-
Notifications
You must be signed in to change notification settings - Fork 91
New issue
Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? # to your account
Support for policy #1496
Comments
Policies are stored in the Embedded LDAP Server where, by default, the credentials required to make an LDAP connection are randomly generated. As such, discovery of such policies seem beyond the scope of what WDT is reasonably able to do. We can look at extending our limited support for seeding the domain's generated LDIFT files with the ability to add policies to the list of data that can be seeded. However, these policies are written in a pretty complex language that will make it not only difficult to model but also difficult to generate the necessary changes to the LDIFT file. We will look into this again as a possible future enhancement request. |
@gregoan Can you give me an example or two of what the policies you need to create look like? We are discussing this and may be able to do something but the input needed is complex so I am trying to find a way to model the input in a more natural way. |
Hello, Here are multiple examples (the format is the one of our old framework) :
Regards. |
Fix for this issue merged into the develop-4.0 branch. WDT 4.0 is on track for release next month. |
Thanks for all.
Le lun. 8 janv. 2024 à 21:12, Robert Patrick ***@***.***> a
écrit :
… Fix for this issue merged into the develop-4.0 branch. WDT 4.0 is on track
for release next month.
—
Reply to this email directly, view it on GitHub
<#1496 (comment)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/AB3C76QCB2GXCJQF3JELQKTYNRHKLAVCNFSM6AAAAAA46D2E76VHI2DSMVQWIX3LMV43OSLTON2WKQ3PNVWWK3TUHMYTQOBRG42TENJZG4>
.
You are receiving this because you were mentioned.Message ID:
***@***.***>
|
Hello, I'm looking forward for this feature. Do you have a date for WDT 4.0 to be released? |
@tdferreira I am hoping to release it in the next week or two. We have been waiting on our QA to test and identify bugs related to our new SSH support. All issues that they have found have already been fixed so I am just awaiting their sign-off. Please note that if you are deploying into Kubernetes using WebLogic Kubernetes Operator with Model-in-Image, WDT 4.0 will require the upcoming WKO 4.2.0 release to support the use of WDT 4.0 in that use case. As such, I am also waiting for WKO 4.2.0 to be released prior to releasing WDT 4.0. You can get a sense for WDT 4.0 changes at https://github.com/oracle/weblogic-deploy-tooling/blob/develop-4.0/documentation/4.0/content/release-notes/_index.md. |
WDT 4.0.0 released so closing as resolved. |
Just to clarify, the Discover Domain Tool in WDT 4.0.0 does not export the existing policies, right? |
@tdferreira Much like other security data fields (users, groups, credential mappings, etc.), WDT does not support discovery of these policies. |
I have found an issue related to this.
If I try to create my domain with this:
I get the following error:
It would be good if we could have an extra parameter that would tell what to do if there's an existing policy.
Also, if we have multiple realms, how can we specify for which realm the policy is?
|
|
Hello,
Some of our instances are really sensitives and customers added security on top of JMS queues.
Today with WDT there is no capability to export policy but neither create policy.
This is really problematic for us to enforce our customers to migrate because thy will have something less secured than what they can have with legacy infrastructure.
Will it be possible to have the capability to create policies ?
Regards.
The text was updated successfully, but these errors were encountered: