[SSSD] Re: URI in HBAC rules - patch - request for feedback

2016-02-29 Thread Jan Pazdziora
On Mon, Feb 29, 2016 at 05:05:41PM +0100, Jakub Hrozek wrote: > On Mon, Feb 29, 2016 at 04:23:18PM +0100, Jan Pazdziora wrote: > > > > I don't really like this approach. You won't be able to do an "OR" > > operation, granting access to users from gro

[SSSD] Re: URI in HBAC rules - patch - request for feedback

2016-02-29 Thread Jan Pazdziora
se, but if we miss the rule existence altogether, we've just granted access we were not supposed to grant. -- Jan Pazdziora Senior Principal Software Engineer, Identity Management Engineering, Red Hat ___ sssd-devel mailing list sssd-devel@lists.fedor

[SSSD] Re: URI in HBAC rules - patch - request for feedback

2016-02-29 Thread Jan Pazdziora
y is to treat the prefix hostname/ as separate "object" to hostname/admin/. So whatever allow rules you put in for hostname/ will not be inherited / will not affect hostname/admin/. -- Jan Pazdziora Senior Principal Software Engineer, Identity Management Engineering, Red Hat ___

[SSSD] Re: URI in HBAC rules - patch - request for feedback

2016-02-29 Thread Jan Pazdziora
problems getting the IPA admins create the HBAC rules for them, but creating the extra user groups might be frowned upon by their IT department. Ideally the premissions should be able to work with the existing groups and users. -- Jan Pazdziora Senior Principal Software Eng

Re: [SSSD] sssd + pkcs11

2015-09-14 Thread Jan Pazdziora
e -- could we run the pam_start with the certificate as the login name parameter and pam_sss.so would check that the login name has newlines in it and starts with the correct PEM armor, so it would do the (equivalent of) org.freedesktop.sssd.infopipe.Users.FindByCertificate internally? We would t

Re: [SSSD] [PATCH] PAM: Add pam environment variable AUTH_DOMAIN to pam reply

2015-09-01 Thread Jan Pazdziora
ts semantics is likely to stay. -- Jan Pazdziora Senior Principal Software Engineer, Identity Management Engineering, Red Hat ___ sssd-devel mailing list sssd-devel@lists.fedorahosted.org https://lists.fedorahosted.org/mailman/listinfo/sssd-devel

Re: [SSSD] [PATCH] PAM: Add pam environment variable AUTH_DOMAIN to pam reply

2015-07-09 Thread Jan Pazdziora
On Tue, Jun 30, 2015 at 02:15:27PM +0200, Jan Pazdziora wrote: > > > If for the applications realm is also useful, then > > a) the app can query the sssd dbus interface for the matching realm > > for the domain > > b) we can also return the realm, although

Re: [SSSD] [PATCH] PAM: Add pam environment variable AUTH_DOMAIN to pam reply

2015-07-09 Thread Jan Pazdziora
the > full given name. But realms are case sensitive, aren't they? So while it should work for ad...@example.test, it should not for ad...@example.test. -- Jan Pazdziora Senior Principal Software Engineer, Identity Management Engineering, Red Hat __

Re: [SSSD] [PATCH] PAM: Add pam environment variable AUTH_DOMAIN to pam reply

2015-07-09 Thread Jan Pazdziora
.@xxexample.test) ... So it's nice that the canonical fully qualified name uses the SSSD domain (the same which I expect PAM stack to return in PAM_ENV_AUTH_DOMAIN), but: why am I able to authenticate as ad...@example.test@client.example.tst even if there is no example.test domain defi

Re: [SSSD] [PATCH] PAM: Add pam environment variable AUTH_DOMAIN to pam reply

2015-06-30 Thread Jan Pazdziora
On Tue, Jun 30, 2015 at 02:09:31PM +0200, Sumit Bose wrote: > On Tue, Jun 30, 2015 at 01:47:01PM +0200, Jan Pazdziora wrote: > > > > My only concern is that the domain name as returned by sssd is > > lowercase which does not really match the realm as seen by say

