Adams, Samuel D Contr AFRL/HEDR wrote: > I have been adding, modifying, and removing ACIs on different parts of > my directory, generally breaking things. The restore feature has been > useful lately. For example, if you talk away the anonymous access aci > or at least anonymous read to the various parts of your directory, you > can certainly prevent anonymous access to that part of the directory, > but then a lot of important features break like PAM or seeing those > parts in the admin console. > http://www.redhat.com/docs/manuals/dir-server/release-notes/ger.html I believe you can view effective rights in the console as well. > Is there an easier way of modifying ACIs a know beforehand what the > effect will be other than modifying them in the GUI or changing the > expression and restarting the server? > > Sam Adams > General Dynamics - Information Technology > Phone: 210.536.5945 > > -----Original Message----- > From: fedora-directory-users-bounces at redhat.com > [mailto:fedora-directory-users-bounces at redhat.com] On Behalf Of Pete > Rowley > Sent: Tuesday, August 08, 2006 3:11 PM > To: General discussion list for the Fedora Directory server project. > Subject: Re: TLS authentication > > Adams Samuel D Contr AFRL/HEDR wrote: > > >> I also have two medium vulnerabilities the keep popping up with ISS >> > that > >> I need to resolve but can't seem to find the proper configuration in >> > the > >> admin console. >> >> " LDAP NullBind: LDAP anonymous access to directory >> >> >> >> >> > ... > > >> " LDAP Schema: LDAP schema information gathering >> >> >> >> > In addition to the other posters comments I would point out that with > zero access control configured in the DS nobody but the directory > manager can do anything - zero access by default. The best method of > securing the server is to start with that blank sheet and selectively > enable targeted operations for targeted users/groups on targeted sets of > > entries. For example, your requirement is that pam operates: add the aci > > that makes that happen and no more. The default aci's added on install > should be treated as examples only that just happen to be suitable for > casual evaluation. > > Most deployments can get away with very few aci's in order to enforce > their policy. Adding aci's when something is found not to work correctly > > due to insufficient access is a lot less painful than the ramifications > of overly broad grants of access. > > -------------- next part -------------- A non-text attachment was scrubbed... Name: smime.p7s Type: application/x-pkcs7-signature Size: 3178 bytes Desc: S/MIME Cryptographic Signature Url : http://lists.fedoraproject.org/pipermail/389-users/attachments/20060816/f84a073b/attachment.bin