Skip to content
This repository was archived by the owner on Oct 15, 2019. It is now read-only.

Conversation

nanoscopic
Copy link

Change internal LDAP group name to prevent external auth conflicts

The internal LDAP group name for the Velum admin user was 'Administrators'. Once external auth is enabld to a companies LDAP server, this causes anyone in an Administrators group there also to gain permission to be a cluster admin.

Changing the name of the group to CaaSP-Administrators to prevent this conflict from occurring and it to be explicity obvious what the group is intended to administrate.

…h conflicts

The internal LDAP group name for the Velum admin user was 'Administrators'. Once external auth is enabld to a companies LDAP server, this causes anyone in an Administrators group there also to gain permission to be a cluster admin.

Changing the name of the group to CaaSP-Administrators to prevent this conflict from occurring and it to be explicity obvious what the group is intended to administrate.
@dannysauer
Copy link
Contributor

Based on a quick grep, the Administrators string appears hard-coded in http://github.com/kubic-project/velum in a few places. One appears to just be a fall-back if not specified, but it'd be a good idea to double-check on that.

Otherwise, this LGTM - once you (or someone) has figured out how this gets applied to an existing cluster in an update situation and noted that either here or in the bugzilla record. :)

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants