
Normal file
@ -0,0 +1,14 @@
|
||||
{
|
||||
"error": null,
|
||||
"id": 6,
|
||||
"result": {
|
||||
"result": {
|
||||
"cn": [
|
||||
"default"
|
||||
],
|
||||
"dn": "cn=default,cn=automount,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com"
|
||||
},
|
||||
"summary": null,
|
||||
"value": "default"
|
||||
}
|
||||
}
|
41
install/static/test/data/config_show.json
Normal file
41
install/static/test/data/config_show.json
Normal file
@ -0,0 +1,41 @@
|
||||
{
|
||||
"error": null,
|
||||
"id": 6,
|
||||
"result": {
|
||||
"result": {
|
||||
"dn": "cn=ipaconfig,cn=etc,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"ipacertificatesubjectbase": [
|
||||
"O=IPA"
|
||||
],
|
||||
"ipadefaultloginshell": [
|
||||
"/bin/sh"
|
||||
],
|
||||
"ipadefaultprimarygroup": [
|
||||
"ipausers"
|
||||
],
|
||||
"ipagroupsearchfields": [
|
||||
"cn,description"
|
||||
],
|
||||
"ipahomesrootdir": [
|
||||
"/home"
|
||||
],
|
||||
"ipamaxusernamelength": [
|
||||
"8"
|
||||
],
|
||||
"ipamigrationenabled": [
|
||||
"FALSE"
|
||||
],
|
||||
"ipasearchrecordslimit": [
|
||||
"0"
|
||||
],
|
||||
"ipasearchtimelimit": [
|
||||
"2"
|
||||
],
|
||||
"ipausersearchfields": [
|
||||
"uid,givenname,sn,telephonenumber,ou,title"
|
||||
]
|
||||
},
|
||||
"summary": null,
|
||||
"value": ""
|
||||
}
|
||||
}
|
101
install/static/test/data/dns_find.json
Normal file
101
install/static/test/data/dns_find.json
Normal file
@ -0,0 +1,101 @@
|
||||
{
|
||||
"error": null,
|
||||
"id": 0,
|
||||
"result": {
|
||||
"count": 3,
|
||||
"result": [
|
||||
{
|
||||
"dn": "idnsname=ayoung.boston.devel.redhat.com,cn=dns,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"idnsname": [
|
||||
"ayoung.boston.devel.redhat.com"
|
||||
],
|
||||
"idnssoaexpire": [
|
||||
"1209600"
|
||||
],
|
||||
"idnssoaminimum": [
|
||||
"3600"
|
||||
],
|
||||
"idnssoamname": [
|
||||
"ipa.ayoung.boston.devel.redhat.com."
|
||||
],
|
||||
"idnssoarefresh": [
|
||||
"3600"
|
||||
],
|
||||
"idnssoaretry": [
|
||||
"900"
|
||||
],
|
||||
"idnssoarname": [
|
||||
"root.ipa.ayoung.boston.devel.redhat.com."
|
||||
],
|
||||
"idnssoaserial": [
|
||||
"2010061001"
|
||||
],
|
||||
"idnszoneactive": [
|
||||
"TRUE"
|
||||
]
|
||||
},
|
||||
{
|
||||
"dn": "idnsname=122.168.192.in-addr.arpa,cn=dns,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"idnsname": [
|
||||
"122.168.192.in-addr.arpa"
|
||||
],
|
||||
"idnssoaexpire": [
|
||||
"1209600"
|
||||
],
|
||||
"idnssoaminimum": [
|
||||
"3600"
|
||||
],
|
||||
"idnssoamname": [
|
||||
"ipa.ayoung.boston.devel.redhat.com."
|
||||
],
|
||||
"idnssoarefresh": [
|
||||
"3600"
|
||||
],
|
||||
"idnssoaretry": [
|
||||
"900"
|
||||
],
|
||||
"idnssoarname": [
|
||||
"root.122.168.192.in-addr.arpa."
|
||||
],
|
||||
"idnssoaserial": [
|
||||
"2010061001"
|
||||
],
|
||||
"idnszoneactive": [
|
||||
"TRUE"
|
||||
]
|
||||
},
|
||||
{
|
||||
"dn": "idnsname=redhat.com,cn=dns,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"idnsname": [
|
||||
"redhat.com"
|
||||
],
|
||||
"idnssoaexpire": [
|
||||
"1209600"
|
||||
],
|
||||
"idnssoaminimum": [
|
||||
"3600"
|
||||
],
|
||||
"idnssoamname": [
|
||||
"127.0.0.1"
|
||||
],
|
||||
"idnssoarefresh": [
|
||||
"3600"
|
||||
],
|
||||
"idnssoaretry": [
|
||||
"900"
|
||||
],
|
||||
"idnssoarname": [
|
||||
"root.redhat.com."
|
||||
],
|
||||
"idnssoaserial": [
|
||||
"2010061001"
|
||||
],
|
||||
"idnszoneactive": [
|
||||
"TRUE"
|
||||
]
|
||||
}
|
||||
],
|
||||
"summary": null,
|
||||
"truncated": false
|
||||
}
|
||||
}
|
38
install/static/test/data/dns_show.json
Normal file
38
install/static/test/data/dns_show.json
Normal file
@ -0,0 +1,38 @@
|
||||
{
|
||||
"error": null,
|
||||
"id": 0,
|
||||
"result": {
|
||||
"result": {
|
||||
"dn": "idnsname=ayoung.boston.devel.redhat.com,cn=dns,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"idnsname": [
|
||||
"ayoung.boston.devel.redhat.com"
|
||||
],
|
||||
"idnssoaexpire": [
|
||||
"1209600"
|
||||
],
|
||||
"idnssoaminimum": [
|
||||
"3600"
|
||||
],
|
||||
"idnssoamname": [
|
||||
"ipa.ayoung.boston.devel.redhat.com."
|
||||
],
|
||||
"idnssoarefresh": [
|
||||
"3600"
|
||||
],
|
||||
"idnssoaretry": [
|
||||
"900"
|
||||
],
|
||||
"idnssoarname": [
|
||||
"root.ipa.ayoung.boston.devel.redhat.com."
|
||||
],
|
||||
"idnssoaserial": [
|
||||
"2010061001"
|
||||
],
|
||||
"idnszoneactive": [
|
||||
"TRUE"
|
||||
]
|
||||
},
|
||||
"summary": null,
|
||||
"value": "ayoung.boston.devel.redhat.com"
|
||||
}
|
||||
}
|
38
install/static/test/data/hbac_find.json
Normal file
38
install/static/test/data/hbac_find.json
Normal file
@ -0,0 +1,38 @@
|
||||
{
|
||||
"error": null,
|
||||
"id": 6,
|
||||
"result": {
|
||||
"count": 1,
|
||||
"result": [
|
||||
{
|
||||
"accessruletype": [
|
||||
"allow"
|
||||
],
|
||||
"cn": [
|
||||
"allow_all"
|
||||
],
|
||||
"description": [
|
||||
"Allow all users to access any host from any host"
|
||||
],
|
||||
"dn": "ipauniqueid=c943a8cf-d05b-11df-b68f-525400674dcd,cn=hbac,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"hostcategory": [
|
||||
"all"
|
||||
],
|
||||
"ipaenabledflag": [
|
||||
"TRUE"
|
||||
],
|
||||
"servicecategory": [
|
||||
"all"
|
||||
],
|
||||
"sourcehostcategory": [
|
||||
"all"
|
||||
],
|
||||
"usercategory": [
|
||||
"all"
|
||||
]
|
||||
}
|
||||
],
|
||||
"summary": null,
|
||||
"truncated": false
|
||||
}
|
||||
}
|
35
install/static/test/data/hbac_show.json
Normal file
35
install/static/test/data/hbac_show.json
Normal file
@ -0,0 +1,35 @@
|
||||
{
|
||||
"error": null,
|
||||
"id": 6,
|
||||
"result": {
|
||||
"result": {
|
||||
"accessruletype": [
|
||||
"allow"
|
||||
],
|
||||
"cn": [
|
||||
"allow_all"
|
||||
],
|
||||
"description": [
|
||||
"Allow all users to access any host from any host"
|
||||
],
|
||||
"dn": "ipauniqueid=c943a8cf-d05b-11df-b68f-525400674dcd,cn=hbac,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"hostcategory": [
|
||||
"all"
|
||||
],
|
||||
"ipaenabledflag": [
|
||||
"TRUE"
|
||||
],
|
||||
"servicecategory": [
|
||||
"all"
|
||||
],
|
||||
"sourcehostcategory": [
|
||||
"all"
|
||||
],
|
||||
"usercategory": [
|
||||
"all"
|
||||
]
|
||||
},
|
||||
"summary": null,
|
||||
"value": "allow_all"
|
||||
}
|
||||
}
|
@ -149,7 +149,7 @@
|
||||
"objectclass",
|
||||
"aci"
|
||||
],
|
||||
"label": "<automountlocation.label>",
|
||||
"label": "Automount Location",
|
||||
"methods": [
|
||||
"add",
|
||||
"del",
|
||||
@ -2176,7 +2176,7 @@
|
||||
"objectclass",
|
||||
"aci"
|
||||
],
|
||||
"label": "<krbtpolicy.label>",
|
||||
"label": "Kerberos Ticket Policy",
|
||||
"methods": [
|
||||
"mod",
|
||||
"reset",
|
||||
@ -2434,7 +2434,7 @@
|
||||
"objectclass",
|
||||
"aci"
|
||||
],
|
||||
"label": "<pwpolicy.label>",
|
||||
"label": "Password Policy",
|
||||
"methods": [
|
||||
"add",
|
||||
"del",
|
||||
|
17
install/static/test/data/krbtpolicy_show.json
Normal file
17
install/static/test/data/krbtpolicy_show.json
Normal file
@ -0,0 +1,17 @@
|
||||
{
|
||||
"error": null,
|
||||
"id": 6,
|
||||
"result": {
|
||||
"result": {
|
||||
"dn": "cn=ayoung.boston.devel.redhat.com,cn=kerberos,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"krbmaxrenewableage": [
|
||||
"604800"
|
||||
],
|
||||
"krbmaxticketlife": [
|
||||
"86400"
|
||||
]
|
||||
},
|
||||
"summary": null,
|
||||
"value": ""
|
||||
}
|
||||
}
|
72
install/static/test/data/pwpolicy_find.json
Normal file
72
install/static/test/data/pwpolicy_find.json
Normal file
@ -0,0 +1,72 @@
|
||||
{
|
||||
"error": null,
|
||||
"id": 6,
|
||||
"result": {
|
||||
"count": 3,
|
||||
"result": [
|
||||
{
|
||||
"cn": "GLOBAL",
|
||||
"dn": "cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"krbmaxpwdlife": [
|
||||
"90"
|
||||
],
|
||||
"krbminpwdlife": [
|
||||
"1"
|
||||
],
|
||||
"krbpwdhistorylength": [
|
||||
"0"
|
||||
],
|
||||
"krbpwdmindiffchars": [
|
||||
"0"
|
||||
],
|
||||
"krbpwdminlength": [
|
||||
"8"
|
||||
]
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"testgroup12"
|
||||
],
|
||||
"cospriority": [
|
||||
"1"
|
||||
],
|
||||
"dn": "cn=testgroup12,cn=ayoung.boston.devel.redhat.com,cn=kerberos,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"krbmaxpwdlife": [
|
||||
"40"
|
||||
],
|
||||
"krbminpwdlife": [
|
||||
"50"
|
||||
],
|
||||
"krbpwdhistorylength": [
|
||||
"5"
|
||||
],
|
||||
"krbpwdminlength": [
|
||||
"6"
|
||||
]
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"testgroup22"
|
||||
],
|
||||
"cospriority": [
|
||||
"2"
|
||||
],
|
||||
"dn": "cn=testgroup22,cn=ayoung.boston.devel.redhat.com,cn=kerberos,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"krbmaxpwdlife": [
|
||||
"60"
|
||||
],
|
||||
"krbminpwdlife": [
|
||||
"40"
|
||||
],
|
||||
"krbpwdhistorylength": [
|
||||
"8"
|
||||
],
|
||||
"krbpwdminlength": [
|
||||
"9"
|
||||
]
|
||||
}
|
||||
],
|
||||
"summary": null,
|
||||
"truncated": false
|
||||
}
|
||||
}
|
27
install/static/test/data/pwpolicy_show.json
Normal file
27
install/static/test/data/pwpolicy_show.json
Normal file
@ -0,0 +1,27 @@
|
||||
{
|
||||
"error": null,
|
||||
"id": 6,
|
||||
"result": {
|
||||
"result": {
|
||||
"cn": "GLOBAL",
|
||||
"dn": "cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"krbmaxpwdlife": [
|
||||
"90"
|
||||
],
|
||||
"krbminpwdlife": [
|
||||
"1"
|
||||
],
|
||||
"krbpwdhistorylength": [
|
||||
"0"
|
||||
],
|
||||
"krbpwdmindiffchars": [
|
||||
"0"
|
||||
],
|
||||
"krbpwdminlength": [
|
||||
"8"
|
||||
]
|
||||
},
|
||||
"summary": null,
|
||||
"value": ""
|
||||
}
|
||||
}
|
554
install/static/test/data/taskgroup_find.json
Normal file
554
install/static/test/data/taskgroup_find.json
Normal file
@ -0,0 +1,554 @@
|
||||
{
|
||||
"error": null,
|
||||
"id": 6,
|
||||
"result": {
|
||||
"count": 45,
|
||||
"result": [
|
||||
{
|
||||
"cn": [
|
||||
"addusers"
|
||||
],
|
||||
"description": [
|
||||
"Add Users"
|
||||
],
|
||||
"dn": "cn=addusers,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"member_rolegroup": [
|
||||
"useradmin"
|
||||
]
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"change_password"
|
||||
],
|
||||
"description": [
|
||||
"Change a user password"
|
||||
],
|
||||
"dn": "cn=change_password,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"member_rolegroup": [
|
||||
"useradmin"
|
||||
]
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"add_user_to_default_group"
|
||||
],
|
||||
"description": [
|
||||
"Add user to default group"
|
||||
],
|
||||
"dn": "cn=add_user_to_default_group,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"member_rolegroup": [
|
||||
"useradmin"
|
||||
]
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"removeusers"
|
||||
],
|
||||
"description": [
|
||||
"Remove Users"
|
||||
],
|
