Re: [Freeipa-users] Active Directory Trust = filter users

2016-02-15 Thread Sumit Bose
On Mon, Feb 15, 2016 at 11:10:41AM +0200, Alexander Bokovoy wrote:
> On Mon, 15 Feb 2016, Sumit Bose wrote:
> >On Fri, Feb 12, 2016 at 10:49:36PM +0200, Alexander Bokovoy wrote:
> >>On Fri, 12 Feb 2016, Jakub Hrozek wrote:
> >>>On Fri, Feb 12, 2016 at 01:29:47PM +0200, Alexander Bokovoy wrote:
> On Fri, 12 Feb 2016, w...@dds.nl wrote:
> >Hi all,
> >
> >Yes, you can filter out certain SIDs--> I tried, but cannot get it to
> >work. For example, I don't need "Domain Users":
> >
> >Found out the SID by:
> >
> >[root@suacri10103 ~]# getent group domain\ us...@ad.example.org
> >domain us...@example.org:*:1012600513:someu...@ad.example.org
> >[root@suacri10103 ~]# ldbsearch -H
> >/var/lib/sss/db/cache_ipa.ad%s/example.org.ldb  gidNumber=1012600513 |
> >grep objectSIDString
> >asq: Unable to register control with rootdse!
> >objectSIDString: S-1-5-21-1447349426-2906170142-3196411423-513
> >
> >and put the SID in the blacklist; yes it is blacklisted:
> >
> >admin01@ipa ~]$ ipa trust-show ad.example.com --all | grep "SID blacklist
> >incoming"
> > SID blacklist incoming: S-1-5-20,
> >S-1-5-21-1447349426-2906170142-3196411423-513, S-1-5-3, S-1-5-2, S-1-5-1,
> >S-1-5-7, S-1-5-6, S-1-5-5, S-1-5-4, S-1-5-9, S-1-5-8, S-1-5-17, S-1-5-16,
> >S-1-5-15, S-1-5-14, S-1-5-13, S-1-5-12, S-1-5-11, S-1-5-10, S-1-3, S-1-2,
> >S-1-1, S-1-0, S-1-5-19, S-1-5-18
> >
> >However, the group is still there if I do a n "id 
> >someu...@ad.example.com"
> >(yep, whiped cache, restarted ipa etc.)
> >
> >Shouldn't the group be disappeared since the SID is blacklisted...?
> Only from Kerberos tickets. I don't think SSSD in ipa_server_mode
> consults this list. Instead, when AD users logins with Kerberos ticket,
> the resulting ticket already has blacklisted SIDs filtered out by IPA
> KDC and SSSD will see that these tickets' MS-PAC doesn't have additional
> groups in it.
> >>>
> >>>Alexander, do you think this would make a reasonable RFE?
> >>For non-logged-in case? Yes, it certainly makes sense as it would be
> >>consistent with KDC then. The only potential issue is that we'd lose
> >>'true' group membership for IPA CLI/Web UI operations as removing
> >>'Domain us...@ad.test' would make it impossible to assign anything to
> >>'Domain us...@ad.test' in ID overrides and external group members, but
> >>given it is actually filtered out at the level of a trust boundary, may
> >>be this is exactly what a person would like to achieve?
> >
> >yes, I think we have to add support in SSSD for this to be consistent
> >with the group memberships we get from the PAC. But since we in general
> >cannot ignore the groups completely it might be sufficient to just label
> >the filtered groups as non-POSIX groups in the cache (maybe we need an
> >additional flag to indicate that the group is really filtered out to
> >make sure that future lookup schemes which might include non-POSIX
> >groups will ignore the filtered groups as well).
> Marking it non-POSIX wouldn't prevent nested group membership, though.
> This obviously needs more thought...

yes, but I think this would be in agreement to the filtering in the PAC
because here we filter only the SID from this blacklist and not the SIDs
of groups nested in the related group.

bye,
Sumit

> 
> >Btw, the 'Domain Users' group is a bad example here, because it is in
> >general the primary group of the AD users in AD and hence listed in the
> >PAC as primary group. If you filter 'Domain Users' we have to reject all
> >Kerberos request because the resulting PAC will not have a primary
> >group.
> Yep. Though I've seen some environments where people did actually change
> the primary group for AD users to something else. AD environments can be
> broken in a multitude of interesting ways. ;)
> 
> -- 
> / Alexander Bokovoy

