Hello,
You should provide more information - logs, errors, commands that you
execute. More information - more chance you'll get help here.
2018-01-26 10:50 GMT+03:00 barrykfl--- via FreeIPA-users <
freeipa-users@lists.fedorahosted.org>:
> Hi :
>
> when reboot the server the certomenger.service
Rob Crittenden via FreeIPA-users
writes:
> Charles Hedrick via FreeIPA-users wrote:
>
>> One of my staff made a typo in his shell in “ipa user-mod —shell” It
>> can be hard to recover from, since you can’t login.
>>
>> Is there a way to restrict what they
Turns out there is a way. It seems to be a recent addition, as it wasn’t in the
documentation I looked at originally.
[nss]
allowed_shells = *
shell_fallback = /bin/bash
The semantics of allowed_shells is kind of interesting.
* any shell in /etc/shells is OK
* any shell is allowed_shells but
Thank you! I have used the configurations present in:
https://github.com/pschiffe/rsyslog-elasticsearch-kibana/tree/master/rsyslog
and now the system works properly.
Regards,
Daniele
On 25 January 2018 at 23:15, Rich Megginson via FreeIPA-users
wrote:
>
to do that you’d need some kind of mapping facility. Without modifying sssd I’d
suggest symbolic links.
I thought /bin/shell worked everywhere. It’s /usr/bin that may or may not.
On Jan 26, 2018, at 1:16 PM, Mike Kelly via FreeIPA-users