||||
"dn": "cn=removeusers,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"member_rolegroup": [
|
||||
"useradmin"
|
||||
]
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"modifyusers"
|
||||
],
|
||||
"description": [
|
||||
"Modify Users"
|
||||
],
|
||||
"dn": "cn=modifyusers,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"member_rolegroup": [
|
||||
"useradmin"
|
||||
]
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"addgroups"
|
||||
],
|
||||
"description": [
|
||||
"Add Groups"
|
||||
],
|
||||
"dn": "cn=addgroups,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"member_rolegroup": [
|
||||
"groupadmin"
|
||||
]
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"removegroups"
|
||||
],
|
||||
"description": [
|
||||
"Remove Groups"
|
||||
],
|
||||
"dn": "cn=removegroups,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"member_rolegroup": [
|
||||
"groupadmin"
|
||||
]
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"modifygroups"
|
||||
],
|
||||
"description": [
|
||||
"Modify Groups"
|
||||
],
|
||||
"dn": "cn=modifygroups,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"member_rolegroup": [
|
||||
"groupadmin"
|
||||
]
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"modifygroupmembership"
|
||||
],
|
||||
"description": [
|
||||
"Modify Group membership"
|
||||
],
|
||||
"dn": "cn=modifygroupmembership,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"member_rolegroup": [
|
||||
"groupadmin"
|
||||
]
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"addhosts"
|
||||
],
|
||||
"description": [
|
||||
"Add Hosts"
|
||||
],
|
||||
"dn": "cn=addhosts,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"member_rolegroup": [
|
||||
"hostadmin"
|
||||
]
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"removehosts"
|
||||
],
|
||||
"description": [
|
||||
"Remove Hosts"
|
||||
],
|
||||
"dn": "cn=removehosts,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"member_rolegroup": [
|
||||
"hostadmin"
|
||||
]
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"modifyhosts"
|
||||
],
|
||||
"description": [
|
||||
"Modify Hosts"
|
||||
],
|
||||
"dn": "cn=modifyhosts,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"member_rolegroup": [
|
||||
"hostadmin"
|
||||
]
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"addhostgroups"
|
||||
],
|
||||
"description": [
|
||||
"Add Host Groups"
|
||||
],
|
||||
"dn": "cn=addhostgroups,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"member_rolegroup": [
|
||||
"hostgroupadmin"
|
||||
]
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"removehostgroups"
|
||||
],
|
||||
"description": [
|
||||
"Remove Host Groups"
|
||||
],
|
||||
"dn": "cn=removehostgroups,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"member_rolegroup": [
|
||||
"hostgroupadmin"
|
||||
]
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"modifyhostgroups"
|
||||
],
|
||||
"description": [
|
||||
"Modify Host Groups"
|
||||
],
|
||||
"dn": "cn=modifyhostgroups,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"member_rolegroup": [
|
||||
"hostgroupadmin"
|
||||
]
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"modifyhostgroupmembership"
|
||||
],
|
||||
"description": [
|
||||
"Modify Host Group membership"
|
||||
],
|
||||
"dn": "cn=modifyhostgroupmembership,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"member_rolegroup": [
|
||||
"hostgroupadmin"
|
||||
]
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"addservices"
|
||||
],
|
||||
"description": [
|
||||
"Add Services"
|
||||
],
|
||||
"dn": "cn=addservices,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"member_rolegroup": [
|
||||
"serviceadmin"
|
||||
]
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"removeservices"
|
||||
],
|
||||
"description": [
|
||||
"Remove Services"
|
||||
],
|
||||
"dn": "cn=removeservices,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"member_rolegroup": [
|
||||
"serviceadmin"
|
||||
]
