Re: docs for 1.4

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 




> On 2 May 2019, at 21:28, Angel Bosch Mora <abosch@xxxxxxxxxxxxxxxx> wrote:
> 
>> If you have a specific question though, I’d be happy to help!
>> 
> 
> I'm glad you offered :)
> 
> these are the attributes I'm currently using:
> 
> cn:
> description:
> displayName::
> dn:
> employeeNumber:
> gecos:
> gidNumber:
> homeDirectory:
> loginShell:
> mail:
> manager:
> member:
> memberOf:
> objectClass:
> petraSshPublicKey:
> printer-make-and-model:
> printer-more-info:
> printer-uri:
> sambaAcctFlags:
> sambaNTPassword:
> sambaPasswordHistory:
> sambaPwdLastSet:
> sambaSID:
> shadowInactive:
> shadowLastChange:
> shadowMax:
> shadowWarning:
> sn:
> uid:
> uidNumber:
> 
> 
> I want to change ACIs from old behaviour to white list aproach.
> Should I include objectClass in the ACIs?

Generally I’d say you only need objectClass in aci’s where you have modification rights occuring to ensure that the bounds of the modification are constrained.

If you are only adding ACI for read, then you can just have targetAttr for the attributes required.

The best way to think of this is “what groups or roles need access to read what attributes”.

So I’d write out something like:

everyone read -> a1, a2, a3 ….
admins read -> ….

Then I’d translate these to the read-aci’s you require



> 
> Do I need to create a deny-all as last ACI so everything that is not allowed gets denied?

No, 389 defaults to deny, so anything “not list” will be disallowed. 

> 
> In your blog you talk about a toolset to test ACIs, is that tool published somewhere?

Sadly not - some parts of it have become part of lib389 in the healthcheck module to find targetAttr != rules, but the actual testing of “do these aci’s match expectations”, was part of a previous work place, and I no longer have access.

Again, you can translate the above to something:

You would basically say “for each object in the directory”.

    if that object is in:
        everyone -> expect read on a1, a2 ….
        admins -> expect read on a3, a4 ….

Then I’d do the permission check (there is a 389 specific ldap extended op) that tells you what rights you have other entries. I’d assert the expect matches each check, and continue.


It was pretty overkill and kind of brute-force solution, but it is what lead to the discovery of the aci issues with targetAttr != - I’d say if you don’t use targetAttr != you probably are already in a really good position to audit and understand the interactions with your directory, so you may not need the tool at all. 


Hope this helps :) 


> 
> best regards,
> 
> abosch
> 
> 
> 
> 
> -- Institut Mallorqui d'Afers Socials. Aquest missatge, i si escau, qualsevol fitxer annex, es dirigeix exclusivament a la persona que n'es destinataria i pot contenir informacio confidencial. En cap cas no heu de copiar aquest missatge ni lliurar-lo a terceres persones sense permis expres de l'IMAS. Si no sou la persona destinataria que s'hi indica (o la responsable de lliurar-l'hi) us demanam que ho notifiqueu immediatament a l'adreca electronica de la persona remitent.
> -- Abans d'imprimir aquest missatge, pensau si es realment necessari.
> _______________________________________________
> 389-users mailing list -- 389-users@xxxxxxxxxxxxxxxxxxxxxxx
> To unsubscribe send an email to 389-users-leave@xxxxxxxxxxxxxxxxxxxxxxx
> Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
> List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
> List Archives: https://lists.fedoraproject.org/archives/list/389-users@xxxxxxxxxxxxxxxxxxxxxxx

—
Sincerely,

William Brown

Senior Software Engineer, 389 Directory Server
SUSE Labs
_______________________________________________
389-users mailing list -- 389-users@xxxxxxxxxxxxxxxxxxxxxxx
To unsubscribe send an email to 389-users-leave@xxxxxxxxxxxxxxxxxxxxxxx
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/389-users@xxxxxxxxxxxxxxxxxxxxxxx




[Index of Archives]     [Fedora User Discussion]     [Older Fedora Users]     [Fedora Announce]     [Fedora Package Announce]     [EPEL Announce]     [Fedora News]     [Fedora Cloud]     [Fedora Advisory Board]     [Fedora Education]     [Fedora Security]     [Fedora Scitech]     [Fedora Robotics]     [Fedora Maintainers]     [Fedora Infrastructure]     [Fedora Websites]     [Anaconda Devel]     [Fedora Devel Java]     [Fedora Legacy]     [Fedora Desktop]     [Fedora Fonts]     [ATA RAID]     [Fedora Marketing]     [Fedora Management Tools]     [Fedora Mentors]     [Fedora Package Review]     [Fedora R Devel]     [Fedora PHP Devel]     [Kickstart]     [Fedora Music]     [Fedora Packaging]     [Centos]     [Fedora SELinux]     [Fedora Legal]     [Fedora Kernel]     [Fedora QA]     [Fedora Triage]     [Fedora OCaml]     [Coolkey]     [Virtualization Tools]     [ET Management Tools]     [Yum Users]     [Tux]     [Yosemite News]     [Yosemite Photos]     [Linux Apps]     [Maemo Users]     [Gnome Users]     [KDE Users]     [Fedora Tools]     [Fedora Art]     [Fedora Docs]     [Maemo Users]     [Asterisk PBX]     [Fedora Sparc]     [Fedora Universal Network Connector]     [Fedora ARM]

  Powered by Linux