Huang, Tony wrote: > Hi Rob, > > Thanks for the reply. This is what I have done so far. > > 1. Installed my custom container - cn=Multicast,dc=example,dc=com > 2. Created a group called x500 - > cn=x500,cn=groups,cn=accounts,dc=example,dc=com > 3. Added my account "tony" into the x500 group > 4. Created a x500 role > 5. Created a x500 privilege > 6. Created an IPA Permission - permission box checked, grants all access > (all, write, delete, read, etc), subtree is > cn=Multicast,dc=example,dc=com, memberOf has x500 group. > 7. Assigned the permission to the x500 privilege, and assigned the > privilege to x500 role. > 8. Using Jxplorer (LDAP browser) and logged in using > "uid=tony,cn=users,cn=accounts,dc=example,dc=com" > 9. Try adding/deleting entries under cn=Multicast,dc=example,dc=com and > get "Insufficient Access" > 10. If I associate my account "tony" with the "admins" group, I will be > able to add/delete/write. > > I also would like to assign anonymous read/search/compare access to > cn=Multicast,dc=example,dc=com > > nonetheless, it works if I add the ACIs manually: > > ldapmodify -D "cn=Directory Manager" -W -p 389 -h server.example.com > <http://server.example.com> -x > > dn: cn=Multicast,dc=example,dc=com > changetype: modify > add: aci > aci: (targetattr=*) (version 3.0; acl "Allow anonymous search"; > allow (read,search,compare) userdn= "ldap:///anyone";)
This is only the anonymous ACI, what did you manually add for the group ACI? > What am I missing here? You can use ipa permission-show <name> --all --raw to see the generated ACI. I sometimes find that easier to wrap my head around. You may notice important differences between your working and non-working configs. rob > > Thanks!!! > > --Tony > > > > > On Mon, Aug 14, 2023 at 10:39 AM Rob Crittenden <rcrit...@redhat.com > <mailto:rcrit...@redhat.com>> wrote: > > Super Tony via FreeIPA-users wrote: > > Hi, > > > > I have an IPA server running on RHEL 8.8. I added a subtree on top > of my domain - cn=Multicast,dc=example,dc=com, and I need to be able > to query anonymously for things that live underneath cn=Multicast, > and give users that belong to > cn=x500,cn=groups,cn=accounts,dc=example,dc=com write access. > > > > I am able to add ACI the traditional way against dn: > cn=Multicast,dc=example,dc=com and make anonymous search plus write > access work if I add it via ldapadd, however, I am unable to make it > work the way I want it if I add the ACI via IPA Permissions from the > IPA admin GUI. > > > > What am I missing here? > > It's impossible to say without seeing what you've done. > > rob > _______________________________________________ FreeIPA-users mailing list -- freeipa-users@lists.fedorahosted.org To unsubscribe send an email to freeipa-users-le...@lists.fedorahosted.org Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedorahosted.org/archives/list/freeipa-users@lists.fedorahosted.org Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/new_issue