Re: [SSSD] [PATCH] PAM: Add pam environment variable AUTH_DOMAIN to pam reply

2015-06-30 Thread Jan Pazdziora
On Tue, Jun 30, 2015 at 02:00:16PM +0200, Jakub Hrozek wrote: > On Tue, Jun 30, 2015 at 01:47:01PM +0200, Jan Pazdziora wrote: > > > > My only concern is that the domain name as returned by sssd is > > lowercase which does not really match the realm as seen by say

Re: [SSSD] [PATCH] PAM: Add pam environment variable AUTH_DOMAIN to pam reply

2015-06-30 Thread Jan Pazdziora
match the realm as seen by say mod_auth_kerb or mod_auth_gssapi. But I guess uppercasing the string is up to consumer of that value. -- Jan Pazdziora | adelton at #ipa*, #brno Senior Principal Software Engineer, Identity Management Engineering, Red Hat ___

Re: [SSSD] RFC: Improving the debug messages

2015-06-30 Thread Jan Pazdziora
7;s easy to observe what is going on without getting into too much detail. > - anything that causes SSSD to fail to start should also emit a syslog > message. Admins don't really know about sssd debug logs. We have a ticket https://fedorahosted.org/sssd/ticket/2687 filed for this

Re: [SSSD] [RFC] PAM Conversation for OTP design

2015-02-20 Thread Jan Pazdziora
On Fri, Feb 20, 2015 at 01:54:15PM +0100, Sumit Bose wrote: > > So the calling application will see PAM_CONV_ERR but not the backends. Great. Thank you, -- Jan Pazdziora Principal Software Engineer, Identity Management Engineering, Red Hat __

Re: [SSSD] [RFC] PAM Conversation for OTP design

2015-02-20 Thread Jan Pazdziora
If at that point the caller (mod_authnz_pam.c) decides it needs to redirect to different web page to prompt the user with multiple password textfields and returns PAM_CONV_ERR, will that count as failed authentication on the backend side? -- Jan Pazdziora Principal Software Engineer, Identity Ma

Re: [SSSD] [RFC] PAM Conversation for OTP design

2015-02-20 Thread Jan Pazdziora
xtra page to ask for the second factor? -- Jan Pazdziora | adelton at #ipa*, #brno Principal Software Engineer, Identity Management Engineering, Red Hat ___ sssd-devel mailing list sssd-devel@lists.fedorahosted.org https://lists.fedorahosted.org/mailman/listinfo/sssd-devel

Re: [SSSD] Problems with SSSD RPM subpackage ordering

2014-11-12 Thread Jan Pazdziora
On Wed, Nov 12, 2014 at 03:02:43PM +0100, Jakub Hrozek wrote: > On Wed, Nov 12, 2014 at 02:48:28PM +0100, Jan Pazdziora wrote: > > > > I think Requires(pre) is the recommended syntax these days. It helps > > people remember that they can also use it for other scriptlet time

Re: [SSSD] Problems with SSSD RPM subpackage ordering

2014-11-12 Thread Jan Pazdziora
ommon = %{version}-%{release} I think Requires(pre) is the recommended syntax these days. It helps people remember that they can also use it for other scriptlet times if they need to. -- Jan Pazdziora Principal Software Engineer, Identity Management Engineering, Red Hat ___

Re: [SSSD] Design Discussion: Restricting domains per PAM service

2014-09-29 Thread Jan Pazdziora
pes not just define what their are, but also the behaviour of the rest of the sssd towards that object. It feels a bit more natural to say "for this domain, these users can consume the identities", than go the other way round. -- Jan Pazdziora Principal Software E

Re: [SSSD] Design Discussion: Restricting domains per PAM service

2014-09-22 Thread Jan Pazdziora
when the client can pass "u...@domain.they.should.not.know.ABOUT" to pam_start? -- Jan Pazdziora Principal Software Engineer, Identity Management Engineering, Red Hat ___ sssd-devel mailing list sssd-devel@lists.fedorahosted.org https://lists.f

