Description of problem: When warden is set to ldap the New User option should not be visible as local users are not supported. When a new user is created via the New User option from a LDAP configured instance that user will be unable to login due to the warden value being set to ldap. Version-Release number of selected component (if applicable): katello-headpin-all-0.2.6-1.el6_2.noarch Steps to Reproduce: 1. Configure SAM (Katello) with auth type ldap. 2. Login with an administrative user 3. Navigate to the Administrator / Users tab 4. Note the New User option is available 5. Create new user 6. logout 7. Attempt to login with new user Actual results: Unable to login Expected results: Either support multiple wardens, r/w access to the ldap to create new users, or disable the new user link when warden is ldap.
The new user option is still valid under LDAP. Adding a user w/ a valid LDAP username allows you to set additional roles for that user. It might be worthwhile to remove the ability to set a password for the user, since that password would never get used in LDAP mode
Changing to RFE to disallow password setting on new user creation in LDAP auth mode
merged https://github.com/Katello/katello/pull/213/ Admins are no longer prompted for email/password when creating LDAP users However, if for some reason they disable LDAP mode after install (I'm not sure if this is supported or not) those users will not be able to login until a password is set by an admin
Verified: * candlepin-0.7.12-1.el6_3.noarch * candlepin-tomcat6-0.7.12-1.el6_3.noarch * katello-candlepin-cert-key-pair-1.0-1.noarch * katello-certs-tools-1.1.8-1h.el6_3.noarch * katello-cli-common-1.1.10-1h.el6_3.noarch * katello-cli-headpin-0.2.2-1.el6_2.noarch * katello-common-1.1.14-2h.el6_3.noarch * katello-configure-1.1.11-1h.el6_3.noarch * katello-glue-candlepin-1.1.14-2h.el6_3.noarch * katello-headpin-1.1.14-2h.el6_3.noarch * katello-headpin-all-1.1.14-2h.el6_3.noarch * katello-selinux-1.1.2-1h.el6_3.noarch
Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. http://rhn.redhat.com/errata/RHSA-2013-0544.html