Glenn Faden wrote:
> Darren Reed wrote:
>   
>> I don't know if what I'm really searching for is
>> PRIV_NET_FIREWALL or more. What I do know is that
>> PRIV_SYS_NET_CONFIG seems very wrong because of
>> the scope and nothing else in PRIV_NET_* seems
>> to be well suited to the task on my mind.
>>   
>>     
>
> New privileges can be introduced, but we try to keep the name space 
> flat. In other words, we don't want having one privilege to imply that 
> you also have any others. Every required privilege should be explicit 
> enabled.
    Based on the description of the desired granularity I think the 
typical model of using PRIV_SYS_NET_CONFIG (and/or PRIV_SYS_IP_CONFIG) 
then modifying commands such as ipf to check more specific 
authorizations works.

    A "normal" user can then be assigned the ability to do some actions 
by assigning them the ability to execute ipf with PRIV_SYS_NET_CONFIG 
via the exec_attr and giving them their granular auths.

    A privileged user can use PRIV_SYS_NET_CONFIG and either having 
solaris.* auths or bypassing the auth checking ipf command to do anything.
    -Will

Reply via email to