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"addhrole",
|
||||
"addroles"
|
||||
],
|
||||
"description": [
|
||||
"Add Roles"
|
||||
],
|
||||
"dn": "cn=addroles,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"member_rolegroup": [
|
||||
"delegationadmin"
|
||||
]
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"removeroles"
|
||||
],
|
||||
"description": [
|
||||
"Remove Roles"
|
||||
],
|
||||
"dn": "cn=removeroles,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"member_rolegroup": [
|
||||
"delegationadmin"
|
||||
]
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"modifyroles"
|
||||
],
|
||||
"description": [
|
||||
"Modify Roles"
|
||||
],
|
||||
"dn": "cn=modifyroles,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"member_rolegroup": [
|
||||
"delegationadmin"
|
||||
]
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"modifyrolegroupmembership"
|
||||
],
|
||||
"description": [
|
||||
"Modify Role Group membership"
|
||||
],
|
||||
"dn": "cn=modifyrolegroupmembership,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"member_rolegroup": [
|
||||
"delegationadmin"
|
||||
]
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"modifytaskgroupmembership"
|
||||
],
|
||||
"description": [
|
||||
"Modify Task Group membership"
|
||||
],
|
||||
"dn": "cn=modifytaskgroupmembership,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"member_rolegroup": [
|
||||
"delegationadmin"
|
||||
]
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"addautomount"
|
||||
],
|
||||
"description": [
|
||||
"Add Automount maps/keys"
|
||||
],
|
||||
"dn": "cn=addautomount,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"member_rolegroup": [
|
||||
"automountadmin"
|
||||
]
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"removeautomount"
|
||||
],
|
||||
"description": [
|
||||
"Remove Automount maps/keys"
|
||||
],
|
||||
"dn": "cn=removeautomount,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"member_rolegroup": [
|
||||
"automountadmin"
|
||||
]
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"addnetgroups"
|
||||
],
|
||||
"description": [
|
||||
"Add netgroups"
|
||||
],
|
||||
"dn": "cn=addnetgroups,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"member_rolegroup": [
|
||||
"netgroupadmin"
|
||||
]
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"removenetgroups"
|
||||
],
|
||||
"description": [
|
||||
"Remove netgroups"
|
||||
],
|
||||
"dn": "cn=removenetgroups,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"member_rolegroup": [
|
||||
"netgroupadmin"
|
||||
]
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"modifynetgroups"
|
||||
],
|
||||
"description": [
|
||||
"Modify netgroups"
|
||||
],
|
||||
"dn": "cn=modifynetgroups,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"member_rolegroup": [
|
||||
"netgroupadmin"
|
||||
]
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"modifynetgroupmembership"
|
||||
],
|
||||
"description": [
|
||||
"Modify netgroup membership"
|
||||
],
|
||||
"dn": "cn=modifynetgroupmembership,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"member_rolegroup": [
|
||||
"netgroupadmin"
|
||||
]
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"manage_host_keytab"
|
||||
],
|
||||
"description": [
|
||||
"Manage host keytab"
|
||||
],
|
||||
"dn": "cn=manage_host_keytab,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"member_rolegroup": [
|
||||
"hostadmin",
|
||||
"enrollhost"
|
||||
]
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"manage_host_keytab",
|
||||
"update_dns",
|
||||
"update_sn"
|
||||
],
|
||||
"description": [
|
||||
"Updates DNS"
|
||||
],
|
||||
"dn": "cn=update_dns,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"member_rolegroup": [
|
||||
"dnsadmin",
|
||||
"dnsserver"
|
||||
]
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"modifyservices"
|
||||
],
|
||||
"description": [
|
||||
"Modify Services"
|
||||
],
|
||||
