summaryrefslogtreecommitdiffstats
path: root/ipaserver
diff options
context:
space:
mode:
Diffstat (limited to 'ipaserver')
-rw-r--r--ipaserver/install/dsinstance.py1
-rw-r--r--ipaserver/plugins/baseuser.py174
-rw-r--r--ipaserver/plugins/certmap.py391
-rw-r--r--ipaserver/plugins/stageuser.py16
-rw-r--r--ipaserver/plugins/user.py23
5 files changed, 596 insertions, 9 deletions
diff --git a/ipaserver/install/dsinstance.py b/ipaserver/install/dsinstance.py
index 99e61903d..733dd4006 100644
--- a/ipaserver/install/dsinstance.py
+++ b/ipaserver/install/dsinstance.py
@@ -70,6 +70,7 @@ IPA_SCHEMA_FILES = ("60kerberos.ldif",
"70topology.ldif",
"71idviews.ldif",
"72domainlevels.ldif",
+ "73certmap.ldif",
"15rfc2307bis.ldif",
"15rfc4876.ldif")
diff --git a/ipaserver/plugins/baseuser.py b/ipaserver/plugins/baseuser.py
index 75cf7d81a..44adc76ec 100644
--- a/ipaserver/plugins/baseuser.py
+++ b/ipaserver/plugins/baseuser.py
@@ -19,14 +19,17 @@
import six
-from ipalib import api, errors
-from ipalib import Flag, Int, Password, Str, Bool, StrEnum, DateTime, Bytes
+from ipalib import api, errors, x509
+from ipalib import (
+ Flag, Int, Password, Str, Bool, StrEnum, DateTime, Bytes, DNParam)
from ipalib.parameters import Principal
from ipalib.plugable import Registry
from .baseldap import (
DN, LDAPObject, LDAPCreate, LDAPUpdate, LDAPSearch, LDAPDelete,
- LDAPRetrieve, LDAPAddAttribute, LDAPRemoveAttribute, LDAPAddMember,
- LDAPRemoveMember, LDAPAddAttributeViaOption, LDAPRemoveAttributeViaOption)
+ LDAPRetrieve, LDAPAddAttribute, LDAPModAttribute, LDAPRemoveAttribute,
+ LDAPAddMember, LDAPRemoveMember,
+ LDAPAddAttributeViaOption, LDAPRemoveAttributeViaOption,
+ add_missing_object_class)
from ipaserver.plugins.service import (
validate_certificate, validate_realm, normalize_principal)
from ipalib.request import context
@@ -134,7 +137,7 @@ class baseuser(LDAPObject):
object_class_config = 'ipauserobjectclasses'
possible_objectclasses = [
'meporiginentry', 'ipauserauthtypeclass', 'ipauser',
- 'ipatokenradiusproxyuser'
+ 'ipatokenradiusproxyuser', 'ipacertmapobject'
]
disallow_object_classes = ['krbticketpolicyaux']
permission_filter_objectclasses = ['posixaccount']
@@ -146,7 +149,8 @@ class baseuser(LDAPObject):
'memberofindirect', 'ipauserauthtype', 'userclass',
'ipatokenradiusconfiglink', 'ipatokenradiususername',
'krbprincipalexpiration', 'usercertificate;binary',
- 'krbprincipalname', 'krbcanonicalname'
+ 'krbprincipalname', 'krbcanonicalname',
+ 'ipacertmapdata'
]
search_display_attributes = [
'uid', 'givenname', 'sn', 'homedirectory', 'krbcanonicalname',
@@ -360,6 +364,13 @@ class baseuser(LDAPObject):
label=_('Certificate'),
doc=_('Base-64 encoded user certificate'),
),
+ Str(
+ 'ipacertmapdata*',
+ cli_name='certmapdata',
+ label=_('Certificate mapping data'),
+ doc=_('Certificate mapping data'),
+ flags=['no_create', 'no_update', 'no_search'],
+ ),
)
def normalize_and_validate_email(self, email, config=None):
@@ -728,3 +739,154 @@ class baseuser_remove_cert(LDAPRemoveAttributeViaOption):
self.obj.convert_usercertificate_post(entry_attrs, **options)
return dn
+
+
+class ModCertMapData(LDAPModAttribute):
+ attribute = 'ipacertmapdata'
+ takes_options = (
+ DNParam(
+ 'issuer?',
+ cli_name='issuer',
+ label=_('Issuer'),
+ doc=_('Issuer of the certificate'),
+ flags=['virtual_attribute']
+ ),
+ DNParam(
+ 'subject?',
+ cli_name='subject',
+ label=_('Subject'),
+ doc=_('Subject of the certificate'),
+ flags=['virtual_attribute']
+ ),
+ Bytes(
+ 'certificate*', validate_certificate,
