Bug 56798 - Use dedicated service account in univention-radius
Use dedicated service account in univention-radius
Status: NEW
Product: UCS
Classification: Unclassified
Component: Radius
UCS 5.0
Other Linux
: P5 normal (vote)
: ---
Assigned To: UCS maintainers
UCS maintainers
:
Depends on:
Blocks: 56796
  Show dependency treegraph
 
Reported: 2023-11-03 10:06 CET by Felix Botner
Modified: 2023-11-06 10:52 CET (History)
1 user (show)

See Also:
What kind of report is it?: ---
What type of bug is this?: ---
Who will be affected by this bug?: ---
How will those affected feel about the bug?: ---
User Pain:
Enterprise Customer affected?:
School Customer affected?:
ISV affected?:
Waiting Support:
Flags outvoted (downgraded) after PO Review:
Ticket number:
Bug group (optional):
Max CVSS v3 score:


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Felix Botner univentionstaff 2023-11-03 10:06:43 CET
We should switch from the machine account to a dedicated service account in the
univention-radius auth helper (at least 
modules/univention/radius/networkaccess.py).

Background: With Bug #56767 we want to disable access to password hashes for managed nodes. univention-radius needs access to the sambaNTPassword attribute  for verification and currently does this with machine credentials.
As we allow univention-radius on managed nodes, it will stop working if we implement the password hash attributes restriction for member servers.