Bug 1821181
| Summary: | Delete operation protection for admin user | |||
|---|---|---|---|---|
| Product: | Red Hat Enterprise Linux 8 | Reporter: | Daniele <dconsoli> | |
| Component: | ipa | Assignee: | Florence Blanc-Renaud <frenaud> | |
| Status: | CLOSED ERRATA | QA Contact: | Ganna Kaihorodova <gkaihoro> | |
| Severity: | medium | Docs Contact: | ||
| Priority: | medium | |||
| Version: | --- | CC: | abokovoy, fhanzelk, frenaud, gkaihoro, mpolovka, mvarun, pasik, rcritten, rjeffman, tscherf | |
| Target Milestone: | rc | Keywords: | Bugfix, Triaged | |
| Target Release: | --- | Flags: | pm-rhel:
mirror+
|
|
| Hardware: | All | |||
| OS: | All | |||
| Whiteboard: | ||||
| Fixed In Version: | ipa-4.9.12-6.module+el8.9.0+19634+c162f948 | Doc Type: | Bug Fix | |
| Doc Text: |
.Deleting the IdM `admin` user is now no longer permitted
Previously, nothing prevented you from deleting the Identity
Management (IdM) `admin` user if you were a member of the `admins` group. The absence of the `admin` user causes the trust between IdM and Active Directory (AD) to stop functioning correctly. With this update, you can no longer delete the `admin` user. As a result, the IdM-AD trust works correctly.
|
Story Points: | --- | |
| Clone Of: | ||||
| : | 2229712 (view as bug list) | Environment: | ||
| Last Closed: | 2023-11-14 15:32:50 UTC | Type: | Bug | |
| Regression: | --- | Mount Type: | --- | |
| Documentation: | --- | CRM: | ||
| Verified Versions: | Category: | --- | ||
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | ||
| Cloudforms Team: | --- | Target Upstream Version: | ||
| Embargoed: | ||||
| Bug Depends On: | ||||
| Bug Blocks: | 2229712 | |||
|
Description
Daniele
2020-04-06 09:08:53 UTC
Thank you taking your time and submitting this request for Red Hat Enterprise Linux 7. Unfortunately, this RFE cannot be kept even as a stretch goal and is moved to RHEL8 for proper evaluation. RHEL 7.9 is already near the end of a development phase and this bug cannot be kept for 7.9, hence it is moved to RHEL 8 for proper evaluation and planning. *** Bug 2003877 has been marked as a duplicate of this bug. *** Upstream ticket: https://pagure.io/freeipa/issue/8878 Fixed upstream master: https://pagure.io/freeipa/c/dea35922cd086883c0699646ec39fdef8f0ba579 Fixed upstream ipa-4-10: https://pagure.io/freeipa/c/4b02322fc786ee9caaa0380659507a2cec0d4101 Fixed upstream ipa-4-9: https://pagure.io/freeipa/c/f215d3f45396fa29bdd69f56096b50842df14908 Additional fix for the webui test: master: https://pagure.io/freeipa/c/e49ec1048db85f514e2db5960f773e5d56fa0cec Additional fix for the webui test: ipa-4-10: https://pagure.io/freeipa/c/13d5e88eb4ebb7a0132cbb050a9d230304ecbcff ipa-4-9: https://pagure.io/freeipa/c/7d62d84bdd3c2acd2f4bf70bb5fabf14c72e8ee7 Pre-verified using automation from test_webui/test_user.py with ipa-server-4.9.12-6.module+el8.9.0+19634+c162f948.x86_64 Failed test_webui/test_user.py::test_user::()::test_certificate_serial Passed test_webui/test_user.py::test_user::()::test_crud Passed test_webui/test_user.py::test_user::()::test_associations Passed test_webui/test_user.py::test_user::()::test_indirect_associations Passed test_webui/test_user.py::test_user::()::test_actions Passed test_webui/test_user.py::test_user::()::test_certificates Passed test_webui/test_user.py::test_user::()::test_password_expiration_notification Passed test_webui/test_user.py::test_user::()::test_grace_login_limit Passed test_webui/test_user.py::test_user::()::test_login_without_username Passed test_webui/test_user.py::test_user::()::test_disable_delete_admin Passed test_webui/test_user.py::test_user::()::test_add_user_special Passed test_webui/test_user.py::test_user::()::test_add_delete_undo_reset_multivalue Passed test_webui/test_user.py::test_user::()::test_user_misc Passed test_webui/test_user.py::test_user::()::test_menu_click_minimized_window Passed test_webui/test_user.py::test_user::()::test_enabled_by_default Passed test_webui/test_user.py::test_user_no_private_group::()::test_noprivate_nonposix Passed test_webui/test_user.py::test_user_no_private_group::()::test_noprivate_posix Passed test_webui/test_user.py::test_user_no_private_group::()::test_noprivate_gidnumber Passed test_webui/test_user.py::TestLifeCycles::()::test_life_cycles Passed test_webui/test_user.py::TestSSHkeys::()::test_ssh_keys The failure in test_certificate_serial is a known issue. Marking as pre-verified - tested. Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory (idm:client and idm:DL1 bug fix and enhancement update), and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHBA-2023:6977 |