sssd-ifp - Man Page

SSSD InfoPipe responder

Description

This manual page describes the configuration of the InfoPipe responder for sssd(8). For a detailed syntax reference, refer to the “FILE FORMAT” section of the sssd.conf(5) manual page.

The InfoPipe responder provides a public D-Bus interface accessible over the system bus. The interface allows the user to query information about remote users and groups over the system bus.

Find by Valid Certificate

The following options can be used to control how the certificates are validated when using the FindByValidCertificate() API:

  • ca_db
  • p11_child_timeout
  • certificate_verification

For more details about the options see sssd.conf(5).

Configuration Options

These options can be used to configure the InfoPipe responder.

allowed_uids (string)

Specifies the comma-separated list of UID values or user names that are allowed to access the InfoPipe responder. User names are resolved to UIDs at startup.

Default: 0 (only the root user is allowed to access the InfoPipe responder)

Please note that although the UID 0 is used as the default it will be overwritten with this option. If you still want to allow the root user to access the InfoPipe responder, which would be the typical case, you have to add 0 to the list of allowed UIDs as well.

user_attributes (string)

Specifies the comma-separated list of white or blacklisted attributes.

By default, the InfoPipe responder only allows the default set of POSIX attributes to be requested. This set is the same as returned by getpwnam(3) and includes:

name

user's login name

uidNumber

user ID

gidNumber

primary group ID

gecos

user information, typically full name

homeDirectory

home directory

loginShell

user shell

It is possible to add another attribute to this set by using “+attr_name” or explicitly remove an attribute using “-attr_name”. For example, to allow “telephoneNumber” but deny “loginShell”, you would use the following configuration:

user_attributes = +telephoneNumber, -loginShell

Default: not set. Only the default set of POSIX attributes is allowed.

wildcard_limit (integer)

Specifies an upper limit on the number of entries that are downloaded during a wildcard lookup that overrides caller-supplied limit.

Default: 0 (let the caller set an upper limit)

See Also

sssd(8), sssd.conf(5), sssd-ldap(5), sssd-ldap-attributes(5), sssd-krb5(5), sssd-simple(5), sssd-ipa(5), sssd-ad(5), sssd-sudo(5), sssd-session-recording(5), sss_cache(8), sss_debuglevel(8), sss_obfuscate(8), sss_seed(8), sssd_krb5_locator_plugin(8), sss_ssh_authorizedkeys(1), sss_ssh_knownhosts(1), sssd-ifp(5), pam_sss(8). sss_rpcidmapd(5) sssd-systemtap(5)

Authors

The SSSD upstream - https://github.com/SSSD/sssd/

Referenced By

idmap_sss(8), pam_sss(8), pam_sss_gss(8), sss_cache(8), sssctl(8), sssd(8), sssd-ad(5), sssd.conf(5), sss_debuglevel(8), sssd-ipa(5), sssd-krb5(5), sssd_krb5_localauth_plugin(8), sssd_krb5_locator_plugin(8), sssd-ldap(5), sssd-ldap-attributes(5), sssd-session-recording(5), sssd-simple(5), sssd-sudo(5), sssd-systemtap(5), sss_obfuscate(8), sss_override(8), sss_seed(8), sss_ssh_authorizedkeys(1), sss_ssh_knownhosts(1).

10/22/2024 SSSD File Formats and Conventions