On ke, 28 huhti 2021, Dominik Vogt via FreeIPA-users wrote:
On Wed, Apr 28, 2021 at 02:57:08PM +0300, Alexander Bokovoy via FreeIPA-users wrote:
On ke, 28 huhti 2021, Dominik Vogt via FreeIPA-users wrote:
So there is no way to prevent that someone issues administrative ipa command from any host, except by keeping the password secret?
Correct, you have to keep passwords safe from the parties you don't want to use the powers those passwords entail.
Will the clients work if we delete the /usr/bin/ipa on them?
If you'd want to remove IPA client componets after enrolling, then you need to remove python3-ipalib (on Fedora or RHEL 8). That would remove freeipa-client and python3-ipaclient but it will not remove any configuration, so things would continue working. At least theoretically, I haven't tried that myself.
I'd recommend you to investigate this on your own before deploying such changes. Note that IPA API use does not require existence of these packages and people can actually communicate with IPA server with just an HTTPS request, using whatever HTTP client they have. So, removing packages will not solve your problem at all.