Serviceguard Version A.11.16 Release Notes, 2nd Edition, September 2004
Serviceguard Version A.11.16 Release Notes, Second Edition
Known Problems and Workarounds
Chapter 1 51
JAGaf08686: It is not possible to configure some
combinations of roles
• What was the problem? Duplicate roles and conflicting roles are not
allowed in Access Control Policies. This is especially problematic
when wild cards are used. For example, if ANY_USER from
ANY_SERVICEGUARD_NODE has a role, no other Access Control
Policy can be created that would not conflict or be redundant. Every
user possible user already has a role.
But, what if you want everyone in the lab to have monitor access, one
smaller group to have package admin, and the manager, Jon, to have
full cluster admin. Until you remove the double wild card, you cannot
define another role.
• What was the workaround? Avoid broadly defined policies, especially
those with wildcards for both users and nodes. Instead define roles
for groups and individuals, or specify only certain nodes. For
example, the following policies have no conflicts or redundancies:
— You can create an /etc/passwd entry for a user ITlab, and give
everyone in the lab the passwords to log in as ITlab
— USER_NAME ITlab
— USER_HOST ANY_SERVICEGUARD_NODE
— USER_ROLE monitor
— For a smaller group or an individual, you can list individual
names:
— USER_NAME admin1 admin2 admin3 admin4
admin5 admin6 admin7 admin8
— USER_HOST CLUSTER_MEMBER_NODE
— USER_ROLE package_admin
— USER_NAME jon
— USER_HOST ANY_SERVICEGUARD_NODE
— USER_ROLE full_admin