summaryrefslogtreecommitdiffstats
path: root/install/share/default-aci.ldif
diff options
context:
space:
mode:
authorSimo Sorce <ssorce@redhat.com>2011-01-13 16:57:23 -0500
committerSimo Sorce <ssorce@redhat.com>2011-01-14 14:06:56 -0500
commit7ee490e35c00626f5b62778977e6132dbdb86d98 (patch)
tree66aca524cd7a9ed6ebb447c289f12537ebe0849d /install/share/default-aci.ldif
parentda7eb1155ec34941d71ad2449fd7e5de8a648d49 (diff)
downloadfreeipa-7ee490e35c00626f5b62778977e6132dbdb86d98.tar.gz
freeipa-7ee490e35c00626f5b62778977e6132dbdb86d98.tar.xz
freeipa-7ee490e35c00626f5b62778977e6132dbdb86d98.zip
Remove radius options completely.
This has been completely abandoned since ipa v1 and is not built by default. Instead of carrying dead weight, let's remove it for now. Fixes: https://fedorahosted.org/freeipa/ticket/761
Diffstat (limited to 'install/share/default-aci.ldif')
-rw-r--r--install/share/default-aci.ldif6
1 files changed, 0 insertions, 6 deletions
diff --git a/install/share/default-aci.ldif b/install/share/default-aci.ldif
index 306652d59..ff0e5aec0 100644
--- a/install/share/default-aci.ldif
+++ b/install/share/default-aci.ldif
@@ -34,12 +34,6 @@ add: aci
aci: (targetattr = "krbMaxPwdLife || krbMinPwdLife || krbPwdMinDiffChars || krbPwdMinLength || krbPwdHistoryLength")(version 3.0;acl "Admins can write password policy"; allow (write) groupdn="ldap:///cn=admins,cn=groups,cn=accounts,$SUFFIX";)
aci: (targetattr = "aci")(version 3.0;acl "Admins can manage delegations"; allow (write, delete) groupdn="ldap:///cn=admins,cn=groups,cn=accounts,$SUFFIX";)
-dn: cn=radius,$SUFFIX
-changetype: modify
-add: aci
-aci: (targetattr = "*")(version 3.0; acl "Only radius and admin can access radius service data"; deny (all) userdn!="ldap:///uid=admin,cn=users,cn=accounts,$SUFFIX || ldap:///krbprincipalname=radius/$FQDN@$REALM,cn=$REALM,cn=kerberos,$SUFFIX";)
-aci: (targetfilter = "(objectClass=radiusprofile)")(targetattr != "aci || userPassword || krbPrincipalKey || sambaLMPassword || sambaNTPassword || passwordHistory")(version 3.0; acl "Account Admins can manage Users and Groups"; allow (add, delete, read, write) groupdn = "ldap:///cn=admins,cn=groups,cn=accounts,$SUFFIX";)
-
dn: cn=services,cn=accounts,$SUFFIX
changetype: modify
add: aci