Am 26.03.2013 um 16:55 schrieb Rob Crittenden <rcrit...@redhat.com>: > Petr Spacek wrote: >> On 26.3.2013 15:10, Rob Crittenden wrote: >>> Philipp Richter wrote: >>>> On 03/26/2013 12:39 AM, Dmitri Pal wrote: >>>> >>>>>> I am trying to do the following: >>>>>> >>>>>> We have some branch offices at different locations. We want to use >>>>>> one ipa-server with replicas in each branch office. Each branch >>>>>> office should have it's own set of administrators who should be able >>>>>> to create/modify/delete users for its own branch but should not be >>>>>> allowed to change users from other branches. >>>>>> every member of admin-at should be forced to create/modify/delete >>>>>> only users in branch-at. The same applies for admin-us/branch-us. >>>>>> >>>>>> at first, i thought of a combination of (a) new role(s), with >>>>>> write/delete permissions set for the branch-at group, as well as an >>>>>> automember rule but it seems there is no way to filter for the >>>>>> creator of an entry, which would be needed for the group membership.. >>>>>> >>>>>> am i missing anything? >>>> > >>>>> This might help >>>>> https://access.redhat.com/knowledge/docs/en-US/Red_Hat_Enterprise_Linux/6/html-single/Identity_Management_Guide/index.html#delegating-users >>>> >>>> Yes, I read the whole document but as far as I understand delegates are >>>> only helpful for editing existing records. I want admins of one branch >>>> to be able the also create users, but only in the assigned branch. >>>> >>>> Currently we use standard openldap with different ou's for the branches. >>>> Each branch admin has full ldap permissions for it's own ou-subtree. >>> >>> IPA uses a flat DIT so here is no way to control adding users in a given >>> branch office. >>> >>> The most you'd be able to do is delegae management (delete/modify) a >>> subset of >>> users who are members of a group that represents that branch office. >>> Any new >>> users added would need to be added to the appropriate branch group by the >>> admin adding them. >> >> This sounds like big deficiency to me... >> Is it possible to hack automember plugin to enforce some group >> assignment based on creator's group/name as proposed above? It should >> allow users to prepare some hand crafted ACIs, I guess. >> >> (Sorry, I don't have any knowledge about automember internals :-) > > Using automember doesn't prevent an admin from adding a user outside of the > branch. It would just automatically assign that new user to the correct > branch based on the automember rules AND assuming that the admin that added > the user included the right information for the rules. > > ACIs control add at the subtree level, so for us it is a binary. Either you > can add users or you can't.
In our current ldap implementation (openldap) there are some attributes which are implicitly set. I think these are creation/modification time and creator's name. So if these attributes would exist in ipa one could set up automember rules based on the creators name. Is there a way to switch such attributes on? Otherwise we would need to go for the one-admin-for-all approach :-( cheers, Philipp _______________________________________________ Freeipa-users mailing list Freeipa-users@redhat.com https://www.redhat.com/mailman/listinfo/freeipa-users