Re: [SSSD] Design Discussion: Restricting domains per PAM service

2014-09-22 Thread Jan Pazdziora
s allowed/supposed to use. For this to work, sssd.conf would need to be amended each time and sssd restarted, adding new uid of the new Apache setup to the list of pam_trusted_users. Why eactly does the list of domains need to be protected by the list of uids? -- Jan Pazdzior

Re: [SSSD] [PATCH] PAM: Add domains= option to pam_sss

2014-08-03 Thread Jan Pazdziora
sing the PAM stack to find out which domain (and thus which identity) sssd actually used. So for "login", was it "lo...@emea.example.com" or "lo...@hq.example.com" that was used? Do we have a way to return the information to the application? -- Jan Pazdzi

Re: [SSSD] [PATCH] PAM: Add domains= option to pam_sss

2014-08-02 Thread Jan Pazdziora
h "login" or "lo...@emea.example.com"? -- Jan Pazdziora | adelton at #ipa*, #brno Principal Software Engineer, Identity Management Engineering, Red Hat ___ sssd-devel mailing list sssd-devel@lists.fedorahosted.org https://lists.fedorahosted.org/mailman/listinfo/sssd-devel

Re: [SSSD] Bus-activating the IFP responder by default

2014-07-03 Thread Jan Pazdziora
m dependencies if they need to. I wouldn't put it under sssd just yet -- maybe few years down the road it will become so widely used that it will be natural to have it in the list. I don't think we are there yet. -- Jan Pazdziora | adelton at #ipa*, #brno Principal Software Eng

Re: [SSSD] [RFC] [PATCH] Retry system bus connection once messagebus is up

2014-06-26 Thread Jan Pazdziora
let IFP spawn a client socket and implement > only a single 'command' to retry the connection. But that seems like an > overkill to me. The disadvantage of the signal is that it's also used to > reset the online status so in theory there might be some timeouts in the > offl

Re: [SSSD] [DESIGN DISCUSSION] Configuring SSSD

2014-06-13 Thread Jan Pazdziora
gt; - support of BOMs - encodings at the beginning of the file > - adding and or modifying comments Using set #comment should work. > - allowing to wrap values > - processing lists of values in a convenient way True. -- Jan Pazdziora | adelton at

Re: [SSSD] [DESIGN DISCUSSION] Configuring SSSD

2014-06-13 Thread Jan Pazdziora
rk enhancing Augeas sssd.conf lens to perhaps support things it cannot do today? For puppet-based projects and products, expressing the sssd.conf changes using Augeas is the most native way. -- Jan Pazdziora | adelton at #ipa*, #brno Principal Software Engineer, Identity Management Engineer

Re: [SSSD] [DESIGN DISCUSSION] Configuring SSSD

2014-06-13 Thread Jan Pazdziora
l have general benefit It can modify the ini files. > Cons of augeas > - not integrated into SSSD and GSS proxy > - does not have advanced features (to be verified) > - less control and thus slower turn around It's probably bigger code than smaller-purpose library. -- Jan P

Re: [SSSD] [PATCH] Extend the LDAP attribute map with custom options

2014-04-30 Thread Jan Pazdziora
LookupUserAttr firstname REMOTE_USER_FIRSTNAME LookupUserAttr lastname REMOTE_USER_LASTNAME -- Jan Pazdziora | adelton at #ipa*, #brno Principal Software Engineer, Identity Management Engineering, Red Hat ___ sssd-devel mailing

Re: [SSSD] [PATCH] Extend the LDAP attribute map with custom options

2014-04-22 Thread Jan Pazdziora
hough I wonder, should the order be the reverse ? > I think of it as assignments so mentally I would visualize them as: > ldap_user_extra_attrs = internal_name_1:ldap_name_1, > internal_name_2:ldap_name_2 How about ldap_user_extra_attrs = internal_name_1=ldap_name_1, internal_name_2=ld