<html>
<head>
<meta content="text/html; charset=ISO-8859-1"
http-equiv="Content-Type">
</head>
<body bgcolor="#FFFFFF" text="#000000">
<div class="moz-cite-prefix">On 03/30/2015 01:03 PM, Petr Spacek
wrote:<br>
</div>
<blockquote cite="mid:55192D69.3000408@redhat.com" type="cite">
<pre wrap="">On 30.3.2015 11:50, thierry bordaz wrote:
</pre>
<blockquote type="cite">
<pre wrap="">Hello,
The aci "Admin read-only attributes" grants, for the complete
suffix, read access to 'admin' users for the following attributes.
"ipaUniqueId || memberOf || enrolledBy || krbExtraData ||
krbPrincipalName || krbCanonicalName || krbPasswordExpiration ||
krbLastPwdChange || krbLastSuccessfulAuth || krbLastFailedAuth"
"userPassword" and "krbPrincipalKey" are not "read-only" attributes
so I guess it is the reason why they are not part of this list.
For User life cycle, I would need admin users to be granted read
access on "userPassword" and "krbPrincipalKey".
The scope could be limited to Stage container but I was wondering if
there is a security reason to not grant read access on the full suffix ?
</pre>
</blockquote>
<pre wrap="">
AFAIK admins were not given read access to keys and passwords on purpose as a
security measure. It prevents accidental key disclosure when admin does
ldapsearch and posts result somewhere (e.g. while debugging something).</pre>
</blockquote>
Yes that sounds a very good reason.<br>
<blockquote cite="mid:55192D69.3000408@redhat.com" type="cite">
<pre wrap="">
I did not follow the whole user life-cycle discussion. Why you need read
access to it? Is it because you plan to do add/del instead of modrdn?
</pre>
</blockquote>
There are two use case where I think I need access to those
attributes:<br>
<ul>
<li>A stage entry can have userpassword/krb keys attributes.<br>
When activating an entry those values are copied to a the active
entry.<br>
So the newly active user can authenticate with the credential
set while his entry was in stage container.<br>
In that case, it would need a read access because the stage
entry is copied into a new entry (ADD).</li>
<li>An active entry is deleted (preserve mode), so the entry is
modrdn to the delete container.<br>
Then to prevent the reuse of old credential, those attibutes are
cleared.<br>
So here I would need a read/search/write access to those
attributes in the delete container.</li>
</ul>
<p>That means that if I limit the ACIs to stage/delete containers,
an admin could accidentally disclose stage/delete entries keys.<br>
</p>
<p>thanks<br>
thieryr<br>
</p>
</body>
</html>