"dn": "cn=modifyservices,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"member_rolegroup": [
|
||||
"serviceadmin"
|
||||
]
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"enroll_host"
|
||||
],
|
||||
"description": [
|
||||
"Enroll a host"
|
||||
],
|
||||
"dn": "cn=enroll_host,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"member_rolegroup": [
|
||||
"hostadmin",
|
||||
"enrollhost"
|
||||
]
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"retrieve_certs"
|
||||
],
|
||||
"description": [
|
||||
"Retrieve SSL Certificates"
|
||||
],
|
||||
"dn": "cn=retrieve_certs,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"member_rolegroup": [
|
||||
"certadmin"
|
||||
]
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"request_certs"
|
||||
],
|
||||
"description": [
|
||||
"Request a SSL Certificate"
|
||||
],
|
||||
"dn": "cn=request_certs,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"member_rolegroup": [
|
||||
"certadmin"
|
||||
]
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"request_cert_different_host"
|
||||
],
|
||||
"description": [
|
||||
"Request a SSL Certificate from a different host"
|
||||
],
|
||||
"dn": "cn=request_cert_different_host,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"member_rolegroup": [
|
||||
"certadmin"
|
||||
]
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"certificate_status"
|
||||
],
|
||||
"description": [
|
||||
"Status of cert request"
|
||||
],
|
||||
"dn": "cn=certificate_status,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"member_rolegroup": [
|
||||
"certadmin"
|
||||
]
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"revoke_certificate"
|
||||
],
|
||||
"description": [
|
||||
"Revoke Certificate"
|
||||
],
|
||||
"dn": "cn=revoke_certificate,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"member_rolegroup": [
|
||||
"certadmin"
|
||||
]
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"certificate_remove_hold"
|
||||
],
|
||||
"description": [
|
||||
"Certificate Remove Hold"
|
||||
],
|
||||
"dn": "cn=certificate_remove_hold,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"member_rolegroup": [
|
||||
"certadmin"
|
||||
]
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"managereplica"
|
||||
],
|
||||
"description": [
|
||||
"Manage Replication Agreements"
|
||||
],
|
||||
"dn": "cn=managereplica,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"member_rolegroup": [
|
||||
"replicaadmin"
|
||||
]
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"deletereplica"
|
||||
],
|
||||
"description": [
|
||||
"Delete Replication Agreements"
|
||||
],
|
||||
"dn": "cn=deletereplica,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"member_rolegroup": [
|
||||
"replicaadmin"
|
||||
]
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"addentitlements"
|
||||
],
|
||||
"description": [
|
||||
"Add Entitlements"
|
||||
],
|
||||
"dn": "cn=addentitlements,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"member_rolegroup": [
|
||||
"entitlementadmin"
|
||||
]
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"removeentitlements"
|
||||
],
|
||||
"description": [
|
||||
"Remove Entitlements"
|
||||
],
|
||||
"dn": "cn=removeentitlements,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"member_rolegroup": [
|
||||
"entitlementadmin"
|
||||
]
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"modifyentitlements"
|
||||
],
|
||||
"description": [
|
||||
"Modify Entitlements"
|
||||
],
|
||||
"dn": "cn=modifyentitlements,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"member_rolegroup": [
|
||||
"entitlementadmin"
|
||||
]
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"testtaskgroup"
|
||||
],
|
||||
"description": [
|
||||
"test1"
|
||||
],
|
||||
"dn": "cn=testtaskgroup,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com"
|
||||
}
|
||||
],
|
||||
"summary": "45 grupos de tarea coincidentes",
|
||||
"truncated": false
|
||||
}
|
||||
}
|
Loading…
Reference in New Issue
Block a user