On 01/03/2014 02:23 AM, Will Sheldon wrote:

This is cause for concern. Is there a hardening / best practices for
production guide anywhere, did I miss a section of the documentation?

What else do I need to secure?

I understand that there is a tradeoff between security and
compatibility, but maybe there should be a ipa-secure script somewhere?

We are working on making the read permissions granular, so you can make your own tradeoffs if IPA defaults aren't appropriate for your use.

The work is tracked in https://fedorahosted.org/freeipa/ticket/3566 and linked tickets 4032-4034.

On Wed, Jan 1, 2014 at 10:41 AM, Jitse Klomp <jitsekl...@gmail.com
<mailto:jitsekl...@gmail.com>> wrote:

    It is possible to disable anonymous binds to the directory server.
    Take a look at
    
https://docs.fedoraproject.__org/en-US/Fedora/18/html/__FreeIPA_Guide/disabling-anon-__binds.html
    
<https://docs.fedoraproject.org/en-US/Fedora/18/html/FreeIPA_Guide/disabling-anon-binds.html>

      - Jitse



    On 01/01/2014 07:01 PM, Rajnesh Kumar Siwal wrote:

        It exposes the details of all the users/admins in the environment.
        There should be a user that the IPA should use to fetch the
        details from
        the IPA Servers. Without Authentication , no one should be able
        to fetch
        any information from the IPA Server.


--
PetrĀ³

_______________________________________________
Freeipa-users mailing list
Freeipa-users@redhat.com
https://www.redhat.com/mailman/listinfo/freeipa-users

Reply via email to