Identity authentication does not check if user is enabled

Bug #1028563 reported by Sean McMurray
16
This bug affects 1 person
Affects Status Importance Assigned to Milestone
OpenStack Identity (keystone)
Invalid
High
Unassigned

Bug Description

I don't see where sql, pam, or ldap check the enabled status of a user when authenticating.

Joseph Heck (heckj)
Changed in keystone:
status: New → Triaged
importance: Undecided → High
Revision history for this message
Adam Young (ayoung) wrote :
Joseph Heck (heckj)
Changed in keystone:
status: Triaged → Invalid
security vulnerability: yes → no
visibility: private → public
Revision history for this message
shwinpiocess (shwinpiocess) wrote :

service.py
line 276 # If the user is disabled don't allow them to authenticate
        277 if not user_ref.get('enabled', True):
        278 raise exception.Forbidden(message='User has been disabled')

Revision history for this message
Dolph Mathews (dolph) wrote :

I feel it necessary to ask the obvious -- were you actually able to authenticate as a disabled user or were you just looking through code?

To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.