Ronald Wimmer wrote: > On 03.09.24 17:04, Rob Crittenden via FreeIPA-users wrote: >> Ronald Wimmer wrote: >>> On 20.08.24 17:56, Rob Crittenden wrote: >>>> Ronald Wimmer via FreeIPA-users wrote: >>>>> On 14.08.24 10:50, Florence Blanc-Renaud wrote: >>>>>> Hi, >>>>>> >>>>>> On Tue, Aug 13, 2024 at 1:15 PM Ronald Wimmer via FreeIPA-users >>>>>> <[email protected] <mailto:freeipa- >>>>>> [email protected]>> wrote: >>>>>> >>>>>> >>>>>> >>>>>> On 13.08.24 11:35, Ronald Wimmer via FreeIPA-users wrote: >>>>>> > >>>>>> > >>>>>> > On 13.08.24 11:17, Ronald Wimmer via FreeIPA-users wrote: >>>>>> >> >>>>>> >> >>>>>> >> On 13.08.24 10:20, Ronald Wimmer via FreeIPA-users wrote: >>>>>> >>> As I do not now anything about LDAP users and >>>>>> permissions I >>>>>> would >>>>>> >>> like to ask for advice in this matter. >>>>>> >>> >>>>>> >>> I need an LDAP user that is capable of creating users >>>>>> in the >>>>>> staging >>>>>> >>> area as well as modifying or deleting existing users. >>>>>> >>> >>>>>> >>> I am aware of how to create a system user >>>>>> >>> (https://www.freeipa.org/page/HowTo/LDAP <https:// >>>>>> www.freeipa.org/page/HowTo/LDAP> ) but I do not know if there >>>>>> >>> is some kind of permission management (apart from >>>>>> putting the >>>>>> user in >>>>>> >>> cn=sysaccounts and assigning the right objectclasses). >>>>>> >>> >>>>>> >> >>>>>> >> I started reading about ACIs in Directory Server. Maybe >>>>>> I'll just >>>>>> >> stick to using "cn=Directory Manager" for this task... >>>>>> > >>>>>> > This is how I think an ACI should look like in order to >>>>>> allow user >>>>>> > creation in the staging area. >>>>>> > >>>>>> > (targetattr = "*") >>>>>> > (target = "ldap:///cn=staged >>>>>> > >>>>>> users,cn=accounts,cn=provisioning,dc=linux,dc=mydomain,dc=at") >>>>>> > (version 3.0; >>>>>> > acl "iam add staging users aci"; >>>>>> > allow (add) >>>>>> > (userdn = >>>>>> > >>>>>> "ldap:///uid=someadminuser,cn=sysaccounts,cn=etc,dc=example,dc=com") >>>>>> > ;) >>>>>> > >>>>>> > So I would need a separate ACI with "allow (all)" for DN: >>>>>> > cn=users,cn=accounts,dc=linux,dc=mydomain,dc=at to allow >>>>>> modification of >>>>>> > existing users, right? >>>>>> >>>>>> Looks like it would be much easier to add a regular IPA user >>>>>> and >>>>>> assign >>>>>> all required permissions, right? >>>>>> >>>>>> >>>>>> Yes, you can start by reading Managing role-based access controls in >>>>>> IdM using the CLI <https://docs.redhat.com/en/documentation/ >>>>>> Red_Hat_Enterprise_Linux/9/html/ >>>>>> managing_idm_users_groups_hosts_and_access_control_rules/managing-role- >>>>>> >>>>>> based-access-controls-in-idm-using-the-cli_managing-users-groups-hosts> >>>>>> >>>>>> and Configuring IdM for external provisioning of users <https:// >>>>>> docs.redhat.com/en/documentation/Red_Hat_Enterprise_Linux/9/html/ >>>>>> managing_idm_users_groups_hosts_and_access_control_rules/configuring- >>>>>> idm-for-external-provisioning-of-users_managing-users-groups-hosts>. >>>>>> FreeIPA already provides roles for User Management. If the >>>>>> permissions >>>>>> are too broad for your use case, you can follow the 2nd link and >>>>>> tailor it to suit your needs. >>>>> Thanks for confirming. Fortunately, I am aware of both links you >>>>> provided. We implemented and tested everything on our IPA test >>>>> instance. >>>>> Just need to switch from Directory Manager to a designated user for >>>>> this >>>>> particular scenario. >>>>> >>>> >>>> There currently isn't an API to add sysaccount users to RBAC rules. You >>>> can do it manually by adding their DN to the desired role. That should >>>> trigger the memberof plugin and grant the sysaccount user all the >>>> associated permissions. >>>> >>>> Or you can use a standard IPA user which is probably easier overall. >>> When we used IPA in migration mode and Directory Manager to create stage >>> users we could create IPA users with a password supplied by the external >>> system. After switching from "Directory Manager" to a dedicated IPA >>> users the password of newly created IPA users expired immediately. >>> (which is a no-go for our use case...) >>> >>> What would be the best way to cope with this situation? >> >> Directory Manager is special and will mask situations like this. >> >> Look into passSyncManagersDNs in the winsync docs. It will allow >> passwords to be written without applying password policies and resets. > Works perfectly! Thanks a lot Rob! > > The only remaining question is if there is a possibility to prevent that > particular user's password from expiring. Will setting maxlife to 0 work? >
This is all in the docs. https://docs.redhat.com/en/documentation/red_hat_enterprise_linux/7/html/linux_domain_identity_authentication_and_policy_guide/pwd-expiration rob -- _______________________________________________ FreeIPA-users mailing list -- [email protected] To unsubscribe send an email to [email protected] Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedorahosted.org/archives/list/[email protected] Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/new_issue
