Bug 761573
Summary: | [RFE] Integrate with SUDO utility | |||
---|---|---|---|---|
Product: | Red Hat Enterprise Linux 6 | Reporter: | Jakub Hrozek <jhrozek> | |
Component: | sssd | Assignee: | Jakub Hrozek <jhrozek> | |
Status: | CLOSED ERRATA | QA Contact: | Kaushik Banerjee <kbanerje> | |
Severity: | unspecified | Docs Contact: | ||
Priority: | high | |||
Version: | 6.3 | CC: | chorn, dgregor, dpal, grajaiya, jgalipea, mgracik, nikolai.kondrashov, pbrezina, prc, rleander, snagar | |
Target Milestone: | rc | Keywords: | FutureFeature | |
Target Release: | --- | |||
Hardware: | Unspecified | |||
OS: | Unspecified | |||
Whiteboard: | ||||
Fixed In Version: | sssd-1.9.1-1.el6 | Doc Type: | Enhancement | |
Doc Text: |
Cause: sudo rules can be stored in a centralized identity store such as LDAP and fetched over the network.
Consequence: When the network is not reachable, the sudo client cannot use the rules from the centralized source.
Change: A new sudo responder was implemented in the SSSD as well as a client library in the sudo itself. The SSSD is able to act as a transparent proxy for serving the sudo rules for the sudo binary,
Result: When the centralized sudo rules source is not available, for instance when the network is down, the SSSD is able to fall back to cached rules, providing transparent access to sudo rules from a centralized database.
|
Story Points: | --- | |
Clone Of: | ||||
: | 868943 (view as bug list) | Environment: | ||
Last Closed: | 2013-02-21 09:34:32 UTC | Type: | --- | |
Regression: | --- | Mount Type: | --- | |
Documentation: | --- | CRM: | ||
Verified Versions: | Category: | --- | ||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | ||
Cloudforms Team: | --- | Target Upstream Version: | ||
Embargoed: | ||||
Bug Depends On: | 759480, 971009 | |||
Bug Blocks: | 736854, 782183, 840699 |
Description
Jakub Hrozek
2011-12-08 16:14:47 UTC
Upstream ticket: https://fedorahosted.org/sssd/ticket/623 This request was not resolved in time for the current release. Red Hat invites you to ask your support representative to propose this request, if still desired, for consideration in the next release of Red Hat Enterprise Linux. This request was erroneously removed from consideration in Red Hat Enterprise Linux 6.4, which is currently under development. This request will be evaluated for inclusion in Red Hat Enterprise Linux 6.4. Mostly works, but there are still some important bugs. Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. http://rhn.redhat.com/errata/RHSA-2013-0508.html |