-- 
Manage your subscription for the Freeipa-users mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-users
Go to http://freeipa.org for more info on the project


Re: [Freeipa-users] Active Directory Trust = filter users

2016-02-15 Thread Alexander Bokovoy

On Mon, 15 Feb 2016, Sumit Bose wrote:

On Fri, Feb 12, 2016 at 10:49:36PM +0200, Alexander Bokovoy wrote:

On Fri, 12 Feb 2016, Jakub Hrozek wrote:
>On Fri, Feb 12, 2016 at 01:29:47PM +0200, Alexander Bokovoy wrote:
>>On Fri, 12 Feb 2016, w...@dds.nl wrote:
>>>Hi all,
>>>
>>>Yes, you can filter out certain SIDs--> I tried, but cannot get it to
>>>work. For example, I don't need "Domain Users":
>>>
>>>Found out the SID by:
>>>
>>>[root@suacri10103 ~]# getent group domain\ us...@ad.example.org
>>>domain us...@example.org:*:1012600513:someu...@ad.example.org
>>>[root@suacri10103 ~]# ldbsearch -H
>>>/var/lib/sss/db/cache_ipa.ad%s/example.org.ldb  gidNumber=1012600513 |
>>>grep objectSIDString
>>>asq: Unable to register control with rootdse!
>>>objectSIDString: S-1-5-21-1447349426-2906170142-3196411423-513
>>>
>>>and put the SID in the blacklist; yes it is blacklisted:
>>>
>>>admin01@ipa ~]$ ipa trust-show ad.example.com --all | grep "SID blacklist
>>>incoming"
>>> SID blacklist incoming: S-1-5-20,
>>>S-1-5-21-1447349426-2906170142-3196411423-513, S-1-5-3, S-1-5-2, S-1-5-1,
>>>S-1-5-7, S-1-5-6, S-1-5-5, S-1-5-4, S-1-5-9, S-1-5-8, S-1-5-17, S-1-5-16,
>>>S-1-5-15, S-1-5-14, S-1-5-13, S-1-5-12, S-1-5-11, S-1-5-10, S-1-3, S-1-2,
>>>S-1-1, S-1-0, S-1-5-19, S-1-5-18
>>>
>>>However, the group is still there if I do a n "id someu...@ad.example.com"
>>>(yep, whiped cache, restarted ipa etc.)
>>>
>>>Shouldn't the group be disappeared since the SID is blacklisted...?
>>Only from Kerberos tickets. I don't think SSSD in ipa_server_mode
>>consults this list. Instead, when AD users logins with Kerberos ticket,
>>the resulting ticket already has blacklisted SIDs filtered out by IPA
>>KDC and SSSD will see that these tickets' MS-PAC doesn't have additional
>>groups in it.
>
>Alexander, do you think this would make a reasonable RFE?
For non-logged-in case? Yes, it certainly makes sense as it would be
consistent with KDC then. The only potential issue is that we'd lose
'true' group membership for IPA CLI/Web UI operations as removing
'Domain us...@ad.test' would make it impossible to assign anything to
'Domain us...@ad.test' in ID overrides and external group members, but
given it is actually filtered out at the level of a trust boundary, may
be this is exactly what a person would like to achieve?


yes, I think we have to add support in SSSD for this to be consistent
with the group memberships we get from the PAC. But since we in general
cannot ignore the groups completely it might be sufficient to just label
the filtered groups as non-POSIX groups in the cache (maybe we need an
additional flag to indicate that the group is really filtered out to
make sure that future lookup schemes which might include non-POSIX
groups will ignore the filtered groups as well).

Marking it non-POSIX wouldn't prevent nested group membership, though.
This obviously needs more thought...


Btw, the 'Domain Users' group is a bad example here, because it is in
general the primary group of the AD users in AD and hence listed in the
PAC as primary group. If you filter 'Domain Users' we have to reject all
Kerberos request because the resulting PAC will not have a primary
group.

