-
Notifications
You must be signed in to change notification settings - Fork 31
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Using service instead of user #11
Comments
Consider: ipa role-add "Self Password Reset"; Or create a permission for Type User with krbprincipalkey, userpassword and krbpasswordexpiration, and assign it to the role ipa-getkeytab -p 'ldap-passwd-reset/domain.told' -s domain.told -k /opt/IPAPasswordReset/ldap-passwd-reset.keytab; Then use in as follows in settings.py: LDAP_USER = "ldap-passwd-reset/domain.tld |
Thank you for feedback. |
Hi, Well, it's conceptual, from my point of view a user type account is for real users, and services accounts are for machines and services. In this case, "ldap-passwd-reset" is a service. Anyway, thanks for your nice work! |
what about password policies ? will it be followed if we have it as a services, |
Currently it's using an ipa user to reset password, instead of an ipa service.
The text was updated successfully, but these errors were encountered: