Este conteúdo não está disponível no idioma selecionado.
Chapter 19. Managing self-service rules in IdM using the CLI
Learn about self-service rules in Identity Management (IdM) and how to create and edit self-service access rules on the command line (CLI).
19.1. Self-service access control in IdM Copiar o linkLink copiado para a área de transferência!
Self-service access control rules define which operations an Identity Management (IdM) entity can perform on its IdM Directory Server entry: for example, IdM users have the ability to update their own passwords.
This method of control allows an authenticated IdM entity to edit specific attributes within its LDAP entry, but does not allow add or delete operations on the entire entry.
Be careful when working with self-service access control rules: configuring access control rules improperly can inadvertently elevate an entity’s privileges.
19.2. Creating self-service rules using the CLI Copiar o linkLink copiado para a área de transferência!
Follow this procedure to create self-service access rules in IdM using the command line (CLI).
Prerequisites
- Administrator privileges for managing IdM or the User Administrator role.
- An active Kerberos ticket. For details, see Using kinit to log in to IdM manually.
Procedure
To add a self-service rule, use the
ipa selfservice-addcommand and specify the following two options:--permissions- sets the read and write permissions the Access Control Instruction (ACI) grants.
--attrssets the complete list of attributes to which this ACI grants permission.
For example, to create a self-service rule allowing users to modify their own name details:
Copy to Clipboard Copied! Toggle word wrap Toggle overflow
19.3. Editing self-service rules using the CLI Copiar o linkLink copiado para a área de transferência!
Follow this procedure to edit self-service access rules in IdM using the command line (CLI).
Prerequisites
- Administrator privileges for managing IdM or the User Administrator role.
- An active Kerberos ticket. For details, see Using kinit to log in to IdM manually.
Procedure
-
Optional: Display existing self-service rules with the
ipa selfservice-findcommand. -
Optional: Display details for the self-service rule you want to modify with the
ipa selfservice-showcommand. Use the
ipa selfservice-modcommand to edit a self-service rule.For example:
Copy to Clipboard Copied! Toggle word wrap Toggle overflow ImportantUsing the
ipa selfservice-modcommand overwrites the previously defined permissions and attributes, so always include the complete list of existing permissions and attributes along with any new ones you want to define.
Verification
Use the
ipa selfservice-showcommand to display the self-service rule you edited.ipa selfservice-show "Users can manage their own name details"
$ ipa selfservice-show "Users can manage their own name details" -------------------------------------------------------------- Self-service name: Users can manage their own name details Permissions: write Attributes: givenname, displayname, title, initialsCopy to Clipboard Copied! Toggle word wrap Toggle overflow
19.4. Deleting self-service rules using the CLI Copiar o linkLink copiado para a área de transferência!
Follow this procedure to delete self-service access rules in IdM using the command line (CLI).
Prerequisites
- Administrator privileges for managing IdM or the User Administrator role.
- An active Kerberos ticket. For details, see Using kinit to log in to IdM manually.
Procedure
Use the
ipa selfservice-delcommand to delete a self-service rule.For example:
ipa selfservice-del "Users can manage their own name details"
$ ipa selfservice-del "Users can manage their own name details" ----------------------------------------------------------- Deleted selfservice "Users can manage their own name details" -----------------------------------------------------------Copy to Clipboard Copied! Toggle word wrap Toggle overflow
Verification
-
Use the
ipa selfservice-findcommand to display all self-service rules. The rule you just deleted should be missing.