mirror of
https://salsa.debian.org/freeipa-team/freeipa.git
synced 2025-02-25 18:55:28 -06:00
Add explicit syntax language to code blocks
m2r converts code blocks into ReST code blocks with syntax highlighting. Auto-detection of the language does not work correctly, though. Explicitly set the language for console, ini, and Python blocks. Signed-off-by: Christian Heimes <cheimes@redhat.com> Reviewed-by: Alexander Bokovoy <abokovoy@redhat.com>
This commit is contained in:
parent
a9a225d715
commit
9f2553c64f
@ -173,7 +173,7 @@ As result of it, SMB attributes are not available at `ipa user-add` or
|
||||
`ipa stageuser-add` level. Instead, it is possible to modify a user object with
|
||||
`ipa user-mod` or `ipa stageuser-mod` commands:
|
||||
|
||||
```
|
||||
```console
|
||||
$ ipa user-mod --help
|
||||
Usage: ipa [global-options] user-mod LOGIN [options]
|
||||
|
||||
@ -216,7 +216,7 @@ By default, POSIX attribute can only be searched by LDAP clients in
|
||||
Since SMB service belongs to `cn=services,cn=accounts,$basedn` subtree, new ACI
|
||||
has to be added.
|
||||
|
||||
```
|
||||
```python
|
||||
'System: Read POSIX details of the SMB services': {
|
||||
'replaces_global_anonymous_aci': True,
|
||||
'ipapermbindruletype': 'all',
|
||||
|
@ -142,14 +142,14 @@ Next steps should be performed on the client itself. With the support for Samba
|
||||
domain member enabled, IPA masters allow creation of the required records with
|
||||
the host credentials (`host/${hostname}`).
|
||||
|
||||
```
|
||||
```console
|
||||
# kinit -k
|
||||
```
|
||||
|
||||
1. Retrieve information about Security Identifier and NetBIOS name of the IPA
|
||||
domain:
|
||||
|
||||
```
|
||||
```console
|
||||
# kinit -k
|
||||
# ipa trustconfig-show --raw
|
||||
cn: ipa.realm
|
||||
@ -168,14 +168,14 @@ the host credentials (`host/${hostname}`).
|
||||
: IPA domain's SID (security identifier)
|
||||
|
||||
`ipaflatname`
|
||||
: IPA domain's NetBIOS name, `${netbios_name}, also known as the flat name in Active Directory
|
||||
: IPA domain's NetBIOS name, `${netbios_name}`, also known as the flat name in Active Directory
|
||||
|
||||
`ipantdomainguid`
|
||||
: IPA domain's globally unique identifier (GUID)
|
||||
|
||||
2. Retrieve ID range information for the IPA domain and other trusted domains:
|
||||
|
||||
```
|
||||
```console
|
||||
# ipa idrange-find --raw
|
||||
----------------
|
||||
2 ranges matched
|
||||
@ -203,7 +203,7 @@ the host credentials (`host/${hostname}`).
|
||||
set for specific domains. For each such range, a pair of (range start, range
|
||||
end) values will need to be calculated:
|
||||
|
||||
```
|
||||
```ini
|
||||
${range_id_min} = ipabaseid
|
||||
${range_id_max} = ipabaseid + ipaidrangesize - 1
|
||||
```
|
||||
@ -216,7 +216,7 @@ the host credentials (`host/${hostname}`).
|
||||
a sequence of `ipa service-add` and `ipa service-mod` commands cannot be used
|
||||
instead.
|
||||
|
||||
```
|
||||
```console
|
||||
# ipa service-add-smb <hostname> [<NetBIOS name>]
|
||||
```
|
||||
|
||||
@ -232,7 +232,7 @@ the host credentials (`host/${hostname}`).
|
||||
enough for a machine account password. The code used by the
|
||||
`ipa-client-samba` utility is equivalent for the following call:
|
||||
|
||||
```
|
||||
```console
|
||||
# python3 -c 'import samba; print(samba.generate_random_password(128, 255))'
|
||||
```
|
||||
|
||||
@ -244,7 +244,7 @@ the host credentials (`host/${hostname}`).
|
||||
to [MS-NRPC] section 3.1.4.3.1. The code used by the `ipa-client-samba`
|
||||
utility is equivalent for the following call:
|
||||
|
||||
```
|
||||
```console
|
||||
# ipa-getkeytab -p cifs/<hostname> -k /etc/samba/samba.keytab -P \
|
||||
-e aes128-cts-hmac-sha1-96,aes256-cts-hmac-sha1-96,arcfour-hmac
|
||||
```
|
||||
@ -260,7 +260,7 @@ the host credentials (`host/${hostname}`).
|
||||
|
||||
6. Create Samba config as `/etc/samba/smb.conf` on the client:
|
||||
|
||||
```
|
||||
```ini
|
||||
[global]
|
||||
# Limit number of forked processes to avoid SMBLoris attack
|
||||
max smbd processes = 1000
|
||||
@ -309,7 +309,7 @@ the host credentials (`host/${hostname}`).