+ cli_name='certificate',
+ label=_('Certificate'),
+ doc=_('Base-64 encoded user certificate'),
+ flags=['virtual_attribute']
+ ),
+ )
+
+ @staticmethod
+ def _build_mapdata(subject, issuer):
+ return u'X509:<I>{issuer}<S>{subject}'.format(
+ issuer=issuer.x500_text(), subject=subject.x500_text())
+
+ @classmethod
+ def _convert_options_to_certmap(cls, entry_attrs, issuer=None,
+ subject=None, certificates=()):
+ """
+ Converts options to ipacertmapdata
+
+ When --subject --issuer or --certificate options are used,
+ the value for ipacertmapdata is built from extracting subject and
+ issuer,
+ converting their values to X500 ordering and using the format
+ X509:<I>issuer<S>subject
+ For instance:
+ X509:<I>O=DOMAIN,CN=Certificate Authority<S>O=DOMAIN,CN=user
+ A list of values can be returned if --certificate is used multiple
+ times, or in conjunction with --subject --issuer.
+ """
+ data = []
+ data.extend(entry_attrs.get(cls.attribute, list()))
+
+ if issuer or subject:
+ data.append(cls._build_mapdata(subject, issuer))
+
+ for dercert in certificates:
+ cert = x509.load_certificate(dercert, x509.DER)
+ issuer = DN(cert.issuer)
+ subject = DN(cert.subject)
+ if not subject:
+ raise errors.ValidationError(
+ name='certificate',
+ error=_('cannot have an empty subject'))
+ data.append(cls._build_mapdata(subject, issuer))
+
+ entry_attrs[cls.attribute] = data
+
+ def get_args(self):
+ # ipacertmapdata is not mandatory as it can be built
+ # from the values subject+issuer or from reading certificate
+ for arg in super(ModCertMapData, self).get_args():
+ if arg.name == 'ipacertmapdata':
+ yield arg.clone(required=False, alwaysask=False)
+ else:
+ yield arg.clone()
+
+ def pre_callback(self, ldap, dn, entry_attrs, attrs_list, *keys,
+ **options):
+ # The 3 valid calls are
+ # ipa user-add-certmapdata LOGIN --subject xx --issuer yy
+ # ipa user-add-certmapdata LOGIN [DATA] --certificate xx
+ # ipa user-add-certmapdata LOGIN DATA
+ # Check that at least one of the 3 formats is used
+
+ try:
+ certmapdatas = keys[1] or []
+ except IndexError:
+ certmapdatas = []
+ issuer = options.get('issuer')
+ subject = options.get('subject')
+ certificates = options.get('certificate', [])
+
+ # If only LOGIN is supplied, then we need either subject or issuer or
+ # certificate
+ if (not certmapdatas and not issuer and not subject and
+ not certificates):
+ raise errors.RequirementError(name='ipacertmapdata')
+
+ # If subject or issuer is provided, other options are not allowed
+ if subject or issuer:
+ if certificates:
+ raise errors.MutuallyExclusiveError(
+ reason=_('cannot specify both subject/issuer '
+ 'and certificate'))
+ if certmapdatas:
+ raise errors.MutuallyExclusiveError(
+ reason=_('cannot specify both subject/issuer '
+ 'and ipacertmapdata'))
+ # If subject or issuer is provided, then the other one is required
+ if not subject:
+ raise errors.RequirementError(name='subject')
+ if not issuer:
+ raise errors.RequirementError(name='issuer')
+
+ # if the command is called with --subject --issuer or --certificate
+ # we need to add ipacertmapdata to the attrs_list in order to
+ # display the resulting value in the command output
+ if 'ipacertmapdata' not in attrs_list:
+ attrs_list.append('ipacertmapdata')
+
+ self._convert_options_to_certmap(
+ entry_attrs,
+ issuer=issuer,
+ subject=subject,
+ certificates=certificates)
+
+ return dn
+
+
+class baseuser_add_certmapdata(ModCertMapData, LDAPAddAttribute):
+ __doc__ = _("Add one or more certificate mappings to the user entry.")
