mirror of
https://salsa.debian.org/freeipa-team/freeipa.git
synced 2024-12-24 16:10:02 -06:00
4911a3f055
It was found that if an account was created with a name corresponding to an account local to a system, such as 'root', was created via IPA, such account could access any enrolled machine with that account, and the local system privileges. This also bypass the absence of explicit HBAC rules. root principal alias ------------------- The principal "root@REALM" is now a Kerberos principal alias for "admin". This prevent user with "User Administrator" role or "System: Add User" privilege to create an account with "root" principal name. Modified user permissions ------------------------- Several user permissions no longer apply to admin users and filter on posixaccount object class. This prevents user managers from modifying admin acounts. - System: Manage User Certificates - System: Manage User Principals - System: Manage User SSH Public Keys - System: Modify Users - System: Remove Users - System: Unlock user ``System: Unlock User`` is restricted because the permission also allow a user manager to lock an admin account. ``System: Modify Users`` is restricted to prevent user managers from changing login shell or notification channels (mail, mobile) of admin accounts. New user permission ------------------- - System: Change Admin User password The new permission allows manipulation of admin user password fields. By default only the ``PassSync Service`` privilege is allowed to modify admin user password fields. Modified group permissions -------------------------- Group permissions are now restricted as well. Group admins can no longer modify the admins group and are limited to groups with object class ``ipausergroup``. - System: Modify Groups - System: Remove Groups The permission ``System: Modify Group Membership`` was already limited. Notes ----- Admin users are mostly unaffected by the new restrictions, except for the fact that admins can no longer change krbPrincipalAlias of another admin or manipulate password fields directly. Commands like ``ipa passwd otheradmin`` still work, though. The ACI ``Admin can manage any entry`` allows admins to modify other entries and most attributes. Managed permissions don't install ``obj.permission_filter_objectclasses`` when ``ipapermtargetfilter`` is set. Group and user objects now have a ``permission_filter_objectclasses_string`` attribute that is used by new target filters. Misc changes ------------ Also add new exception AlreadyContainsValueError. BaseLDAPAddAttribute was raising a generic base class for LDAP execution errors. Fixes: https://pagure.io/freeipa/issue/8326 Fixes: https://bugzilla.redhat.com/show_bug.cgi?id=1810160 Signed-off-by: Christian Heimes <cheimes@redhat.com> Reviewed-By: Alexander Bokovoy <abokovoy@redhat.com> Reviewed-By: Rob Crittenden <rcritten@redhat.com> Reviewed-By: Florence Blanc-Renaud <flo@redhat.com> |
||
---|---|---|
.. | ||
advise | ||
profiles | ||
schema.d | ||
05rfc2247.ldif | ||
15rfc2307bis.ldif | ||
15rfc4876.ldif | ||
60basev2.ldif | ||
60basev3.ldif | ||
60certificate-profiles.ldif | ||
60ipaconfig.ldif | ||
60ipadns.ldif | ||
60ipapk11.ldif | ||
60kerberos.ldif | ||
60samba.ldif | ||
61kerberos-ipav3.ldif | ||
65ipacertstore.ldif | ||
65ipasudo.ldif | ||
70ipaotp.ldif | ||
70topology.ldif | ||
71idviews.ldif | ||
72domainlevels.ldif | ||
73certmap.ldif | ||
anon-princ-aci.ldif | ||
automember.ldif | ||
bind.ipa-ext.conf.template | ||
bind.ipa-options-ext.conf.template | ||
bind.named.conf.template | ||
bootstrap-template.ldif | ||
ca-topology.uldif | ||
certmap.conf.template | ||
custodia.conf.template | ||
default-aci.ldif | ||
default-hbac.ldif | ||
default-smb-group.ldif | ||
default-trust-view.ldif | ||
delegation.ldif | ||
dna.ldif | ||
dns.ldif | ||
dnssec.ldif | ||
domainlevel.ldif | ||
ds-ipa-env.conf.template | ||
ds-nfiles.ldif | ||
entryusn.ldif | ||
freeipa-server.template | ||
gssapi.login | ||
gssproxy.conf.template | ||
host_nis_groups.ldif | ||
indices.ldif | ||
ipa-httpd-wsgi.conf.template | ||
ipa-httpd.conf.template | ||
ipa-kdc-proxy.conf.template | ||
ipa-pki-proxy.conf.template | ||
ipa-rewrite.conf.template | ||
ipa.conf.template | ||
ipaca_customize.ini | ||
ipaca_default.ini | ||
ipaca_softhsm2.ini | ||
ipakrb5.aug | ||
kdc_extensions.template | ||
kdc_req.conf.template | ||
kdc.conf.template | ||
kdcproxy-disable.uldif | ||
kdcproxy-enable.uldif | ||
kdcproxy.conf | ||
kdcproxy.wsgi | ||
kerberos.ldif | ||
krb5.conf.template | ||
krb5.ini.template | ||
krb.con.template | ||
krbrealm.con.template | ||
Makefile.am | ||
managed-entries.ldif | ||
master-entry.ldif | ||
memberof-conf.ldif | ||
memberof-task.ldif | ||
memcache-remove.uldif | ||
modrdn-krbprinc.ldif | ||
nis-update.uldif | ||
nis.uldif | ||
opendnssec_conf.template | ||
opendnssec_kasp.template | ||
pw-logging-conf.ldif | ||
referint-conf.ldif | ||
replica-acis.ldif | ||
replica-automember.ldif | ||
replica-prevent-time-skew.ldif | ||
repoint-managed-entries.ldif | ||
root-autobind.ldif | ||
sasl-mapping-fallback.ldif | ||
schema-update.ldif | ||
smb.conf.empty | ||
smb.conf.template | ||
sudobind.ldif | ||
topology-entries.ldif | ||
unique-attributes.ldif | ||
user_private_groups.ldif | ||
uuid.ldif | ||
vault.ldif | ||
wsgi.py |