[root @ ldap01] ~ 
$ ipa hbacrule-show deepcore-bastion
  Rule name: deepcore-bastion
  Enabled: True
  User Groups: deepcore, amod-bastion
  Hosts: deepcore-bastion.uaap.maxar.com

[root @ ldap01] ~ 
$ ipa group-show amod-bastion
  Group name: amod-bastion
  Description: Group to allow users to ssh to the amod-bastion
  GID: 1571800140
  Member users: gr031529, ma032574, om008569
  Member of HBAC rule: deepcore-bastion

[root @ ldap01] ~ 
$ ipa hbactest --user gr031529 --host cpaac-bastion --service ssh
--------------------
Access granted: True
--------------------
  Matched rules: allow_all
  Not matched rules: admins_allow_all
  Not matched rules: allow_systemd-user
  Not matched rules: cpaac-bastion
  Not matched rules: darc_admins_hbac
  Not matched rules: deepcore-bastion
  Not matched rules: shared-services-hbac

IPA doesn't seem to be recognizing the `deepcore-bastion` rule for any of the 
users...  its only using the allow_all which at that point is not filtering by 
groups or rules, am I doing something wrong here?
_______________________________________________
FreeIPA-users mailing list -- freeipa-users@lists.fedorahosted.org
To unsubscribe send an email to freeipa-users-le...@lists.fedorahosted.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedorahosted.org/archives/list/freeipa-users@lists.fedorahosted.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue

Reply via email to