[root @ ldap01] ~ $ ipa hbacrule-show deepcore-bastion Rule name: deepcore-bastion Enabled: True User Groups: deepcore, amod-bastion Hosts: deepcore-bastion.uaap.maxar.com
[root @ ldap01] ~ $ ipa group-show amod-bastion Group name: amod-bastion Description: Group to allow users to ssh to the amod-bastion GID: 1571800140 Member users: gr031529, ma032574, om008569 Member of HBAC rule: deepcore-bastion [root @ ldap01] ~ $ ipa hbactest --user gr031529 --host cpaac-bastion --service ssh -------------------- Access granted: True -------------------- Matched rules: allow_all Not matched rules: admins_allow_all Not matched rules: allow_systemd-user Not matched rules: cpaac-bastion Not matched rules: darc_admins_hbac Not matched rules: deepcore-bastion Not matched rules: shared-services-hbac IPA doesn't seem to be recognizing the `deepcore-bastion` rule for any of the users... its only using the allow_all which at that point is not filtering by groups or rules, am I doing something wrong here? _______________________________________________ FreeIPA-users mailing list -- freeipa-users@lists.fedorahosted.org To unsubscribe send an email to freeipa-users-le...@lists.fedorahosted.org Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedorahosted.org/archives/list/freeipa-users@lists.fedorahosted.org Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/new_issue