New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
do not add fully-qualified suffix to already fully-qualified externalUser values in sudoers for IPA provider #5199
Comments
|
For the reference here is how the rule looks in the SSSD database: |
|
A tentative fix could be: |
|
Related FreeIPA part: freeipa/freeipa#4792 |
|
Any update? |
|
Is it possible to have other domain separator then @ in externalUser? Like 'DOMAIN\name'? |
|
@pbrezina no, FreeIPA will normalize the user name to always be user@domain. This is not upstream yet, in the current version you cannot even add such user or group directly to the rule. |
|
Ok, so I think your proposed patch should be enough since after this point we just treat it as plain sudoUser attribute. Do you plan to open a PR? |
SSSD normalizes externalUser attribute value the same way as a normal sudoUser attribute which supposed to be non-fully qualified. This, however, breaks for trusted AD users/groups because they are already qualified. Note that FreeIPA currently doesn't allow to specify AD users and groups in externalUser attribute but the work to add this is under way and is pending this fix. Fixes: SSSD#5199
SSSD normalizes externalUser attribute value the same way as a normal sudoUser attribute which supposed to be non-fully qualified. This, however, breaks for trusted AD users/groups because they are already qualified. Note that FreeIPA currently doesn't allow to specify AD users and groups in externalUser attribute but the work to add this is under way and is pending this fix. Fixes: SSSD#5199
SSSD normalizes externalUser attribute value the same way as a normal sudoUser attribute which supposed to be non-fully qualified. This, however, breaks for trusted AD users/groups because they are already qualified. Note that FreeIPA currently doesn't allow to specify AD users and groups in externalUser attribute but the work to add this is under way and is pending this fix. Fixes: SSSD#5199
I'm working on enabling users and groups from trusted Active Directory domains to be part of sudo rules in IPA. The end result is that fully qualified AD users and groups are stored in
externalUserattribute. Here is an example for non-POSIX groups with%:prefix.SSSD normalizes
externalUsercontent the same way as normalsudoUserwhich supposed to be non-fully qualified. This, however, breaks for trusted AD users/groups because they are already qualified.in src/providers/ipa/ipa_sudo_conversion.c:
sss_create_internal_fqnamethen unconditionally addsconf->dom->name. Perhaps, the easiest way would be to skip callingsss_create_internal_fqnamein case the value is already fully qualified and just dotalloc_asprintf()of the original name.The text was updated successfully, but these errors were encountered: