[Authentication] [PATCHES] Add realmd support for configuring the AD GPO access-control

Stef Walter stefw at gnome.org
Tue Oct 7 03:24:31 PDT 2014


On 07.10.2014 12:22, Stephen Gallagher wrote:
> 
> 
> 
> 
>> On Oct 7, 2014, at 5:05 AM, Stef Walter <stefw at gnome.org> wrote:
>> 
>>>> On 06.10.2014 21:05, Stephen Gallagher wrote:
>>>> 
>>>> 
>>>> 
>>>>> On Mon, 2014-10-06 at 14:03 +0200, Stef Walter wrote:
>>>>>> On 06.10.2014 14:02, Stephen Gallagher wrote:
>>>>>> 
>>>>>> 
>>>>>> 
>>>>>>> On Mon, 2014-10-06 at 14:00 +0200, Stef Walter wrote:
>>>>>>>> On 06.10.2014 13:57, Stephen Gallagher wrote:
>>>>>>>> 
>>>>>>>> 
>>>>>>>> 
>>>>>>>>> On Mon, 2014-10-06 at 07:51 +0200, Stef Walter
>>>>>>>>> wrote:
>>>>>>>>>> On 02.10.2014 15:29, Stephen Gallagher wrote: Patch
>>>>>>>>>> 0001: Adds a routine to get a string from the 
>>>>>>>>>> realmd.conf with a default value if it's not
>>>>>>>>>> present.
>>>>>>>>> 
>>>>>>>>> Hmmm, I think defaults should be placed in 
>>>>>>>>> /usr/lib64/realmd/realmd-defaults.conf or 
>>>>>>>>> /usr/lib64/realmd/realmd-distro.conf, rather than in
>>>>>>>>> the code.
>>>>>>>>> 
>>>>>>>>> Was there a special reason for changing this?
>>>>>>>>> 
>>>>>>>> 
>>>>>>>> Mostly, I was trying to work around the potential
>>>>>>>> .rpmsave problem, but I realize on second look that the
>>>>>>>> defaults are actually in /usr not /etc, so they
>>>>>>>> wouldn't be vulnerable to this issue.
>>>>>>>> 
>>>>>>>>>> Patch 0002: Add the "enforce-gpo" option to the 
>>>>>>>>>> [active-directory] section and use it to set the 
>>>>>>>>>> ad_gpo_access_control setting in sssd.conf
>>>>>>>>> 
>>>>>>>>> Not sure what this does exactly, but I'm assuming it 
>>>>>>>>> controls the HBAC setting for SSSD. In realmd, the
>>>>>>>>> choice whether to use domain provided HBAC is
>>>>>>>>> controlled via the 'realm permit ...' options (and
>>>>>>>>> related DBus interface), and not via a default in the
>>>>>>>>> configuration file.
>>>>>>>>> 
>>>>>>>> 
>>>>>>>> Well, it controls a trinary state: disabled, permissive
>>>>>>>> or enforcing. This is in addition to the other two 
>>>>>>>> access-control features in the AD provider:
>>>>>>>> account-lock and ldap-filter.
>>>>>>>> 
>>>>>>>> If you'd prefer that realmd just simply always set it
>>>>>>>> to 'enforcing' mode if 'realm permit -a' has been
>>>>>>>> specified, I can do that and update the patch
>>>>>>>> accordingly.
>>>>>>> 
>>>>>>> I think that makes sense.
>>>>>>> 
>>>>>>> Related: I guess we don't have a command-line option for
>>>>>>>  "allow-any-login" which would map to "permissive" in
>>>>>>> your trinary state ... I wouldn't be against such an
>>>>>>> option though.
>>>>>> 
>>>>>> 
>>>>>> Actually, that could map to either 'permissive' or
>>>>>> 'disabled' and I'd argue that 'disabled' would make more
>>>>>> sense. 'permissive' goes through all of the logic to do an
>>>>>> enforcing check and then logs the result instead of
>>>>>> actually respecting it. That's a lot of overhead for
>>>>>> anything but a testing or migration case, I think.
>>>>> 
>>>>> Ah I see. Agreed.
>>>> 
>>>> 
>>>> 
>>>> I don't see a reason to add "allow-any-login" at this point.
>>>> It seems to me that "trust the domain" and "use this whitelist"
>>>> are probably sufficient at this point.
> 
> Ok.
> 
>>>> I've attached a completely different (and much simpler...)
>>>> patch that ensures that 'ad_access_gpo_access_control =
>>>> enforcing' no matter what (since if we use 'realm permit
>>>> <user>', this argument will just be ignored).
> 
> Does sssd barf if you put a parameter it doesn't recognize in the 
> config file? If so, we would need to somehow account for this and or 
> have a specific sssd version requirement, no?
> 
> 
>> SSSD will not have any issue with it.  There is a chance that the
>> SSSDConfig Python API will, though. The easiest thing to do might
>> be to just ask the SSSDConfig API if it recognizes the option and
>> use it if so. Is there an easy way to call out to Python code?

Sure:

python -c "my code"

:)

Stef


More information about the Authentication mailing list