+ msg_summary = _('Added certificate mappings to user "%(value)s"')
+
+ def pre_callback(self, ldap, dn, entry_attrs, attrs_list, *keys,
+ **options):
+
+ dn = super(baseuser_add_certmapdata, self).pre_callback(
+ ldap, dn, entry_attrs, attrs_list, *keys, **options)
+
+ # The objectclass ipacertmapobject may not be present on
+ # existing user entries. We need to add it if we define a new
+ # value for ipacertmapdata
+ add_missing_object_class(ldap, u'ipacertmapobject', dn)
+
+ return dn
+
+
+class baseuser_remove_certmapdata(ModCertMapData,
+ LDAPRemoveAttribute):
+ __doc__ = _("Remove one or more certificate mappings from the user entry.")
+ msg_summary = _('Removed certificate mappings from user "%(value)s"')
diff --git a/ipaserver/plugins/certmap.py b/ipaserver/plugins/certmap.py
new file mode 100644
index 000000000..c37eae38e
--- /dev/null
+++ b/ipaserver/plugins/certmap.py
@@ -0,0 +1,391 @@
+# Authors:
+# Florence Blanc-Renaud <flo@redhat.com>
+#
+# Copyright (C) 2017 Red Hat
+# see file 'COPYING' for use and warranty information
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License as published by
+# the Free Software Foundation, either version 3 of the License, or
+# (at your option) any later version.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program. If not, see <http://www.gnu.org/licenses/>.
+
+import six
+
+from ipalib import api, errors
+from ipalib.parameters import Bool, DNSNameParam, Flag, Int, Str
+from ipalib.plugable import Registry
+from .baseldap import (
+ LDAPCreate,
+ LDAPDelete,
+ LDAPObject,
+ LDAPQuery,
+ LDAPRetrieve,
+ LDAPSearch,
+ LDAPUpdate,
+ pkey_to_value)
+from ipalib import _, ngettext
+from ipalib import output
+
+
+if six.PY3:
+ unicode = str
+
+__doc__ = _("""
+Certificate Identity Mapping
+""") + _("""
+Manage Certificate Identity Mapping configuration and rules.
+""") + _("""
+IPA supports the use of certificates for authentication. Certificates can
+either be stored in the user entry (full certificate in the usercertificate
+attribute), or simply linked to the user entry through a mapping.
+This code enables the management of the rules allowing to link a
+certificate to a user entry.
+""") + _("""
+EXAMPLES:
+""") + _("""
+ Display the Certificate Identity Mapping global configuration:
+ ipa certmapconfig-show
+""") + _("""
+ Modify Certificate Identity Mapping global configuration:
+ ipa certmapconfig-mod --promptusername=TRUE
+""") + _("""
+ Create a new Certificate Identity Mapping Rule:
+ ipa certmaprule-add rule1 --desc="Link certificate with subject and issuer"
+""") + _("""
+ Modify a Certificate Identity Mapping Rule:
+ ipa certmaprule-mod rule1 --maprule="<ALT-SEC-ID-I-S:altSecurityIdentities>"
+""") + _("""
+ Disable a Certificate Identity Mapping Rule:
+ ipa certmaprule-disable rule1
+""") + _("""
+ Enable a Certificate Identity Mapping Rule:
+ ipa certmaprule-enable rule1
+""") + _("""
+ Display information about a Certificate Identity Mapping Rule:
+ ipa certmaprule-show rule1
+""") + _("""
+ Find all Certificate Identity Mapping Rules with the specified domain:
+ ipa certmaprule-find --domain example.com
+""") + _("""
+ Delete a Certificate Identity Mapping Rule:
+ ipa certmaprule-del rule1
+""")
+
+register = Registry()
+
+
+def check_associateddomain_is_trusted(api_inst, options):
+ """
+ Check that the associateddomain in options are either IPA domain or
+ a trusted domain.
