From 1be510f9529cb082f802408b472a77d074b394c0 Mon Sep 17 00:00:00 2001 From: Nicolas Vigier Date: Sun, 14 Apr 2013 13:46:12 +0000 Subject: Add zarb MLs html archives --- zarb-ml/mageia-sysadm/2010-November/000408.html | 130 ++++++++++++++++++++++++ 1 file changed, 130 insertions(+) create mode 100644 zarb-ml/mageia-sysadm/2010-November/000408.html (limited to 'zarb-ml/mageia-sysadm/2010-November/000408.html') diff --git a/zarb-ml/mageia-sysadm/2010-November/000408.html b/zarb-ml/mageia-sysadm/2010-November/000408.html new file mode 100644 index 000000000..f4732c3ed --- /dev/null +++ b/zarb-ml/mageia-sysadm/2010-November/000408.html @@ -0,0 +1,130 @@ + + + + [Mageia-sysadm] Usernames, uids, and groups + + + + + + + + + +

[Mageia-sysadm] Usernames, uids, and groups

+ Buchan Milne + bgmilne at multilinks.com +
+ Tue Nov 9 14:25:51 CET 2010 +

+
+ +
On Monday, 8 November 2010 17:40:24 Romain d'Alverny wrote:
+> On Mon, Nov 8, 2010 at 17:29, nicolas vigier <boklm at mars-attacks.org> wrote:
+> > On some machines like the svn server, we need to use pam_ldap to allow
+> > users access with their ldap accounts. But on others servers like
+> > alamut (web services), or the build nodes, normal users have no reason
+> > to login. On those servers, do you think we should restrict access with
+> > ssh configuration and a group, or disable pam_ldap completly on those
+> > servers and only use local accounts ?
+> 
+> What would be the risk(s) to use specific ldap groups for that
+> purpose? (managing all access in a similar way may be better, no?)
+
+Both have advantages and disadvantages, but the disadvantages for local 
+accounts increase with N*M (e.g. total number of operations to remove an 
+old/compromised account), whereas the disadvantages for LDAP increase with N.
+
+where N=number of users and M=number of hosts.
+
+Usually by the time N*M > 50 it becomes difficult to be sure passwords have 
+been removed everywhere etc.
+
+> > And groups. I think we could use the following groups :
+> >  * posix : promotes the user as posixAccount+sshPublicKey (in ldap), and
+> >   allows access to the svn and git using svn+ssh:// and git+ssh://
+> >  * packager : allows commits in packages repository, package submit using
+> >   mdvsys, additional permissions on bugzilla, access to the packages
+> >   maintainers database, etc ...
+> >  * web : for members of web team, allows commits in web repository
+> >  * documentation, translator, qa, marketing, etc ... :
+> >  * packagerapprentice, webapprentice, etc ... : for apprentices, with
+> >   more restricted access
+> >  * sysadm : gives admin permissions on all applications
+> 
+> LDAP groups should as well map team membership. So marketing team guys
+> would belong to such a marketingTeam group then.
+> 
+> > What do you think ?
+> 
+> We probably won't nail this one in one shot :-)
+> 
+> As for web, we would need three roles:
+>  - web-apprentice
+>  - web (commits to web repos and pushes to tests servers)
+>  - webmaster (pushes to prod servers)
+> 
+> We need groups as well for (not exclusive):
+>  - being a team representative (that is, in the Council)
+
+The current ACLs allow the DN listed in the 'manager' (single-valued) 
+attribute of a group to modify the member attribute of this group.
+
+Or, do we need these as mailing lists as well?
+
+>  - being an association member (eligible and elector)
+>  - being a board member
+>  - being the chair(wo)man
+> 
+> Are group belonging/ownership a "one-time" record or does it get
+> archived? (to access a history of past membership). Or should such a
+> history be built separately?
+
+Archiving isn't that easy, I would prefer a record to be kept when 
+appropriate.
+
+Regards,
+Buchan
+
+ + + + + + + + + + + +
+

+ +
+More information about the Mageia-sysadm +mailing list
+ -- cgit v1.2.1