On Thu, 2014-04-24 at 15:18 +0200, Martin Kosek wrote: > On 04/24/2014 02:28 PM, Simo Sorce wrote: > > On Thu, 2014-04-24 at 14:17 +0200, Martin Kosek wrote: > >> On 04/24/2014 09:41 AM, Petr Viktorin wrote: > >>> On 04/23/2014 08:56 PM, Simo Sorce wrote: > >>>> On Wed, 2014-04-23 at 20:37 +0200, Petr Viktorin wrote: > >>>>> Admin access to read-only attributes such as ipaUniqueId, memberOf, > >>>>> krbPrincipalName is provided by the anonymous read ACI, which will go > >>>>> away. This patch adds a blanket read ACI for these. > >>>>> I also moved some related ACIs to 20-aci.update. > >>>>> > >>>>> Previously krbPwdHistory was also readable by admins. I don't think we > >>>>> want to include that. > >>>>> Simo, should admins be allowed to read krbExtraData? > >>>> > >>>> Probably not necessary but there is nothing secret in it either. > >>>> > >>>> Simo. > >>> > >>> OK. I'm not a fan of hiding things from the admin, so no changes to the > >>> patch > >>> are necessary here. > >>> > >> > >> 536: > >> As we are touching these ACIs, may it is a time to see the blacklist of > >> attributes that admin cannot write and check if this is still wanted: > >> > >> ipaUniqueId - OK, generated by DS plugin > >> memberOf - OK, generated by DS plugin > >> serverHostName - I did not even find a place where we manipulate it, except > >> host.py -> remove from blacklist? > > What about this one?
not sure, I did not work much on the hosts objects. > >> enrolledBy - OK, generated by DS plugin > >> krbExtraData - OK, generated by DS plugin > >> krbPrincipalName - why can't admin change it? It is filled by framework, I > >> would not personally blacklist it > > > > It is changed by the ipa rename plugin when the user uid change, that's > > why we prevent the admin from explicitly change it. > > > >> krbCanonicalName - same as krbPrincipalName > > Ok, in that case krbPrincipalName and krbCanonicalName should stay, right? They should be accessible by admin, yes. > >> krbPrincipalAliases - same as krbPrincipalName - we need this removed if we > >> want to set aliases anyway > > Allow this one? This is one I wanted to eventually get rid of, Alexander seem to have introduced it, but we discussed in the past of a way to kill it. I forgot the details thouhg. Alexander did we open a ticket for this ? > >> krbPasswordExpiration - OK, generated by DS plugin > >> krbLastPwdChange - OK, generated by DS plugin > >> krbUPEnabled - not used, can we remove it? > > What about this one? We never use it. > >> krbTicketPolicyReference - why cannot admin set it? > > > > Unclear why, probably should be able to. > > We may want to remove it from blacklist then. We never used it, but we should probably allow admin to modify > >> krbPwdPolicyReference - why cannot admin set it? > > > > We assign password policy based on groups now, right ? > > Yup. > > > > >> krbPrincipalType - why cannot admin set it? > > > > Unused. > > So... allow this one? we never use it so we do not need to allow admins by default. Simo. > >> krbLastSuccessfulAuth - OK, generated by DS plugin > >> krbLastFailedAuth - OK, generated by DS plugin > >> krbLoginFailedCount - OK, generated by DS plugin > >> > >> It seems to me that some attributes can be indeed removed from the backlist > >> (and thus from the admin whitelist too). > >> > >> Besides that, the patch looked OK to me. > >> > >> 537: ACK (tests pass) > > > Petr, regarding the "Admin can manage any entry" update - you removed 4 > related > "remove:aci" definitions, but added just 3. Is that intentional? > > Martin _______________________________________________ Freeipa-devel mailing list Freeipa-devel@redhat.com https://www.redhat.com/mailman/listinfo/freeipa-devel