Public bug reported:

Domain groups cannot be configured as 'AdminIdentities' under
/etc/polkit-1/localauthority.conf.d

EXAMPLE CONFIG

# /etc/polkit-1/localauthority.conf.d/90-test.conf
[Configuration]
AdminIdentities=unix-group:sysapp


With the above config, 'sysapp' is a group in LDAP. SSSD is configured on the 
machine to allow domain users to log in.
Sudo rules have been configured for the 'sysapp' group and work correctly.

However, any action that creates a polkit/GUI prompt for authentication
does not allow users in the 'sysapp' group to authenticate. Instead, it
only accepts auth from the root user.


If I change the config to use a local group, instead of a domain group, 
everything works as expected.
Similarly if I specify a domain USER instead of a domain group, everything 
works as expected.

The problem seems to only be with domain/LDAP groups.

ProblemType: Bug
DistroRelease: Ubuntu 22.04
Package: policykit-1 0.105-33
ProcVersionSignature: Ubuntu 5.15.0-48.54-generic 5.15.53
Uname: Linux 5.15.0-48-generic x86_64
ApportVersion: 2.20.11-0ubuntu82.1
Architecture: amd64
CasperMD5CheckResult: unknown
Date: Mon Oct  3 15:20:36 2022
InstallationDate: Installed on 2022-07-15 (80 days ago)
InstallationMedia: Ubuntu 20.04.1 LTS "Focal Fossa" - Release amd64 (20200731)
SourcePackage: policykit-1
UpgradeStatus: Upgraded to jammy on 2022-08-02 (61 days ago)

** Affects: policykit-1 (Ubuntu)
     Importance: Undecided
         Status: New


** Tags: amd64 apport-bug jammy

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to policykit-1 in Ubuntu.
https://bugs.launchpad.net/bugs/1991545

Title:
  Domain groups not accepted as  'AdminIdentities'

Status in policykit-1 package in Ubuntu:
  New

Bug description:
  Domain groups cannot be configured as 'AdminIdentities' under
  /etc/polkit-1/localauthority.conf.d

  EXAMPLE CONFIG

  # /etc/polkit-1/localauthority.conf.d/90-test.conf
  [Configuration]
  AdminIdentities=unix-group:sysapp

  
  With the above config, 'sysapp' is a group in LDAP. SSSD is configured on the 
machine to allow domain users to log in.
  Sudo rules have been configured for the 'sysapp' group and work correctly.

  However, any action that creates a polkit/GUI prompt for
  authentication does not allow users in the 'sysapp' group to
  authenticate. Instead, it only accepts auth from the root user.

  
  If I change the config to use a local group, instead of a domain group, 
everything works as expected.
  Similarly if I specify a domain USER instead of a domain group, everything 
works as expected.

  The problem seems to only be with domain/LDAP groups.

  ProblemType: Bug
  DistroRelease: Ubuntu 22.04
  Package: policykit-1 0.105-33
  ProcVersionSignature: Ubuntu 5.15.0-48.54-generic 5.15.53
  Uname: Linux 5.15.0-48-generic x86_64
  ApportVersion: 2.20.11-0ubuntu82.1
  Architecture: amd64
  CasperMD5CheckResult: unknown
  Date: Mon Oct  3 15:20:36 2022
  InstallationDate: Installed on 2022-07-15 (80 days ago)
  InstallationMedia: Ubuntu 20.04.1 LTS "Focal Fossa" - Release amd64 (20200731)
  SourcePackage: policykit-1
  UpgradeStatus: Upgraded to jammy on 2022-08-02 (61 days ago)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/policykit-1/+bug/1991545/+subscriptions


-- 
Mailing list: https://launchpad.net/~touch-packages
Post to     : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to