Omar Pagan via FreeIPA-users wrote:
[root @ ldap01] ~
$ ipa hbacrule-show deepcore-bastion
Rule name: deepcore-bastion
Enabled: True
User Groups: deepcore, amod-bastion
Hosts:
deepcore-bastion.uaap.maxar.com
[root @ ldap01] ~
$ ipa group-show amod-bastion
Group name: amod-bastion
Description: Group to allow users to ssh to the amod-bastion
GID: 1571800140
Member users: gr031529, ma032574, om008569
Member of HBAC rule: deepcore-bastion
[root @ ldap01] ~
$ ipa hbactest --user gr031529 --host cpaac-bastion --service ssh
--------------------
Access granted: True
--------------------
Matched rules: allow_all
Not matched rules: admins_allow_all
Not matched rules: allow_systemd-user
Not matched rules: cpaac-bastion
Not matched rules: darc_admins_hbac
Not matched rules: deepcore-bastion
Not matched rules: shared-services-hbac
IPA doesn't seem to be recognizing the `deepcore-bastion` rule for any of the
users... its only using the allow_all which at that point is not filtering by groups or
rules, am I doing something wrong here?
I see two potential issues:
1. There isn't a service associated with the deepcore-bastion rule
2. The rule will only work on host
deepcore-bastion.uaap.maxar.com and
you're testing against cpaac-bastion
rob