Skip to content
Snippets Groups Projects
Select Git revision
  • master default protected
  • v1.14.7
  • v1.14.6
  • v1.14.5
  • v1.14.4
  • v1.14.3
  • v1.14.2
  • v1.14.1
  • v1.14.0
  • v1.13.2
  • v1.13.1
  • v1.13.0
  • v1.12.1
  • v1.12.0
  • v1.11.1
  • v1.11.0
  • v1.10.0
  • v1.9.2
  • v1.9.1
  • v1.9.0
  • v1.8.4
21 results

README-idrange.md

Blame
  • Idrange module

    Description

    The idrange module allows the management of ID ranges.

    In general it is not necessary to modify or delete ID ranges. If there is no other way to achieve a certain configuration than to modify or delete an ID range it should be done with great care. Because UIDs are stored in the file system and are used for access control it might be possible that users are allowed to access files of other users if an ID range got deleted and reused for a different domain.

    Use cases

    • Add an ID range from a transitively trusted domain

    If the trusted domain (A) trusts another domain (B) as well and this trust is transitive 'ipa trust-add domain-A' will only create a range for domain A. The ID range for domain B must be added manually.

    • Add an additional ID range for the local domain

    If the ID range of the local domain is exhausted, i.e. no new IDs can be assigned to Posix users or groups by the DNA plugin, a new range has to be created to allow new users and groups to be added. (Currently there is no connection between this range CLI and the DNA plugin, but a future version might be able to modify the configuration of the DNS plugin as well).

    Features

    • ID Range management

    Supported FreeIPA Versions

    FreeIPA versions 4.4.0 and up are supported by the ipaidrange module.

    Requirements

    Controller

    • Ansible version: 2.8+

    Node

    • Supported FreeIPA version (see above)

    Usage

    Example inventory file

    [ipaserver]
    ipaserver.test.local

    Example playbook to ensure a local domain idrange is present:

    ---
    - name: Playbook to manage IPA idrange.
      hosts: ipaserver
      become: no
    
      tasks:
      - name: Ensure an ID Range for the local domain is present.
        ipaidrange:
          ipaadmin_password: SomeADMINpassword
          name: local_domain_id_range
          base_id: 150000
          range_size: 200000

    Example playbook to ensure a local domain idrange is present, with RID and secondary RID base values:

    ---
    - name: Playbook to manage IPA idrange.
      hosts: ipaserver
      become: no
    
      tasks:
      - name: Ensure local idrange is present
        ipaidrange:
          ipaadmin_password: SomeADMINpassword
          name: local_domain_id_range
          base_id: 150000000
          range_size: 200000
          rid_base: 1000000
          secondary_rid_base: 200000000

    Example playbook to ensure an AD-trust idrange is present, with range type 'trust-ad' and using domain SID:

    ---
    - name: Playbook to manage IPA idrange.
      hosts: ipaserver
      become: no
    
      tasks:
      - name: Ensure AD-trust idrange is present
        ipaidrange:
          ipaadmin_password: SomeADMINpassword
          name: ad_id_range
          base_id: 150000000
          range_size: 200000
          idrange_type: ipa-ad-trust
          dom_sid: S-1-5-21-2870384104-3340008087-3140804251

    Example playbook to ensure an AD-trust idrange is present, with range type 'trust-ad-posix' and using domain SID:

    ---
    - name: Playbook to manage IPA idrange.
      hosts: ipaserver
      become: no
    
      tasks:
      - name: Ensure AD-trust idrange is present
        ipaidrange:
          name: ad_posix_id_range
          base_id: 150000000
          range_size: 200000
          idrange_type: ipa-ad-trust-posix
          dom_name: ad.ipa.test

    Example playbook to ensure an AD-trust idrange has auto creation of groups set to 'hybrid':

    ---
    - name: Playbook to manage IPA idrange.
      hosts: ipaserver
      become: no
    
      tasks:
      - name: Modify AD-trust idrange 'auto_private_groups'
        ipaidrange:
          ipaadmin_password: SomeADMINpassword
          ipaapi_context: "{{ ipa_context | default(omit) }}"
          name: ad_id_range
          auto_private_groups: "hybrid"

    Example playbook to make sure an idrange is absent:

    ---
    - name: Playbook to manage IPA idrange.
      hosts: ipaserver
      become: no
    
      tasks:
      - name: Ensure ID range 'ad_id_range' is absent.
        ipaidrange:
          ipaadmin_password: SomeADMINpassword
          name: ad_id_range
          state: absent

    Variables

    Variable Description Required
    ipaadmin_principal The admin principal is a string and defaults to admin no
    ipaadmin_password The admin password is a string and is required if there is no admin ticket available on the node no
    ipaapi_context The context in which the module will execute. Executing in a server context is preferred. If not provided context will be determined by the execution environment. Valid values are server and client. no
    ipaapi_ldap_cache Use LDAP cache for IPA connection. The bool setting defaults to yes. (bool) no
    name | cn The list of idrange name strings. yes
    base_id | ipabaseid First Posix ID of the range. (int) yes, if state: present
    range_size | ipaidrangesize Number of IDs in the range. (int) yes, if state: present
    rid_base | ipabaserid First RID of the corresponding RID range. (int) no
    secondary_rid_base | ipasecondarybaserid First RID of the secondary RID range. (int) no
    dom_sid | ipanttrusteddomainsid Domain SID of the trusted domain. no
    idrange_type | iparangetype ID range type, one of ipa-ad-trust, ipa-ad-trust-posix, ipa-local. Only valid if idrange does not exist. no
    dom_name | ipanttrusteddomainname Name of the trusted domain. Can only be used when ipaapi_context: server. no
    auto_private_groups | ipaautoprivategroups Auto creation of private groups, one of true, false, hybrid. no
    delete_continue | continue Continuous mode: don't stop on errors. Valid only if state is absent. Default: no (bool) no
    state The state to ensure. It can be one of present, absent, default: present. no

    Notes

    DNA plugin in 389-ds will allocate IDs based on the ranges configured for the local domain. Currently the DNA plugin cannot be reconfigured itself based on the local ranges set via this family of commands.

    Manual configuration change has to be done in the DNA plugin configuration for the new local range. Specifically, The dnaNextRange attribute of 'cn=Posix IDs,cn=Distributed Numeric Assignment Plugin,cn=plugins,cn=config' has to be modified to match the new range.

    Authors

    Rafael Guterres Jeffman