Yep. Though I've seen some environments where people did actually change
the primary group for AD users to something else. AD environments can be
broken in a multitude of interesting ways. ;)

--
/ Alexander Bokovoy

--
Manage your subscription for the Freeipa-users mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-users
Go to http://freeipa.org for more info on the project


Re: [Freeipa-users] Active Directory Trust = filter users

2016-02-15 Thread Sumit Bose
On Fri, Feb 12, 2016 at 10:49:36PM +0200, Alexander Bokovoy wrote:
> On Fri, 12 Feb 2016, Jakub Hrozek wrote:
> >On Fri, Feb 12, 2016 at 01:29:47PM +0200, Alexander Bokovoy wrote:
> >>On Fri, 12 Feb 2016, w...@dds.nl wrote:
> >>>Hi all,
> >>>
> >>>Yes, you can filter out certain SIDs--> I tried, but cannot get it to
> >>>work. For example, I don't need "Domain Users":
> >>>
> >>>Found out the SID by:
> >>>
> >>>[root@suacri10103 ~]# getent group domain\ us...@ad.example.org
> >>>domain us...@example.org:*:1012600513:someu...@ad.example.org
> >>>[root@suacri10103 ~]# ldbsearch -H
> >>>/var/lib/sss/db/cache_ipa.ad%s/example.org.ldb  gidNumber=1012600513 |
> >>>grep objectSIDString
> >>>asq: Unable to register control with rootdse!
> >>>objectSIDString: S-1-5-21-1447349426-2906170142-3196411423-513
> >>>
> >>>and put the SID in the blacklist; yes it is blacklisted:
> >>>
> >>>admin01@ipa ~]$ ipa trust-show ad.example.com --all | grep "SID blacklist
> >>>incoming"
> >>> SID blacklist incoming: S-1-5-20,
> >>>S-1-5-21-1447349426-2906170142-3196411423-513, S-1-5-3, S-1-5-2, S-1-5-1,
> >>>S-1-5-7, S-1-5-6, S-1-5-5, S-1-5-4, S-1-5-9, S-1-5-8, S-1-5-17, S-1-5-16,
> >>>S-1-5-15, S-1-5-14, S-1-5-13, S-1-5-12, S-1-5-11, S-1-5-10, S-1-3, S-1-2,
> >>>S-1-1, S-1-0, S-1-5-19, S-1-5-18
> >>>
> >>>However, the group is still there if I do a n "id someu...@ad.example.com"
> >>>(yep, whiped cache, restarted ipa etc.)
> >>>
> >>>Shouldn't the group be disappeared since the SID is blacklisted...?
> >>Only from Kerberos tickets. I don't think SSSD in ipa_server_mode
> >>consults this list. Instead, when AD users logins with Kerberos ticket,
> >>the resulting ticket already has blacklisted SIDs filtered out by IPA
> >>KDC and SSSD will see that these tickets' MS-PAC doesn't have additional
> >>groups in it.
> >
> >Alexander, do you think this would make a reasonable RFE?
> For non-logged-in case? Yes, it certainly makes sense as it would be
> consistent with KDC then. The only potential issue is that we'd lose
> 'true' group membership for IPA CLI/Web UI operations as removing
> 'Domain us...@ad.test' would make it impossible to assign anything to
> 'Domain us...@ad.test' in ID overrides and external group members, but
> given it is actually filtered out at the level of a trust boundary, may
> be this is exactly what a person would like to achieve?

yes, I think we have to add support in SSSD for this to be consistent
with the group memberships we get from the PAC. But since we in general
cannot ignore the groups completely it might be sufficient to just label
the filtered groups as non-POSIX groups in the cache (maybe we need an
additional flag to indicate that the group is really filtered out to
make sure that future lookup schemes which might include non-POSIX
groups will ignore the filtered groups as well).

Btw, the 'Domain Users' group is a bad example here, because it is in
general the primary group of the AD users in AD and hence listed in the
PAC as primary group. If you filter 'Domain Users' we have to reject all
Kerberos request because the resulting PAC will not have a primary
group.

bye,
Sumit

> -- 
> / Alexander Bokovoy
> 
> -- 
> Manage your subscription for the Freeipa-users mailing list:
> https://www.redhat.com/mailman/listinfo/freeipa-users
> Go to http://freeipa.org for more info on the project

-- 
Manage your subscription for the Freeipa-users mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-users
Go to http://freeipa.org for more info on the project


Re: [Freeipa-users] Active Directory Trust = filter users

2016-02-12 Thread Alexander Bokovoy

On Fri, 12 Feb 2016, Jakub Hrozek wrote:

On Fri, Feb 12, 2016 at 01:29:47PM +0200, Alexander Bokovoy wrote:

On Fri, 12 Feb 2016, w...@dds.nl wrote:
>Hi all,
>
>Yes, you can filter out certain SIDs--> I tried, but cannot get it to
>work. For example, I don't need "Domain Users":
>
>Found out the SID by:
>
>[root@suacri10103 ~]# getent group domain\ us...@ad.example.org
>domain us...@example.org:*:1012600513:someu...@ad.example.org
>[root@suacri10103 ~]# ldbsearch -H
>/var/lib/sss/db/cache_ipa.ad%s/example.org.ldb  gidNumber=1012600513 |
>grep objectSIDString
>asq: Unable to register control with rootdse!
>objectSIDString: S-1-5-21-1447349426-2906170142-3196411423-513
>
>and put the SID in the blacklist; yes it is blacklisted:
>
>admin01@ipa ~]$ ipa trust-show ad.example.com --all | grep "SID blacklist
>incoming"
> SID blacklist incoming: S-1-5-20,
>S-1-5-21-1447349426-2906170142-3196411423-513, S-1-5-3, S-1-5-2, S-1-5-1,
>S-1-5-7, S-1-5-6, S-1-5-5, S-1-5-4, S-1-5-9, S-1-5-8, S-1-5-17, S-1-5-16,
>S-1-5-15, S-1-5-14, S-1-5-13, S-1-5-12, S-1-5-11, S-1-5-10, S-1-3, S-1-2,
>S-1-1, S-1-0, S-1-5-19, S-1-5-18
>
>However, the group is still there if I do a n "id someu...@ad.example.com"
>(yep, whiped cache, restarted ipa etc.)
>
>Shouldn't the group be disappeared since the SID is blacklisted...?
Only from Kerberos tickets. I don't think SSSD in ipa_server_mode
consults this list. Instead, when AD users logins with Kerberos ticket,
the resulting ticket already has blacklisted SIDs filtered out by IPA
KDC and SSSD will see that these tickets' MS-PAC doesn't have additional
groups in it.


Alexander, do you think this would make a reasonable RFE?

For non-logged-in case? Yes, it certainly makes sense as it would be
consistent with KDC then. The only potential issue is that we'd lose
'true' group membership for IPA CLI/Web UI operations as removing
'Domain us...@ad.test' would make it impossible to assign anything to
'Domain us...@ad.test' in ID overrides and external group members, but
given it is actually filtered out at the level of a trust boundary, may
be this is exactly what a person would like to achieve?
--
/ Alexander Bokovoy

--
Manage your subscription for the Freeipa-users mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-users
Go to http://freeipa.org for more info on the project


Re: [Freeipa-users] Active Directory Trust = filter users

2016-02-12 Thread Jakub Hrozek
On Fri, Feb 12, 2016 at 01:29:47PM +0200, Alexander Bokovoy wrote:
> On Fri, 12 Feb 2016, w...@dds.nl wrote:
> >Hi all,
> >
> >Yes, you can filter out certain SIDs--> I tried, but cannot get it to
> >work. For example, I don't need "Domain Users":
> >
> >Found out the SID by:
> >
> >[root@suacri10103 ~]# getent group domain\ us...@ad.example.org
> >domain us...@example.org:*:1012600513:someu...@ad.example.org
> >[root@suacri10103 ~]# ldbsearch -H
> >/var/lib/sss/db/cache_ipa.ad%s/example.org.ldb  gidNumber=1012600513 |
> >grep objectSIDString
> >asq: Unable to register control with rootdse!
> >objectSIDString: S-1-5-21-1447349426-2906170142-3196411423-513
> >
> >and put the SID in the blacklist; yes it is blacklisted:
> >
> >admin01@ipa ~]$ ipa trust-show ad.example.com --all | grep "SID blacklist
> >incoming"
> > SID blacklist incoming: S-1-5-20,
> >S-1-5-21-1447349426-2906170142-3196411423-513, S-1-5-3, S-1-5-2, S-1-5-1,
> >S-1-5-7, S-1-5-6, S-1-5-5, S-1-5-4, S-1-5-9, S-1-5-8, S-1-5-17, S-1-5-16,
> >S-1-5-15, S-1-5-14, S-1-5-13, S-1-5-12, S-1-5-11, S-1-5-10, S-1-3, S-1-2,
> >S-1-1, S-1-0, S-1-5-19, S-1-5-18
> >
> >However, the group is still there if I do a n "id someu...@ad.example.com"
> >(yep, whiped cache, restarted ipa etc.)
> >
> >Shouldn't the group be disappeared since the SID is blacklisted...?
> Only from Kerberos tickets. I don't think SSSD in ipa_server_mode
> consults this list. Instead, when AD users logins with Kerberos ticket,
> the resulting ticket already has blacklisted SIDs filtered out by IPA
> KDC and SSSD will see that these tickets' MS-PAC doesn't have additional
> groups in it.

Alexander, do you think this would make a reasonable RFE?

-- 
Manage your subscription for the Freeipa-users mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-users
Go to http://freeipa.org for more info on the project


Re: [Freeipa-users] Active Directory Trust = filter users

2016-02-12 Thread Alexander Bokovoy

On Fri, 12 Feb 2016, w...@dds.nl wrote:

Hi all,

Yes, you can filter out certain SIDs--> I tried, but cannot get it to 
work. For example, I don't need "Domain Users":


Found out the SID by:

[root@suacri10103 ~]# getent group domain\ us...@ad.example.org
domain us...@example.org:*:1012600513:someu...@ad.example.org
[root@suacri10103 ~]# ldbsearch -H 
/var/lib/sss/db/cache_ipa.ad%s/example.org.ldb  gidNumber=1012600513 | 
grep objectSIDString

asq: Unable to register control with rootdse!
objectSIDString: S-1-5-21-1447349426-2906170142-3196411423-513

and put the SID in the blacklist; yes it is blacklisted:

admin01@ipa ~]$ ipa trust-show ad.example.com --all | grep "SID 
blacklist incoming"
 SID blacklist incoming: S-1-5-20, 
S-1-5-21-1447349426-2906170142-3196411423-513, S-1-5-3, S-1-5-2, 
S-1-5-1, S-1-5-7, S-1-5-6, S-1-5-5, S-1-5-4, S-1-5-9, S-1-5-8, 
S-1-5-17, S-1-5-16, S-1-5-15, S-1-5-14, S-1-5-13, S-1-5-12, S-1-5-11, 
S-1-5-10, S-1-3, S-1-2, S-1-1, S-1-0, S-1-5-19, S-1-5-18


However, the group is still there if I do a n "id 
someu...@ad.example.com" (yep, whiped cache, restarted ipa etc.)


Shouldn't the group be disappeared since the SID is blacklisted...?

Only from Kerberos tickets. I don't think SSSD in ipa_server_mode
consults this list. Instead, when AD users logins with Kerberos ticket,
the resulting ticket already has blacklisted SIDs filtered out by IPA
KDC and SSSD will see that these tickets' MS-PAC doesn't have additional
groups in it.


--
/ Alexander Bokovoy

--
Manage your subscription for the Freeipa-users mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-users
Go to http://freeipa.org for more info on the project


Re: [Freeipa-users] Active Directory Trust = filter users

2016-02-12 Thread wdh

Hi all,

Yes, you can filter out certain SIDs--> I tried, but cannot get it to 
work. For example, I don't need "Domain Users":


Found out the SID by:

[root@suacri10103 ~]# getent group domain\ us...@ad.example.org
domain us...@example.org:*:1012600513:someu...@ad.example.org
[root@suacri10103 ~]# ldbsearch -H 
/var/lib/sss/db/cache_ipa.ad%s/example.org.ldb  gidNumber=1012600513 | 
grep objectSIDString

asq: Unable to register control with rootdse!
objectSIDString: S-1-5-21-1447349426-2906170142-3196411423-513

and put the SID in the blacklist; yes it is blacklisted:

admin01@ipa ~]$ ipa trust-show ad.example.com --all | grep "SID 
blacklist incoming"
  SID blacklist incoming: S-1-5-20, 
S-1-5-21-1447349426-2906170142-3196411423-513, S-1-5-3, S-1-5-2, 
S-1-5-1, S-1-5-7, S-1-5-6, S-1-5-5, S-1-5-4, S-1-5-9, S-1-5-8, S-1-5-17, 
S-1-5-16, S-1-5-15, S-1-5-14, S-1-5-13, S-1-5-12, S-1-5-11, S-1-5-10, 
S-1-3, S-1-2, S-1-1, S-1-0, S-1-5-19, S-1-5-18


However, the group is still there if I do a n "id 
someu...@ad.example.com" (yep, whiped cache, restarted ipa etc.)


Shouldn't the group be disappeared since the SID is blacklisted...?

Winny






Alexander Bokovoy schreef op 10-02-2016 13:46:

On Wed, 10 Feb 2016, Winfried de Heiden wrote:

Hi all,

"hy are you concerned about this in the first place? "

It started from a practical point of view: if one is using the DC of 
the Office
Automation, Ad users will get all sorts of AD groups I am never going 
to use.
so why do I want to see them anyway? My screen get's a bit messy as 
for
"u...@ad.example.com"  when this user belongs tot 25 or something 
groups... It

would be nice to hide these...

Can I blacklist some of the groups? (Trusts  --> ad.example.com --> 
Settings)

by using the SID?

Yes, you can filter out certain SIDs at the KDC side by using settings
of the trust. Theoretically, SSSD would need to remove the group
membership for groups not existing in the MS-PAC.


--
Manage your subscription for the Freeipa-users mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-users
Go to http://freeipa.org for more info on the project

Re: [Freeipa-users] Active Directory Trust = filter users

2016-02-10 Thread Alexander Bokovoy

On Wed, 10 Feb 2016, Winfried de Heiden wrote:

Hi all,

"hy are you concerned about this in the first place? "

It started from a practical point of view: if one is using the DC of the Office
Automation, Ad users will get all sorts of AD groups I am never going to use.
so why do I want to see them anyway? My screen get's a bit messy as for
"u...@ad.example.com"  when this user belongs tot 25 or something groups... It
would be nice to hide these...

Can I blacklist some of the groups? (Trusts  --> ad.example.com --> Settings)
by using the SID?

Yes, you can filter out certain SIDs at the KDC side by using settings
of the trust. Theoretically, SSSD would need to remove the group
membership for groups not existing in the MS-PAC.


--
/ Alexander Bokovoy

--
Manage your subscription for the Freeipa-users mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-users
Go to http://freeipa.org for more info on the project


Re: [Freeipa-users] Active Directory Trust = filter users

2016-02-10 Thread Winfried de Heiden

  
  
Hi all,
  
  "hy are you concerned about this in the first place? " 
  
  It started from a practical point of view: if one is using the DC
  of the Office Automation, Ad users will get all sorts of AD groups
  I am never going to use. so why do I want to see them anyway? My
  screen get's a bit messy as for "u...@ad.example.com"  when this
  user belongs tot 25 or something groups... It would be nice to
  hide these...
  
  Can I blacklist some of the groups? (Trusts  --> ad.example.com
  --> Settings) by using the SID?
  
  Winny
  
  

Op 10-02-16 om 09:42 schreef Jakub
  Hrozek:


  On Tue, Feb 09, 2016 at 11:58:46AM +0100, Winfried de Heiden wrote:

  
   Hi all,

   Using an Active Directory Trust with IPA all works fine but there's an
   disadvantage: it might brong in lots and lots of groups I am not
   interested in since it mainly hit Windows and/or Office stuff.

  
  
Why are you concerned about this in the first place? Is it about
performance needed to process these groups or about resources that can
be owned by these groups?


  

   Now, is it possible to filter AD-groups? or: can I use an AD search base
   filter? (something like cn=linuxgroups,ou=allgroups,dc=example,dc=com)

  
  
Not at the moment, the subdomains are autoconfigured and not
configurable.


  

   On a small scale ID views can be used, but it not a great solution. (for
   all new groups appearing in AD the ID view must be modified)

   Some sugestions or documentation on filtering AD groups?

   Winny

  
  

  
-- 
Manage your subscription for the Freeipa-users mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-users
Go to http://freeipa.org for more info on the project

  
  



  


-- 
Manage your subscription for the Freeipa-users mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-users
Go to http://freeipa.org for more info on the project

Re: [Freeipa-users] Active Directory Trust = filter users

2016-02-10 Thread Sumit Bose
On Wed, Feb 10, 2016 at 09:42:28AM +0100, Jakub Hrozek wrote:
> On Tue, Feb 09, 2016 at 11:58:46AM +0100, Winfried de Heiden wrote:
> >Hi all,
> > 
> >Using an Active Directory Trust with IPA all works fine but there's an
> >disadvantage: it might brong in lots and lots of groups I am not
> >interested in since it mainly hit Windows and/or Office stuff.
> 
> Why are you concerned about this in the first place? Is it about
> performance needed to process these groups or about resources that can
> be owned by these groups?
> 
> > 
> >Now, is it possible to filter AD-groups? or: can I use an AD search base
> >filter? (something like cn=linuxgroups,ou=allgroups,dc=example,dc=com)
> 
> Not at the moment, the subdomains are autoconfigured and not
> configurable.

Additionally please note that some of the more advances schemes we use
for group-membership lookups in AD like PAC data or the tokenGroups
request just return all groups a user is a member of in a single call,
no need to walk through the AD directory tree to resolve nested groups.
We still have to look up the groups to get their name and maybe the GID
but if we would apply a filter we had to look them up as well because we
only know the SID.

Falling back to a different scheme would not improve the situation
performance wise because we have to read all groups even the outside the
given search base to be able to resolve nested groups correctly.

HTH

bye,
Sumit

> 
> > 
> >On a small scale ID views can be used, but it not a great solution. (for
> >all new groups appearing in AD the ID view must be modified)
> > 
> >Some sugestions or documentation on filtering AD groups?
> > 
> >Winny
> 
> > -- 
> > Manage your subscription for the Freeipa-users mailing list:
> > https://www.redhat.com/mailman/listinfo/freeipa-users
> > Go to http://freeipa.org for more info on the project
> 
> -- 
> Manage your subscription for the Freeipa-users mailing list:
> https://www.redhat.com/mailman/listinfo/freeipa-users
> Go to http://freeipa.org for more info on the project

-- 
Manage your subscription for the Freeipa-users mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-users
Go to http://freeipa.org for more info on the project


Re: [Freeipa-users] Active Directory Trust = filter users

2016-02-10 Thread Jakub Hrozek
On Tue, Feb 09, 2016 at 11:58:46AM +0100, Winfried de Heiden wrote:
>Hi all,
> 
>Using an Active Directory Trust with IPA all works fine but there's an
>disadvantage: it might brong in lots and lots of groups I am not
>interested in since it mainly hit Windows and/or Office stuff.

Why are you concerned about this in the first place? Is it about
performance needed to process these groups or about resources that can
be owned by these groups?

> 
>Now, is it possible to filter AD-groups? or: can I use an AD search base
>filter? (something like cn=linuxgroups,ou=allgroups,dc=example,dc=com)

Not at the moment, the subdomains are autoconfigured and not
configurable.

> 
>On a small scale ID views can be used, but it not a great solution. (for
>all new groups appearing in AD the ID view must be modified)
> 
>Some sugestions or documentation on filtering AD groups?
> 
>Winny

> -- 
> Manage your subscription for the Freeipa-users mailing list:
> https://www.redhat.com/mailman/listinfo/freeipa-users
> Go to http://freeipa.org for more info on the project

-- 
Manage your subscription for the Freeipa-users mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-users
Go to http://freeipa.org for more info on the project


[Freeipa-users] Active Directory Trust = filter users

2016-02-09 Thread Winfried de Heiden

  
  
Hi all,
  
  Using an Active Directory Trust with IPA all works fine but
  there's an disadvantage: it might brong in lots and lots of groups
  I am not interested in since it mainly hit Windows and/or Office
  stuff.
  
  Now, is it possible to filter AD-groups? or: can I use an AD
  search base filter? (something like
  cn=linuxgroups,ou=allgroups,dc=example,dc=com)
  
  On a small scale ID views can be used, but it not a great
  solution. (for all new groups appearing in AD the ID view must be
  modified)
  
  Some sugestions or documentation on filtering AD groups?
  
  Winny
  

  


-- 
Manage your subscription for the Freeipa-users mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-users
Go to http://freeipa.org for more info on the project