Diff for /embedaddon/sudo/doc/sudoers.ldap.man.in between versions 1.1.1.4 and 1.1.1.6

version 1.1.1.4, 2013/07/22 10:46:12 version 1.1.1.6, 2014/06/15 16:12:54
Line 1 Line 1
 .\" DO NOT EDIT THIS FILE, IT IS NOT THE MASTER!  .\" DO NOT EDIT THIS FILE, IT IS NOT THE MASTER!
 .\" IT IS GENERATED AUTOMATICALLY FROM sudoers.ldap.mdoc.in  .\" IT IS GENERATED AUTOMATICALLY FROM sudoers.ldap.mdoc.in
 .\"  .\"
.\" Copyright (c) 2003-2013 Todd C. Miller <Todd.Miller@courtesan.com>.\" Copyright (c) 2003-2014 Todd C. Miller <Todd.Miller@courtesan.com>
 .\"  .\"
 .\" Permission to use, copy, modify, and distribute this software for any  .\" Permission to use, copy, modify, and distribute this software for any
 .\" purpose with or without fee is hereby granted, provided that the above  .\" purpose with or without fee is hereby granted, provided that the above
Line 16 Line 16
 .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.  .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
 .\" ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.  .\" ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
 .\"  .\"
.TH "SUDOERS.LDAP" "8" "April 25, 2013" "Sudo @PACKAGE_VERSION@" "OpenBSD System Manager's Manual".TH "SUDOERS.LDAP" "8" "February 7, 2014" "Sudo @PACKAGE_VERSION@" "OpenBSD System Manager's Manual"
 .nh  .nh
 .if n .ad l  .if n .ad l
 .SH "NAME"  .SH "NAME"
Line 138  It consists of the following attributes: Line 138  It consists of the following attributes:
 .TP 6n  .TP 6n
 \fBsudoUser\fR  \fBsudoUser\fR
 A user name, user ID (prefixed with  A user name, user ID (prefixed with
`#'),\(oq#\(cq),
 Unix group name or ID (prefixed with  Unix group name or ID (prefixed with
`%'\(oq%\(cq
 or  or
`%#'\(oq%#\(cq
 respectively), user netgroup (prefixed with  respectively), user netgroup (prefixed with
`+'),\(oq+\(cq),
 or non-Unix group name or ID (prefixed with  or non-Unix group name or ID (prefixed with
`%:'\(oq%:\(cq
 or  or
`%:#'\(oq%:#\(cq
 respectively).  respectively).
 Non-Unix group support is only available when an appropriate  Non-Unix group support is only available when an appropriate
 \fIgroup_plugin\fR  \fIgroup_plugin\fR
Line 159  object. Line 159  object.
 .TP 6n  .TP 6n
 \fBsudoHost\fR  \fBsudoHost\fR
 A host name, IP address, IP network, or host netgroup (prefixed with a  A host name, IP address, IP network, or host netgroup (prefixed with a
`+').\(oq+\(cq).
 The special value  The special value
 \fRALL\fR  \fRALL\fR
 will match any host.  will match any host.
Line 168  will match any host. Line 168  will match any host.
 A fully-qualified Unix command name with optional command line arguments,  A fully-qualified Unix command name with optional command line arguments,
 potentially including globbing characters (aka wild cards).  potentially including globbing characters (aka wild cards).
 If a command name is preceded by an exclamation point,  If a command name is preceded by an exclamation point,
`\&!',\(oq\&!\(cq,
 the user will be prohibited from running that command.  the user will be prohibited from running that command.
 .sp  .sp
 The built-in command  The built-in command
``\fRsudoedit\fR''\(lq\fRsudoedit\fR\(rq
 is used to permit a user to run  is used to permit a user to run
 \fBsudo\fR  \fBsudo\fR
 with the  with the
Line 181  option (or as Line 181  option (or as
 \fBsudoedit\fR).  \fBsudoedit\fR).
