1SSSD-SIMPLE(5) File Formats and Conventions SSSD-SIMPLE(5)
2
3
4
6 sssd-simple - the configuration file for SSSD's 'simple' access-control
7 provider
8
10 This manual page describes the configuration of the simple
11 access-control provider for sssd(8). For a detailed syntax reference,
12 refer to the “FILE FORMAT” section of the sssd.conf(5) manual page.
13
14 The simple access provider grants or denies access based on an access
15 or deny list of user or group names. The following rules apply:
16
17 · If all lists are empty, access is granted
18
19 · If any list is provided, the order of evaluation is allow,deny.
20 This means that any matching deny rule will supersede any matched
21 allow rule.
22
23 · If either or both "allow" lists are provided, all users are denied
24 unless they appear in the list.
25
26 · If only "deny" lists are provided, all users are granted access
27 unless they appear in the list.
28
29
31 Refer to the section “DOMAIN SECTIONS” of the sssd.conf(5) manual page
32 for details on the configuration of an SSSD domain.
33
34 simple_allow_users (string)
35 Comma separated list of users who are allowed to log in.
36
37 simple_deny_users (string)
38 Comma separated list of users who are explicitly denied access.
39
40 simple_allow_groups (string)
41 Comma separated list of groups that are allowed to log in. This
42 applies only to groups within this SSSD domain. Local groups are
43 not evaluated.
44
45 simple_deny_groups (string)
46 Comma separated list of groups that are explicitly denied access.
47 This applies only to groups within this SSSD domain. Local groups
48 are not evaluated.
49
50 Specifying no values for any of the lists is equivalent to skipping it
51 entirely. Beware of this while generating parameters for the simple
52 provider using automated scripts.
53
54 Please note that it is an configuration error if both,
55 simple_allow_users and simple_deny_users, are defined.
56
58 The following example assumes that SSSD is correctly configured and
59 example.com is one of the domains in the [sssd] section. This examples
60 shows only the simple access provider-specific options.
61
62 [domain/example.com]
63 access_provider = simple
64 simple_allow_users = user1, user2
65
66
68 The complete group membership hierarchy is resolved before the access
69 check, thus even nested groups can be included in the access lists.
70 Please be aware that the “ldap_group_nesting_level” option may impact
71 the results and should be set to a sufficient value. (sssd-ldap(5))
72 option.
73
75 sssd(8), sssd.conf(5), sssd-ldap(5), sssd-krb5(5), sssd-simple(5),
76 sssd-ipa(5), sssd-ad(5), sssd-files(5), sssd-sudo(5), sssd-session-
77 recording(5), sss_cache(8), sss_debuglevel(8), sss_obfuscate(8),
78 sss_seed(8), sssd_krb5_locator_plugin(8), sss_ssh_authorizedkeys(8),
79 sss_ssh_knownhostsproxy(8), sssd-ifp(5), pam_sss(8). sss_rpcidmapd(5)
80 sssd-systemtap(5)
81
83 The SSSD upstream - https://pagure.io/SSSD/sssd/
84
85
86
87SSSD 03/28/2019 SSSD-SIMPLE(5)