+
+ :param api_inst: API instance
+ :param associateddomain: domains to be checked
+
+ :raises: ValidationError if the domain is neither IPA domain nor trusted
+ """
+ domains = options.get('associateddomain')
+ if domains:
+ trust_suffix_namespace = set()
+ trust_suffix_namespace.add(api_inst.env.domain.lower())
+
+ trust_objects = api_inst.Command.trust_find(sizelimit=0)['result']
+ for obj in trust_objects:
+ trustdomains = api_inst.Command.trustdomain_find(
+ obj['cn'][0], sizelimit=0)['result']
+ for domain in trustdomains:
+ trust_suffix_namespace.add(domain['cn'][0].lower())
+
+ for dom in domains:
+ if not str(dom).lower() in trust_suffix_namespace:
+ raise errors.ValidationError(
+ name=_('domain'),
+ error=_('The domain %s is neither IPA domain nor a trusted'
+ 'domain.') % dom
+ )
+
+
+@register()
+class certmapconfig(LDAPObject):
+ """
+ Certificate Identity Mapping configuration object
+ """
+ object_name = _('Certificate Identity Mapping configuration options')
+ default_attributes = ['ipacertmappromptusername']
+
+ container_dn = api.env.container_certmap
+
+ label = _('Certificate Identity Mapping Global Configuration')
+ label_singular = _('Certificate Identity Mapping Global Configuration')
+
+ takes_params = (
+ Bool(
+ 'ipacertmappromptusername',
+ cli_name='promptusername',
+ label=_('Prompt for the username'),
+ doc=_('Prompt for the username when multiple identities'
+ ' are mapped to a certificate'),
+ ),
+ )
+
+ permission_filter_objectclasses = ['ipacertmapconfigobject']
+ managed_permissions = {
+ 'System: Read Certmap Configuration': {
+ 'replaces_global_anonymous_aci': True,
+ 'ipapermbindruletype': 'all',
+ 'ipapermright': {'read', 'search', 'compare'},
+ 'ipapermdefaultattr': {
+ 'ipacertmappromptusername',
+ 'cn',
+ },
+ },
+ 'System: Modify Certmap Configuration': {
+ 'replaces_global_anonymous_aci': True,
+ 'ipapermright': {'write'},
+ 'ipapermdefaultattr': {
+ 'ipacertmappromptusername',
+ },
+ 'default_privileges': {
+ 'Certificate Identity Mapping Administrators'},
+ },
+ }
+
+
+@register()
+class certmapconfig_mod(LDAPUpdate):
+ __doc__ = _('Modify Certificate Identity Mapping configuration.')
+
+
+@register()
+class certmapconfig_show(LDAPRetrieve):
+ __doc__ = _('Show the current Certificate Identity Mapping configuration.')
+
+
+@register()
+class certmaprule(LDAPObject):
+ """
+ Certificate Identity Mapping Rules
+ """
+
+ label = _('Certificate Identity Mapping Rules')
+ label_singular = _('Certificate Identity Mapping Rule')
+
+ object_name = _('Certificate Identity Mapping Rule')
+ object_name_plural = _('Certificate Identity Mapping Rules')
+ object_class = ['ipacertmaprule']
+
+ container_dn = api.env.container_certmaprules
+ default_attributes = [
+ 'cn', 'description',
+ 'ipacertmapmaprule',
+ 'ipacertmapmatchrule',
+ 'associateddomain',
+ 'ipacertmappriority',
+ 'ipaenabledflag'
+ ]
+ search_attributes = [
+ 'cn', 'description',
+ 'ipacertmapmaprule',
+ 'ipacertmapmatchrule',
+ 'associateddomain',
+ 'ipacertmappriority',
+ 'ipaenabledflag'
+ ]
+
+ takes_params = (
+ Str(
+ 'cn',
+ cli_name='rulename',
+ primary_key=True,
+ label=_('Rule name'),
+ doc=_('Certificate Identity Mapping Rule name'),
+ ),
+ Str(
+ 'description?',
+ cli_name='desc',
+ label=_('Description'),
+ doc=_('Certificate Identity Mapping Rule description'),
+ ),
+ Str(
+ 'ipacertmapmaprule?',
+ cli_name='maprule',
+ label=_('Mapping rule'),
+ doc=_('Rule used to map the certificate with a user entry'),
+ ),
+ Str(
+ 'ipacertmapmatchrule?',
+ cli_name='matchrule',
+ label=_('Matching rule'),
+ doc=_('Rule used to check if a certificate can be used for'