 It may take command line arguments just as a normal command does.  It may take command line arguments just as a normal command does.
 Note that  Note that
``\fRsudoedit\fR''\(lq\fRsudoedit\fR\(rq
 is a command built into  is a command built into
 \fBsudo\fR  \fBsudo\fR
 itself and must be specified in without a leading path.  itself and must be specified in without a leading path.
Line 197  This may be useful in situations where the user invoki Line 197  This may be useful in situations where the user invoki
 has write access to the command or its parent directory.  has write access to the command or its parent directory.
 The following digest formats are supported: sha224, sha256, sha384 and sha512.  The following digest formats are supported: sha224, sha256, sha384 and sha512.
 The digest name must be followed by a colon  The digest name must be followed by a colon
(`:\&')(\(oq:\&\(cq)
 and then the actual digest, in either hex or base64 format.  and then the actual digest, in either hex or base64 format.
 For example, given the following value for sudoCommand:  For example, given the following value for sudoCommand:
 .RS  
 .nf  .nf
 .sp  .sp
.RS 4n.RS 10n
 sha224:0GomF8mNN3wlDt1HD9XldjJ3SNgpFdbjO1+NsQ /bin/ls  sha224:0GomF8mNN3wlDt1HD9XldjJ3SNgpFdbjO1+NsQ /bin/ls
 .RE  .RE
 .fi  .fi
   .RS 6n
 .sp  .sp
 The user may only run  The user may only run
 \fI/bin/ls\fR  \fI/bin/ls\fR
 if its sha224 digest matches the specified value.  if its sha224 digest matches the specified value.
 Command digests are only supported by version 1.8.7 or higher.  Command digests are only supported by version 1.8.7 or higher.
 .PP  
 .RE  .RE
 .PD 0  
 .TP 6n  .TP 6n
 \fBsudoOption\fR  \fBsudoOption\fR
 Identical in function to the global options described above, but  Identical in function to the global options described above, but
 specific to the  specific to the
 \fRsudoRole\fR  \fRsudoRole\fR
 in which it resides.  in which it resides.
 .PD  
 .TP 6n  .TP 6n
 \fBsudoRunAsUser\fR  \fBsudoRunAsUser\fR
 A user name or uid (prefixed with  A user name or uid (prefixed with
`#')\(oq#\(cq)
 that commands may be run as or a Unix group (prefixed with a  that commands may be run as or a Unix group (prefixed with a
`%')\(oq%\(cq)
 or user netgroup (prefixed with a  or user netgroup (prefixed with a
`+')\(oq+\(cq)
 that contains a list of users that commands may be run as.  that contains a list of users that commands may be run as.
 The special value  The special value
 \fRALL\fR  \fRALL\fR
Line 249  attribute instead. Line 246  attribute instead.
 .TP 6n  .TP 6n
 \fBsudoRunAsGroup\fR  \fBsudoRunAsGroup\fR
 A Unix group or gid (prefixed with  A Unix group or gid (prefixed with
`#')\(oq#\(cq)
 that commands may be run as.  that commands may be run as.
 The special value  The special value
 \fRALL\fR  \fRALL\fR
Line 323  If multiple entries match, the entry with the highest Line 320  If multiple entries match, the entry with the highest
 \fRsudoOrder\fR  \fRsudoOrder\fR
 attribute is chosen.  attribute is chosen.
 This corresponds to the  This corresponds to the
``last match''\(lqlast match\(rq
 behavior of the sudoers file.  behavior of the sudoers file.
 If the  If the
 \fRsudoOrder\fR  \fRsudoOrder\fR
Line 513  are honored. Line 510  are honored.
 Configuration options are listed below in upper case but are parsed  Configuration options are listed below in upper case but are parsed
 in a case-independent manner.  in a case-independent manner.
 .PP  .PP
   The pound sign
   (\(oq#\(cq)
   is used to indicate a comment.
