Adams, Samuel D Contr AFRL/HEDR wrote:
I have been adding, modifying, and removing ACIs on different parts of my directory, generally breaking things. The restore feature has been useful lately. For example, if you talk away the anonymous access aci or at least anonymous read to the various parts of your directory, you can certainly prevent anonymous access to that part of the directory, but then a lot of important features break like PAM or seeing thoseparts in the admin console.
http://www.redhat.com/docs/manuals/dir-server/release-notes/ger.html I believe you can view effective rights in the console as well.
Is there an easier way of modifying ACIs a know beforehand what the effect will be other than modifying them in the GUI or changing the expression and restarting the server? Sam Adams General Dynamics - Information Technology Phone: 210.536.5945 -----Original Message----- From: fedora-directory-users-bounces@xxxxxxxxxx [mailto:fedora-directory-users-bounces@xxxxxxxxxx] On Behalf Of Pete Rowley Sent: Tuesday, August 08, 2006 3:11 PM To: General discussion list for the Fedora Directory server project. Subject: Re: TLS authentication Adams Samuel D Contr AFRL/HEDR wrote:I also have two medium vulnerabilities the keep popping up with ISSthatI need to resolve but can't seem to find the proper configuration intheadmin console." LDAP NullBind: LDAP anonymous access to directory...In addition to the other posters comments I would point out that with zero access control configured in the DS nobody but the directory manager can do anything - zero access by default. The best method of securing the server is to start with that blank sheet and selectively enable targeted operations for targeted users/groups on targeted sets of" LDAP Schema: LDAP schema information gatheringentries. For example, your requirement is that pam operates: add the acithat makes that happen and no more. The default aci's added on install should be treated as examples only that just happen to be suitable for casual evaluation.Most deployments can get away with very few aci's in order to enforce their policy. Adding aci's when something is found not to work correctlydue to insufficient access is a lot less painful than the ramifications of overly broad grants of access.
Attachment:
smime.p7s
Description: S/MIME Cryptographic Signature
-- Fedora-directory-users mailing list Fedora-directory-users@xxxxxxxxxx https://www.redhat.com/mailman/listinfo/fedora-directory-users