Omar Pagan via FreeIPA-users wrote: > [root @ ldap01] ~ > $ ipa hbacrule-show deepcore-bastion > Rule name: deepcore-bastion > Enabled: True > User Groups: deepcore, amod-bastion > Hosts: deepcore-bastion.uaap.maxar.com > > [root @ ldap01] ~ > $ ipa group-show amod-bastion > Group name: amod-bastion > Description: Group to allow users to ssh to the amod-bastion > GID: 1571800140 > Member users: gr031529, ma032574, om008569 > Member of HBAC rule: deepcore-bastion > > [root @ ldap01] ~ > $ ipa hbactest --user gr031529 --host cpaac-bastion --service ssh > -------------------- > Access granted: True > -------------------- > Matched rules: allow_all > Not matched rules: admins_allow_all > Not matched rules: allow_systemd-user > Not matched rules: cpaac-bastion > Not matched rules: darc_admins_hbac > Not matched rules: deepcore-bastion > Not matched rules: shared-services-hbac > > IPA doesn't seem to be recognizing the `deepcore-bastion` rule for any of the > users... its only using the allow_all which at that point is not filtering > by groups or rules, am I doing something wrong here?
I see two potential issues: 1. There isn't a service associated with the deepcore-bastion rule 2. The rule will only work on host deepcore-bastion.uaap.maxar.com and you're testing against cpaac-bastion rob _______________________________________________ FreeIPA-users mailing list -- [email protected] To unsubscribe send an email to [email protected] Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedorahosted.org/archives/list/[email protected] Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/new_issue