+ ' authentication'),
+ ),
+ DNSNameParam(
+ 'associateddomain*',
+ cli_name='domain',
+ label=_('Domain name'),
+ doc=_('Domain where the user entry will be searched'),
+ ),
+ Int(
+ 'ipacertmappriority?',
+ cli_name='priority',
+ label=_('Priority'),
+ doc=_('Priority of the rule (higher number means lower priority'),
+ minvalue=0,
+ ),
+ Flag(
+ 'ipaenabledflag?',
+ label=_('Enabled'),
+ flags=['no_option'],
+ default=True
+ ),
+ )
+
+ permission_filter_objectclasses = ['ipacertmaprule']
+ managed_permissions = {
+ 'System: Add Certmap Rules': {
+ 'replaces_global_anonymous_aci': True,
+ 'ipapermright': {'add'},
+ 'default_privileges': {
+ 'Certificate Identity Mapping Administrators'},
+ },
+ 'System: Read Certmap Rules': {
+ 'replaces_global_anonymous_aci': True,
+ 'ipapermbindruletype': 'all',
+ 'ipapermright': {'read', 'search', 'compare'},
+ 'ipapermdefaultattr': {
+ 'objectclass', 'cn', 'description',
+ 'ipacertmapmaprule', 'ipacertmapmatchrule', 'associateddomain',
+ 'ipacertmappriority', 'ipaenabledflag',
+ },
+ },
+ 'System: Delete Certmap Rules': {
+ 'replaces_global_anonymous_aci': True,
+ 'ipapermright': {'delete'},
+ 'default_privileges': {
+ 'Certificate Identity Mapping Administrators'},
+ },
+ 'System: Modify Certmap Rules': {
+ 'replaces_global_anonymous_aci': True,
+ 'ipapermright': {'write'},
+ 'ipapermdefaultattr': {
+ 'objectclass', 'cn', 'description',
+ 'ipacertmapmaprule', 'ipacertmapmatchrule', 'associateddomain',
+ 'ipacertmappriority', 'ipaenabledflag',
+ },
+ 'default_privileges': {
+ 'Certificate Identity Mapping Administrators'},
+ },
+ }
+
+
+@register()
+class certmaprule_add(LDAPCreate):
+ __doc__ = _('Create a new Certificate Identity Mapping Rule.')
+
+ msg_summary = _('Added Certificate Identity Mapping Rule "%(value)s"')
+
+ def pre_callback(self, ldap, dn, entry_attrs, attrs_list, *keys,
+ **options):
+ check_associateddomain_is_trusted(self.api, options)
+ return dn
+
+
+@register()
+class certmaprule_mod(LDAPUpdate):
+ __doc__ = _('Modify a Certificate Identity Mapping Rule.')
+
+ msg_summary = _('Modified Certificate Identity Mapping Rule "%(value)s"')
+
+ def pre_callback(self, ldap, dn, entry_attrs, attrs_list, *keys,
+ **options):
+ check_associateddomain_is_trusted(self.api, options)
+ return dn
+
+
+@register()
+class certmaprule_find(LDAPSearch):
+ __doc__ = _('Search for Certificate Identity Mapping Rules.')
+
+ msg_summary = ngettext(
+ '%(count)d Certificate Identity Mapping Rule matched',
+ '%(count)d Certificate Identity Mapping Rules matched', 0
+ )
+
+
+@register()
+class certmaprule_show(LDAPRetrieve):
+ __doc__ = _('Display information about a Certificate Identity Mapping'
+ ' Rule.')
+
+
+@register()
+class certmaprule_del(LDAPDelete):
+ __doc__ = _('Delete a Certificate Identity Mapping Rule.')
+
+ msg_summary = _('Deleted Certificate Identity Mapping Rule "%(value)s"')
+
+
+@register()
+class certmaprule_enable(LDAPQuery):
+ __doc__ = _('Enable a Certificate Identity Mapping Rule.')
+
+ msg_summary = _('Enabled Certificate Identity Mapping Rule "%(value)s"')
+ has_output = output.standard_value
+
+ def execute(self, cn, **options):
+ ldap = self.obj.backend
+
+ dn = self.obj.get_dn(cn)
+ try:
+ entry_attrs = ldap.get_entry(dn, ['ipaenabledflag'])
+ except errors.NotFound:
+ self.obj.handle_not_found(cn)
+
+ entry_attrs['ipaenabledflag'] = ['TRUE']
+
+ try:
+ ldap.update_entry(entry_attrs)
+ except errors.EmptyModlist:
+ pass
+
+ return dict(
+ result=True,
+ value=pkey_to_value(cn, options),
+ )
+
+
+@register()
+class certmaprule_disable(LDAPQuery):
+ __doc__ = _('Disable a Certificate Identity Mapping Rule.')