|
||||
that the POSIX path specified in the share actually allows write access to
|
||||
the users or groups from the `write list`:
|
||||
|
||||
```
|
||||
```ini
|
||||
[shared]
|
||||
path = /srv/shared
|
||||
read only = No
|
||||
@ -327,7 +327,7 @@ the host credentials (`host/${hostname}`).
|
||||
`smb.conf`. Instead, it is stored in the binary databases managed by Samba.
|
||||
It can be set through `net setdomainsid` command:
|
||||
|
||||
```
|
||||
```console
|
||||
# net setdomainsid ${ipantsecurityidentifier}
|
||||
```
|
||||
|
||||
@ -335,7 +335,7 @@ the host credentials (`host/${hostname}`).
|
||||
POSIX groups. It is typically mapped to a local nobody group. This is
|
||||
required in all recent Samba releases:
|
||||
|
||||
```
|
||||
```console
|
||||
# net groupmap add sid=S-1-5-32-546 unixgroup=nobody type=builtin
|
||||
```
|
||||
|
||||
@ -351,7 +351,7 @@ the host credentials (`host/${hostname}`).
|
||||
procedure has to be used. The procedure employs low-level tools to
|
||||
manipulate Samba TDB databases:
|
||||
|
||||
```
|
||||
```console
|
||||
# tdbtool /var/lib/samba/private/secrets.tdb store SECRETS/MACHINE_LAST_CHANGE_TIME/${netbios_name} '2\00'
|
||||
# tdbtool /var/lib/samba/private/secrets.tdb store SECRETS/MACHINE_PASSWORD/${netbios_name} '2\00'
|
||||
# net changesecretpw -f
|
||||
@ -366,7 +366,7 @@ the host credentials (`host/${hostname}`).
|
||||
all fallback code for the cases when `winbindd` was not running in some
|
||||
configurations was removed from `smbd` daemon in newer Samba releases.
|
||||
|
||||
```
|
||||
```console
|
||||
# systemctl start smb winbind
|
||||
```
|
||||
|
||||
@ -378,7 +378,7 @@ started, one can access a Samba share as a user from IPA domain. Below is an
|
||||
example from the test run of `ipatests/test_integration/test_smb.py` done by PR
|
||||
CI.
|
||||
|
||||
```
|
||||
```console
|
||||
# kinit athena
|
||||
Password for athena@IPA.TEST:
|
||||
# mkdir -p /mnt/athena
|
||||
|
@ -84,7 +84,7 @@ replica. First the services must be moved to another replica with
|
||||
The ``ipa config-show`` command now shows additional information about
|
||||
DNS and KRA as well as hidden servers:
|
||||
|
||||
```
|
||||
```console
|
||||
$ ipa config-show
|
||||
...
|
||||
IPA masters: server1.ipa.example
|
||||
|
@ -30,7 +30,7 @@ the mechanisms associated with those auth indicators to obtain a ticket.
|
||||
By defining a white list of authentication indicators to a service, we can allow a user to use the service
|
||||
only if the user obtained a ticket with at least one of those indicators included.
|
||||
|
||||
#### Note
|
||||
### Note
|
||||
|
||||
For unattended services (services that is a part of the IPA core system), the authentication indicator should not be set,
|
||||
or it may break the whole system. Examples for such services are `HTTP/*` (for webUI and IPA API end-points),
|
||||
|
@ -52,7 +52,7 @@ and writable by everybody with ``System: Modify Groups`` /
|
||||
|
||||
Add example user and groups:
|
||||
|
||||
```
|
||||
```console
|
||||
$ kinit admin
|
||||
$ ipa user-add john --first John --last Doe --random
|
||||
$ ipa user-add tom --first Tom --last Doe --random
|
||||
@ -62,14 +62,14 @@ $ ipa group-add project_admins
|
||||
|
||||
Make user and group member managers:
|
||||
|
||||
```
|
||||
```console
|
||||
$ ipa group-add-member-manager project --users=john
|
||||
$ ipa group-add-member-manager project --groups=project_admins
|
||||
```
|
||||
|
||||
Show group:
|
||||
|
||||
```
|
||||
```console
|
||||
$ ipa group-show project
|
||||
Group name: project
|
||||
GID: 787600003
|
||||
@ -79,7 +79,7 @@ $ ipa group-show project
|
||||
|
||||
Find groups by member managers:
|
||||
|
||||
```
|
||||
```console
|
||||
$ ipa group-find --membermanager-users=john
|
||||
---------------
|
||||
1 group matched
|
||||
@ -102,7 +102,7 @@ Number of entries returned 1
|
||||
|
||||
Use member management capability:
|
||||
|
||||
```
|
||||
```console
|
||||
$ kinit john
|
||||
$ ipa group-add-member project --users=tom
|
||||
Group name: project
|
||||
@ -117,7 +117,7 @@ Number of members added 1
|
||||
|
||||
Remove member management capability:
|
||||
|
||||
```
|
||||
```console
|
||||
$ kinit admin
|
||||
$ ipa group-remove-member-manager project --groups=project_admins
|
||||
Group name: project
|
||||
|
Loading…
Reference in New Issue
Block a user