-
Bug
-
Resolution: Unresolved
-
Undefined
-
None
-
rhel-9.0.0.z
-
None
-
None
-
Low
-
rhel-idm-zta
-
None
-
False
-
False
-
-
None
-
None
-
None
-
None
-
Unspecified
-
Unspecified
-
Unspecified
-
-
x86_64
-
None
The customer uses `/etc/security/namespace.conf` to virtualize user-specific directories, specifically `/tmp`.
Current example:
~~~
/tmp /tmp/tmp-inst/ level root
~~~
-----------------------
To allow selected users to access their own virtualized /tmp, the customer must explicitly list each username:
~~~
/tmp /tmp/tmp-inst/ level root,user1,user2
~~~
The customer requests the ability to specify group names (e.g., `@admins`) so that all group members can access and monitor the non-virtualized underlying `/tmp`
----------------------------------------------------------------------------------------------------------------------
Problem Statement
- Users store large files in their private `/tmp,` creating significant disk usage.
- Administrators need to inspect and monitor these virtual directories.
- Current namespace behavior:
- Only users explicitly listed can access their virtualized /tmp.
- Group names cannot be used, forcing admin teams to maintain long lists of individual usernames.
- `su` to root does not bypass namespaces due to inherited SELinux attributes.
- Only a direct SSH or console login as root reveals the real (non-virtualized) `/tmp`.
This creates operational complexity and prevents efficient monitoring.
-------------------------------------------------------------------------------------------------------------------
Customer requirement:
The customer requests the ability to specify UNIX/Linux group names (e.g., @admins) in /etc/security/namespace.conf so that all users in that group can access and inspect the non-virtualized underlying /tmp.
Example of the requested syntax:
~~~
/tmp /tmp/tmp-inst/ level root,@admins
~~~
Goals
- Allow admin groups to review disk usage in the underlying `/tmp `directories.
- Avoid maintaining long lists of individual usernames.
- Improve manageability, visibility, and operational efficiency around namespace-based directory virtualization.
- Align namespace access control with traditional UNIX group-based permission patterns.
------------------------------
Requested Enhancement
Add support for group entries in `/etc/security/namespace.conf` for pam_namespace so that administrators can more easily manage and monitor namespace-isolated directories.