diff options
author | Tomas Babej <tbabej@redhat.com> | 2014-06-19 12:25:56 +0200 |
---|---|---|
committer | Petr Viktorin <pviktori@redhat.com> | 2014-06-23 15:27:33 +0200 |
commit | ef5309d3764390e0364db2e21568f525a18babb5 (patch) | |
tree | 0058ef8eba4416007be43240ed960ee197cb0c6a | |
parent | 6e43d01266f105cdf3cf27a1dbb87ac80da4a06d (diff) | |
download | freeipa-ef5309d3764390e0364db2e21568f525a18babb5.tar.gz freeipa-ef5309d3764390e0364db2e21568f525a18babb5.tar.xz freeipa-ef5309d3764390e0364db2e21568f525a18babb5.zip |
trusts: Allow reading ipaNTSecurityIdentifier in user and group objects
https://fedorahosted.org/freeipa/ticket/4385
Reviewed-By: Alexander Bokovoy <abokovoy@redhat.com>
-rw-r--r-- | ACI.txt | 4 | ||||
-rw-r--r-- | ipalib/plugins/group.py | 1 | ||||
-rw-r--r-- | ipalib/plugins/user.py | 3 |
3 files changed, 5 insertions, 3 deletions
@@ -31,7 +31,7 @@ aci: (targetattr = "a6record || aaaarecord || afsdbrecord || arecord || certreco dn: cn=System: Read Group Membership,cn=permissions,cn=pbac,dc=ipa,dc=example aci: (targetattr = "member || memberhost || memberof || memberuid || memberuser")(targetfilter = "(|(objectclass=ipausergroup)(objectclass=posixgroup))")(version 3.0;acl "permission:System: Read Group Membership";allow (compare,read,search) userdn = "ldap:///all";) dn: cn=System: Read Groups,cn=permissions,cn=pbac,dc=ipa,dc=example -aci: (targetattr = "businesscategory || cn || description || gidnumber || ipaexternalmember || ipauniqueid || mepmanagedby || o || objectclass || ou || owner || seealso")(targetfilter = "(|(objectclass=ipausergroup)(objectclass=posixgroup))")(version 3.0;acl "permission:System: Read Groups";allow (compare,read,search) userdn = "ldap:///anyone";) +aci: (targetattr = "businesscategory || cn || description || gidnumber || ipaexternalmember || ipantsecurityidentifier || ipauniqueid || mepmanagedby || o || objectclass || ou || owner || seealso")(targetfilter = "(|(objectclass=ipausergroup)(objectclass=posixgroup))")(version 3.0;acl "permission:System: Read Groups";allow (compare,read,search) userdn = "ldap:///anyone";) dn: cn=System: Read HBAC Rules,cn=permissions,cn=pbac,dc=ipa,dc=example aci: (targetattr = "accessruletype || accesstime || cn || description || externalhost || hostcategory || ipaenabledflag || ipauniqueid || member || memberhost || memberservice || memberuser || objectclass || servicecategory || sourcehost || sourcehostcategory || usercategory")(targetfilter = "(objectclass=ipahbacrule)")(version 3.0;acl "permission:System: Read HBAC Rules";allow (compare,read,search) userdn = "ldap:///all";) dn: cn=System: Read HBAC Services,cn=permissions,cn=pbac,dc=ipa,dc=example @@ -135,7 +135,7 @@ aci: (targetattr = "krblastadminunlock || krblastfailedauth || krblastpwdchange dn: cn=System: Read User Membership,cn=permissions,cn=pbac,dc=ipa,dc=example aci: (targetattr = "memberof")(targetfilter = "(objectclass=posixaccount)")(version 3.0;acl "permission:System: Read User Membership";allow (compare,read,search) userdn = "ldap:///all";) dn: cn=System: Read User Standard Attributes,cn=permissions,cn=pbac,dc=ipa,dc=example -aci: (targetattr = "cn || description || displayname || gecos || gidnumber || givenname || homedirectory || initials || loginshell || manager || objectclass || sn || title || uid || uidnumber")(targetfilter = "(objectclass=posixaccount)")(version 3.0;acl "permission:System: Read User Standard Attributes";allow (compare,read,search) userdn = "ldap:///anyone";) +aci: (targetattr = "cn || description || displayname || gecos || gidnumber || givenname || homedirectory || initials || ipantsecurityidentifier || loginshell || manager || objectclass || sn || title || uid || uidnumber")(targetfilter = "(objectclass=posixaccount)")(version 3.0;acl "permission:System: Read User Standard Attributes";allow (compare,read,search) userdn = "ldap:///anyone";) dn: cn=System: Remove Users,cn=permissions,cn=pbac,dc=ipa,dc=example aci: (targetfilter = "(objectclass=posixaccount)")(version 3.0;acl "permission:System: Remove Users";allow (delete) groupdn = "ldap:///cn=System: Remove Users,cn=permissions,cn=pbac,dc=ipa,dc=example";) dn: cn=System: Unlock User,cn=permissions,cn=pbac,dc=ipa,dc=example diff --git a/ipalib/plugins/group.py b/ipalib/plugins/group.py index d130f8668..1ca149035 100644 --- a/ipalib/plugins/group.py +++ b/ipalib/plugins/group.py @@ -150,6 +150,7 @@ class group(LDAPObject): 'businesscategory', 'cn', 'description', 'gidnumber', 'ipaexternalmember', 'ipauniqueid', 'mepmanagedby', 'o', 'objectclass', 'ou', 'owner', 'seealso', + 'ipantsecurityidentifier' }, }, 'System: Read Group Membership': { diff --git a/ipalib/plugins/user.py b/ipalib/plugins/user.py index 2ffc1ef4b..f646e8582 100644 --- a/ipalib/plugins/user.py +++ b/ipalib/plugins/user.py @@ -266,7 +266,8 @@ class user(LDAPObject): 'ipapermdefaultattr': { 'objectclass', 'cn', 'sn', 'description', 'title', 'uid', 'displayname', 'givenname', 'initials', 'manager', 'gecos', - 'gidnumber', 'homedirectory', 'loginshell', 'uidnumber' + 'gidnumber', 'homedirectory', 'loginshell', 'uidnumber', + 'ipantsecurityidentifier' }, }, 'System: Read User Addressbook Attributes': { |