On 03/30/2015 01:03 PM, Petr Spacek wrote:
On 30.3.2015 11:50, thierry bordaz wrote:
Hello,

    The aci "Admin read-only attributes" grants, for the complete
    suffix, read access to 'admin' users for the following attributes.

        "ipaUniqueId || memberOf || enrolledBy || krbExtraData ||
        krbPrincipalName || krbCanonicalName || krbPasswordExpiration ||
        krbLastPwdChange || krbLastSuccessfulAuth || krbLastFailedAuth"


    "userPassword" and "krbPrincipalKey" are not "read-only" attributes
    so I guess it is the reason why they are not part of this list.

    For User life cycle, I would need admin users to be granted read
    access on "userPassword" and "krbPrincipalKey".
    The scope could be limited to Stage container but I was wondering if
    there is a security reason to not grant read access on the full suffix ?
AFAIK admins were not given read access to keys and passwords on purpose as a
security measure. It prevents accidental key disclosure when admin does
ldapsearch and posts result somewhere (e.g. while debugging something).
Yes that sounds a very good reason.

I did not follow the whole user life-cycle discussion. Why you need read
access to it? Is it because you plan to do add/del instead of modrdn?

There are two use case where I think I need access to those attributes:

 * A stage entry can have  userpassword/krb keys attributes.
   When activating an entry those values are copied to a the active entry.
   So the newly active user can authenticate with the credential set
   while his entry was in stage container.
   In that case, it would need a read access because the stage entry is
   copied into a new entry (ADD).
 * An active entry is deleted (preserve mode), so the entry is modrdn
   to the delete container.
   Then to prevent the reuse of old credential, those attibutes are
   cleared.
   So here I would need a read/search/write access to those attributes
   in the delete container.

That means that if I limit the ACIs to stage/delete containers, an admin could accidentally disclose stage/delete entries keys.

thanks
thieryr

-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

Reply via email to