Hi,
I was looking for an exact aci syntax example you tried that failed so I
could help you better with.
Did you do something like:
resourceACLS: certServer.ee.request.enrollment:submit:allow (submit)
user!="someBody" && group="Agents":All Agents other than
someBody may
submit an enrollment request
I got the syntax info from the link I gave you. Let me know if that's
what you tried.
Christina
On 04/24/2015 11:14 AM, Ali Khalidi wrote:
In my test, I've added an user to CM and assigned him Agent group
permissions.
now, I want to deny this user enrollment submission, so there are two
default and pre-existing ACLs of relevance:
certServer.ca.request.enrollment and certServer.ee.request.enrollment
in both I tried the following to the submit right:
change the submit right from allow to deny -> the user can still
submit and enroll a certificate
change back to allow, then added a deny rule with the username
specified -> the user can still submit and enroll a certificate
these were just experiments to understand how ACLs work.
my end goal, if possible with dogtag, and I would appreciate if you
point me to the right direction is:
restrict an agent to submit and execute and enrollment based on a
specific certificate profile.
having said the latter, the user_origreq looked promising for that
matter, but I have no clue how to create a new ACL with it. help is
appreciated in the area as well.
Thanks,
Ali
On Fri, Apr 24, 2015 at 7:31 PM, Christina Fu <cfu(a)redhat.com
<mailto:cfu@redhat.com>> wrote:
On 04/22/2015 02:17 AM, Ali Khalidi wrote:
> I've tried a simple example of using the ACL to block profile
> listing and it works. however, I want to disable a CA agent from
> submitting/approving or executing any enrollment requests. I've
> went through all the ACLs, and whenever I encountered a submit
> right, I flipped to deny. despite that the agent still is able to
> submit and enroll certificates.
>
information on access control can be found here:
https://access.redhat.com/documentation/en-US/Red_Hat_Certificate_System/...
It would help if you give us an acl example that you tried that
does not work?
>
> another aspect, I was looking into the user_orgreq ACL plugin.
> can someone provide and an example on how this can be used in the
> context of ACLs?
The user_origreq is an access evaluator plugin for the
UserOrigReqAccessEvaluator. Its primary purpose is for access
control during renewal. It checks to see the the authenticated
user and the original request ownership match.
Hope this helps.
>
> thanks,
>
>
> _______________________________________________
> Pki-users mailing list
> Pki-users(a)redhat.com <mailto:Pki-users@redhat.com>
>
https://www.redhat.com/mailman/listinfo/pki-users
_______________________________________________
Pki-users mailing list
Pki-users(a)redhat.com <mailto:Pki-users@redhat.com>
https://www.redhat.com/mailman/listinfo/pki-users