freeipa/install
Nathaniel McCallum 98851256f9 Add support for managedBy to tokens
This also constitutes a rethinking of the token ACIs after the introduction
of SELFDN support.

Admins, as before, have full access to all token permissions.

Normal users have read/search/compare access to all of the non-secret data
for tokens assigned to them, whether managed by them or not. Users can add
tokens if, and only if, they will also manage this token.

Managers can also read/search/compare tokens they manage. Additionally,
they can write non-secret data to their managed tokens and delete them.

When a normal user self-creates a token (the default behavior), then
managedBy is automatically set. When an admin creates a token for another
user (or no owner is assigned at all), then managed by is not set. In this
second case, the token is effectively read-only for the assigned owner.

This behavior enables two important other behaviors. First, an admin can
create a hardware token and assign it to the user as a read-only token.
Second, when the user is deleted, only his self-managed tokens are deleted.
All other (read-only) tokens are instead orphaned. This permits the same
token object to be reasigned to another user without loss of any counter
data.

https://fedorahosted.org/freeipa/ticket/4228
https://fedorahosted.org/freeipa/ticket/4259

Reviewed-By: Jan Cholasta <jcholast@redhat.com>
2014-06-16 10:13:59 +02:00
..
certmonger Support exporting CSRs in dogtag-ipa-ca-renew-agent. 2014-03-25 16:54:56 +01:00
conf Use certmonger D-Bus API to configure certmonger in CA install. 2014-03-25 16:54:54 +01:00
ffextension Kerberos authentication extension makefiles 2012-10-04 18:07:34 -04:00
html webui: remove remnants of jquery-ui 2014-06-10 10:23:22 +02:00
migration webui: remove remnants of jquery-ui 2014-06-10 10:23:22 +02:00
po fix typo in ipa -v migrate-ds 2014-03-21 13:08:03 +01:00
restart_scripts Merge restart_httpd functionality to renew_ra_cert. 2014-03-25 16:54:55 +01:00
share Add support for managedBy to tokens 2014-06-16 10:13:59 +02:00
tools admin tools: Log IPA version 2014-05-27 12:08:55 +02:00
ui Fix --ttl description for DNS zones 2014-06-12 09:57:58 +02:00
updates Add support for managedBy to tokens 2014-06-16 10:13:59 +02:00
wsgi Generate plugin index dynamically 2013-05-06 16:22:30 +02:00
configure.ac RCUE initial commit 2014-01-21 12:04:02 +01:00
Makefile.am Change group ownership of CRL publish directory 2013-07-16 12:17:40 +02:00
README.schema Add some basic rules for adding new schema 2010-08-27 13:40:37 -04:00

Ground rules on adding new schema

Brand new schema, particularly when written specifically for IPA, should be
added in share/*.ldif. Any new files need to be explicitly loaded in
ipaserver/install/dsinstance.py. These simply get copied directly into
the new instance schema directory.

Existing schema (e.g. in an LDAP draft) may either be added as a separate
ldif in share or as an update in the updates directory. The advantage of
adding the schema as an update is if 389-ds ever adds the schema then the
installation won't fail due to existing schema failing to load during
bootstrap.

If the new schema requires a new container then this should be added
to install/bootstrap-template.ldif.