   Both the comment character and any text after it, up to the end of
   the line, are ignored.
 Long lines can be continued with a backslash  Long lines can be continued with a backslash
(`\e')(\(oq\e\(cq)
 as the last character on the line.  as the last character on the line.
 Note that leading white space is removed from the beginning of lines  Note that leading white space is removed from the beginning of lines
 even when the continuation character is used.  even when the continuation character is used.
Line 562  parameter specifies a white space-delimited list of LD Line 564  parameter specifies a white space-delimited list of LD
 Each host may include an optional  Each host may include an optional
 \fIport\fR  \fIport\fR
 separated by a colon  separated by a colon
(`:\&').(\(oq:\&\(cq).
 The  The
 \fBHOST\fR  \fBHOST\fR
 parameter is deprecated in favor of the  parameter is deprecated in favor of the
Line 638  form Line 640  form
 \fRattribute=value\fR  \fRattribute=value\fR
 or  or
 \fR(&(attribute=value)(attribute2=value2))\fR.  \fR(&(attribute=value)(attribute2=value2))\fR.
   The default search filter is:
   \fRobjectClass=sudoRole\fR.
   If
   \fIldap_filter\fR
   is omitted, no search filter will be used.
 .TP 6n  .TP 6n
 \fBSUDOERS_TIMED\fR \fIon/true/yes/off/false/no\fR  \fBSUDOERS_TIMED\fR \fIon/true/yes/off/false/no\fR
 Whether or not to evaluate the  Whether or not to evaluate the
Line 662  parameter is deprecated and will be removed in a futur Line 669  parameter is deprecated and will be removed in a futur
 The same information is now logged via the  The same information is now logged via the
 \fBsudo\fR  \fBsudo\fR
 debugging framework using the  debugging framework using the
``ldap''\(lqldap\(rq
 subsystem at priorities  subsystem at priorities
 \fIdiag\fR  \fIdiag\fR
 and  and
Line 787  This option is only supported by the OpenLDAP librarie Line 794  This option is only supported by the OpenLDAP librarie
 The path to a file containing the client certificate which can  The path to a file containing the client certificate which can
 be used to authenticate the client to the LDAP server.  be used to authenticate the client to the LDAP server.
 The certificate type depends on the LDAP libraries used.  The certificate type depends on the LDAP libraries used.
.RS.PP
 .RS 6n
 .PD 0
 .TP 6n  .TP 6n
 OpenLDAP:  OpenLDAP:
 \fRtls_cert /etc/ssl/client_cert.pem\fR  \fRtls_cert /etc/ssl/client_cert.pem\fR
   .PD
 .TP 6n  .TP 6n
 Netscape-derived:  Netscape-derived:
 \fRtls_cert /var/ldap/cert7.db\fR  \fRtls_cert /var/ldap/cert7.db\fR
Line 802  contains both keys and certificates. Line 812  contains both keys and certificates.
 .sp  .sp
 When using Netscape-derived libraries, this file may also contain  When using Netscape-derived libraries, this file may also contain
 Certificate Authority certificates.  Certificate Authority certificates.
   .PD 0
 .PP  .PP
 .RE  .RE
.PD 0.PD
 .TP 6n  .TP 6n
 \fBTLS_KEY\fR \fIfile name\fR  \fBTLS_KEY\fR \fIfile name\fR
 The path to a file containing the private key which matches the  The path to a file containing the private key which matches the
Line 812  certificate specified by Line 823  certificate specified by
 \fBTLS_CERT\fR.  \fBTLS_CERT\fR.
 The private key must not be password-protected.  The private key must not be password-protected.
 The key type depends on the LDAP libraries used.  The key type depends on the LDAP libraries used.
.RS.PP
.PD.RS 6n
 .PD 0
 .TP 6n  .TP 6n
 OpenLDAP:  OpenLDAP:
 \fRtls_key /etc/ssl/client_key.pem\fR  \fRtls_key /etc/ssl/client_key.pem\fR
   .PD
 .TP 6n  .TP 6n
 Netscape-derived:  Netscape-derived:
 \fRtls_key /var/ldap/key3.db\fR  \fRtls_key /var/ldap/key3.db\fR
 .TP 6n  .TP 6n
 Tivoli Directory Server:  Tivoli Directory Server:
\fRtls_cert /usr/ldap/ldapkey.kdb\fR\fRtls_key /usr/ldap/ldapkey.kdb\fR
 .PD 0  .PD 0
 .PP  .PP
 .PD  
 When using Tivoli LDAP libraries, this file may also contain  When using Tivoli LDAP libraries, this file may also contain
 Certificate Authority and client certificates and may be encrypted.  Certificate Authority and client certificates and may be encrypted.
 .PP  
 .RE  .RE
.PD 0.PD
 .TP 6n  .TP 6n
 \fBTLS_KEYPW\fR \fIsecret\fR  \fBTLS_KEYPW\fR \fIsecret\fR
 The  The
 \fBTLS_KEYPW\fR  \fBTLS_KEYPW\fR
 contains the password used to decrypt the key database on clients  contains the password used to decrypt the key database on clients
 using the Tivoli Directory Server LDAP library.  using the Tivoli Directory Server LDAP library.
   This should be a simple string without quotes.
   The password may not include the comment character
   (\(oq#\(cq)
   and escaping of special characters with a backslash
   (\(oq\e\(cq)
   is not supported.
   If this option is used,
   \fI@ldap_conf@\fR
   must not be world-readable to avoid exposing the password.
   Alternately, a
   \fIstash file\fR
   can be used to store the password in encrypted form (see below).
   .sp
 If no  If no
 \fBTLS_KEYPW\fR  \fBTLS_KEYPW\fR
 is specified, a  is specified, a
Line 856  The default Line 880  The default
 \fRldapkey.kdb\fR  \fRldapkey.kdb\fR
 that ships with Tivoli Directory Server is encrypted with the password  that ships with Tivoli Directory Server is encrypted with the password
 \fRssl_password\fR.  \fRssl_password\fR.
   The
   \fIgsk8capicmd\fR
   utility can be used to manage the key database and create a
   \fIstash file\fR.
 This option is only supported by the Tivoli LDAP libraries.  This option is only supported by the Tivoli LDAP libraries.
 .PD  
 .TP 6n  .TP 6n
 \fBTLS_RANDFILE\fR \fIfile name\fR  \fBTLS_RANDFILE\fR \fIfile name\fR
 The  The
Line 940  does Line 967  does
 not stop searching after the first match and later matches take  not stop searching after the first match and later matches take
 precedence over earlier ones.  precedence over earlier ones.
 The following sources are recognized:  The following sources are recognized:
   .PP
   .RS 4n
   .PD 0
 .TP 10n  .TP 10n
 files  files
 read sudoers from  read sudoers from
 \fI@sysconfdir@/sudoers\fR  \fI@sysconfdir@/sudoers\fR
 .PD 0  
 .TP 10n  .TP 10n
 ldap  ldap
 read sudoers from LDAP  read sudoers from LDAP
   .RE
 .PD  .PD
 .PP  .PP
 In addition, the entry  In addition, the entry
Line 1284  search the archives. Line 1314  search the archives.
 .SH "DISCLAIMER"  .SH "DISCLAIMER"
 \fBsudo\fR  \fBsudo\fR
 is provided  is provided
``AS IS''\(lqAS IS\(rq
 and any express or implied warranties, including, but not limited  and any express or implied warranties, including, but not limited
 to, the implied warranties of merchantability and fitness for a  to, the implied warranties of merchantability and fitness for a
 particular purpose are disclaimed.  particular purpose are disclaimed.

Removed from v.1.1.1.4  
changed lines
  Added in v.1.1.1.6


FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>