+
+ msg_summary = _('Disabled Certificate Identity Mapping Rule "%(value)s"')
+ has_output = output.standard_value
+
+ def execute(self, cn, **options):
+ ldap = self.obj.backend
+
+ dn = self.obj.get_dn(cn)
+ try:
+ entry_attrs = ldap.get_entry(dn, ['ipaenabledflag'])
+ except errors.NotFound:
+ self.obj.handle_not_found(cn)
+
+ entry_attrs['ipaenabledflag'] = ['FALSE']
+
+ try:
+ ldap.update_entry(entry_attrs)
+ except errors.EmptyModlist:
+ pass
+
+ return dict(
+ result=True,
+ value=pkey_to_value(cn, options),
+ )
diff --git a/ipaserver/plugins/stageuser.py b/ipaserver/plugins/stageuser.py
index 560251486..c7ea478ab 100644
--- a/ipaserver/plugins/stageuser.py
+++ b/ipaserver/plugins/stageuser.py
@@ -44,7 +44,9 @@ from .baseuser import (
baseuser_add_principal,
baseuser_remove_principal,
baseuser_add_manager,
- baseuser_remove_manager)
+ baseuser_remove_manager,
+ baseuser_add_certmapdata,
+ baseuser_remove_certmapdata)
from ipalib.request import context
from ipalib.util import set_krbcanonicalname
from ipalib import _, ngettext
@@ -772,3 +774,15 @@ class stageuser_add_principal(baseuser_add_principal):
class stageuser_remove_principal(baseuser_remove_principal):
__doc__ = _('Remove principal alias from the stageuser entry')
msg_summary = _('Removed aliases from stageuser "%(value)s"')
+
+
+@register()
+class stageuser_add_certmapdata(baseuser_add_certmapdata):
+ __doc__ = _("Add one or more certificate mappings to the stage user"
+ " entry.")
+
+
+@register()
+class stageuser_remove_certmapdata(baseuser_remove_certmapdata):
+ __doc__ = _("Remove one or more certificate mappings from the stage user"
+ " entry.")
diff --git a/ipaserver/plugins/user.py b/ipaserver/plugins/user.py
index 88171cf40..2d29dfb11 100644
--- a/ipaserver/plugins/user.py
+++ b/ipaserver/plugins/user.py
@@ -22,7 +22,6 @@ import time
from time import gmtime, strftime
import posixpath
import os
-
import six
from ipalib import api
@@ -46,7 +45,9 @@ from .baseuser import (
baseuser_add_cert,
baseuser_remove_cert,
baseuser_add_principal,
- baseuser_remove_principal)
+ baseuser_remove_principal,
+ baseuser_add_certmapdata,
+ baseuser_remove_certmapdata)
from .idviews import remove_ipaobject_overrides
from ipalib.plugable import Registry
from .baseldap import (
@@ -179,6 +180,7 @@ class user(baseuser):
'secretary', 'usercertificate',
'usersmimecertificate', 'x500uniqueidentifier',
'inetuserhttpurl', 'inetuserstatus',
+ 'ipacertmapdata',
},
'fixup_function': fix_addressbook_permission_bindrule,
},
@@ -366,6 +368,13 @@ class user(baseuser):
},
'default_privileges': {'PassSync Service'},
},
+ 'System: Manage User Certificate Mappings': {
+ 'ipapermright': {'write'},
+ 'ipapermdefaultattr': {'ipacertmapdata', 'objectclass'},
+ 'default_privileges': {
+ 'Certificate Identity Mapping Administrators'
+ },
+ },
}
takes_params = baseuser.takes_params + (
@@ -1185,6 +1194,16 @@ class user_remove_cert(baseuser_remove_cert):
@register()
+class user_add_certmapdata(baseuser_add_certmapdata):
+ __doc__ = _("Add one or more certificate mappings to the user entry.")
+
+
+@register()
+class user_remove_certmapdata(baseuser_remove_certmapdata):
+ __doc__ = _("Remove one or more certificate mappings from the user entry.")
+
+
+@register()
class user_add_manager(baseuser_add_manager):
__doc__ = _("Add a manager to the user entry")