‐‐‐‐‐‐‐ Original Message ‐‐‐‐‐‐‐
On Monday, January 13, 2020 4:19 PM, Greg Hudson <ghud...@mit.edu> wrote:

> On 1/13/20 3:44 AM, Laura Smith wrote:
>
> > Am aware of the list ordering requirement, and to that extent the ACL entry 
> > in question was quite deliberately placed at the top.
>
> kadmind will continue on if the operation's target doesn't match the
> entry's target. So if you have a later entry for, say, "/admin ",
> then the line "saltstack/admin ADMCIL nfs/" would serve to deny access
> to nfs/ principals (because of the uppercase permission bits), butwould have 
> no effect on other target principals, or on operations with
> no target like list_principals.
>
> The documentation could probably be clarified here; it talks about "the
> first matching entry", but doesn't say what has to match.

Aah, so are we saying I should try something like :
saltstack/admin admcil nfs/*
saltstack/admin ADMCIL *

Bescially my end goal is to allow saltstack/admin to do what it likes (within 
reason) for nfs/* but keep it well away from anything more "important" (such as 
*/admin).


>
> > admcil nfs/@KRBTEST.COM, are you saying I should not be putting the 
> > wildcard asterisk after nfs/ ?
>
> The wildcard asterix was there in the mail I sent out (I checked my
> outgoing mail), but was apparently mangled by a piece of email software.

Yes, you're right. Have read your original and indeed asterisk is there.


________________________________________________
Kerberos mailing list           Kerberos@mit.edu
https://mailman.mit.edu/mailman/listinfo/kerberos

Reply via email to