<feed xmlns='http://www.w3.org/2005/Atom'>
<title>freeipa.git, branch ad-work</title>
<subtitle>FreeIPA project</subtitle>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/abbra/public_git/freeipa.git/'/>
<entry>
<title>Gain information from AD</title>
<updated>2013-07-18T14:16:49+00:00</updated>
<author>
<name>Tomas Babej</name>
<email>tbabej@redhat.com</email>
</author>
<published>2013-07-17T13:55:36+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/abbra/public_git/freeipa.git/commit/?id=6556b4fc4261f8051e13e0f7dd81481b78fa33d1'/>
<id>6556b4fc4261f8051e13e0f7dd81481b78fa33d1</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>Bump version of sssd in spec file</title>
<updated>2013-07-18T14:16:49+00:00</updated>
<author>
<name>Ana Krivokapic</name>
<email>akrivoka@redhat.com</email>
</author>
<published>2013-07-18T10:21:59+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/abbra/public_git/freeipa.git/commit/?id=b813a44df55bb2f42bce62ed274f744625ebb59c'/>
<id>b813a44df55bb2f42bce62ed274f744625ebb59c</id>
<content type='text'>
https://fedorahosted.org/freeipa/ticket/3652
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
https://fedorahosted.org/freeipa/ticket/3652
</pre>
</div>
</content>
</entry>
<entry>
<title>Add 'ipa_server_mode' option to SSSD configuration</title>
<updated>2013-07-18T14:16:49+00:00</updated>
<author>
<name>Ana Krivokapic</name>
<email>akrivoka@redhat.com</email>
</author>
<published>2013-07-15T09:09:14+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/abbra/public_git/freeipa.git/commit/?id=4dfdeb557e02898bf1316775363cc213274f55de'/>
<id>4dfdeb557e02898bf1316775363cc213274f55de</id>
<content type='text'>
https://fedorahosted.org/freeipa/ticket/3652
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
https://fedorahosted.org/freeipa/ticket/3652
</pre>
</div>
</content>
</entry>
<entry>
<title>WIP: reinit mspac on HTTP TGT acquisition to aid trust-add case</title>
<updated>2013-07-18T14:16:49+00:00</updated>
<author>
<name>Alexander Bokovoy</name>
<email>abokovoy@redhat.com</email>
</author>
<published>2013-07-18T10:32:42+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/abbra/public_git/freeipa.git/commit/?id=219dc85533a310b21c92b0a99502375435b82a33'/>
<id>219dc85533a310b21c92b0a99502375435b82a33</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>ipa-kdb: cache KDC hostname on startup</title>
<updated>2013-07-18T14:16:48+00:00</updated>
<author>
<name>Alexander Bokovoy</name>
<email>abokovoy@redhat.com</email>
</author>
<published>2013-07-18T14:10:01+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/abbra/public_git/freeipa.git/commit/?id=8e17f1e9579b9171639c109be51ada9032c52df7'/>
<id>8e17f1e9579b9171639c109be51ada9032c52df7</id>
<content type='text'>
We need KDC hostname for several purposes:
- short-circuit detection of principals on the same server as KDC
- generating NetBIOS name

Make sure we cache hostname information on startup and use it
instead of detecting the hostname in run-time. This will miss the
case that KDC hostname got changed but such cases are not supported
anyway without restarting KDC and making changes to principals.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
We need KDC hostname for several purposes:
- short-circuit detection of principals on the same server as KDC
- generating NetBIOS name

Make sure we cache hostname information on startup and use it
instead of detecting the hostname in run-time. This will miss the
case that KDC hostname got changed but such cases are not supported
anyway without restarting KDC and making changes to principals.
</pre>
</div>
</content>
</entry>
<entry>
<title>ipa-adtrust-install: configure compatibility tree to serve trusted domain users</title>
<updated>2013-07-18T07:56:37+00:00</updated>
<author>
<name>Alexander Bokovoy</name>
<email>abokovoy@redhat.com</email>
</author>
<published>2013-07-15T16:13:50+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/abbra/public_git/freeipa.git/commit/?id=e375aca57cfea570e2b92d7f555bda6267d05d7a'/>
<id>e375aca57cfea570e2b92d7f555bda6267d05d7a</id>
<content type='text'>
Enables  support  for  trusted  domains  users  for old clients through Schema
Compatibility plugin.  SSSD supports trusted domains natively starting with
version 1.9 platform. For platforms that lack SSSD or run older SSSD version
one needs  to  use  this  option.  When  enabled, slapi-nis  package  needs  to
be  installed  and schema-compat-plugin will be configured to provide lookup of
users and groups from trusted domains via SSSD on IPA server. These users and
groups will be available under  cn=users,cn=compat,$SUFFIX  and
cn=groups,cn=compat,$SUFFIX trees.  SSSD will normalize names of users and
groups to lower case.

In  addition  to  providing  these users and groups through the compat tree,
this option enables authentication over LDAP for trusted domain users with DN
under compat tree, i.e. using bind DN uid=administrator@ad.domain,cn=users,cn=compat,$SUFFIX.

This authentication  is related to  PAM  stack  using  'system-auth' PAM
service. If you have disabled HBAC rule 'allow_all', then make sure there is
special service called 'system-auth' created and HBAC rule to allow access to
anyone to this rule on IPA masters is added. Please note that system-auth PAM
service is  not used directly by any other application, therefore it is safe to
create one specifically to support trusted domain users via compatibility path.

https://fedorahosted.org/freeipa/ticket/3567
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Enables  support  for  trusted  domains  users  for old clients through Schema
Compatibility plugin.  SSSD supports trusted domains natively starting with
version 1.9 platform. For platforms that lack SSSD or run older SSSD version
one needs  to  use  this  option.  When  enabled, slapi-nis  package  needs  to
be  installed  and schema-compat-plugin will be configured to provide lookup of
users and groups from trusted domains via SSSD on IPA server. These users and
groups will be available under  cn=users,cn=compat,$SUFFIX  and
cn=groups,cn=compat,$SUFFIX trees.  SSSD will normalize names of users and
groups to lower case.

In  addition  to  providing  these users and groups through the compat tree,
this option enables authentication over LDAP for trusted domain users with DN
under compat tree, i.e. using bind DN uid=administrator@ad.domain,cn=users,cn=compat,$SUFFIX.

This authentication  is related to  PAM  stack  using  'system-auth' PAM
service. If you have disabled HBAC rule 'allow_all', then make sure there is
special service called 'system-auth' created and HBAC rule to allow access to
anyone to this rule on IPA masters is added. Please note that system-auth PAM
service is  not used directly by any other application, therefore it is safe to
create one specifically to support trusted domain users via compatibility path.

https://fedorahosted.org/freeipa/ticket/3567
</pre>
</div>
</content>
</entry>
<entry>
<title>Hide sensitive attributes in LDAP updater logging and output</title>
<updated>2013-07-18T07:49:43+00:00</updated>
<author>
<name>Rob Crittenden</name>
<email>rcritten@redhat.com</email>
</author>
<published>2013-07-12T15:28:43+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/abbra/public_git/freeipa.git/commit/?id=240b12169b9a52113426f6b7893ea9c6bfaf4ea4'/>
<id>240b12169b9a52113426f6b7893ea9c6bfaf4ea4</id>
<content type='text'>
The LDAP updater prints the initial and final states of an entry, as well
as details on the changes made to attributes. This has the potential to
expose sensitive values so exclude those from logging.

https://fedorahosted.org/freeipa/ticket/3782
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
The LDAP updater prints the initial and final states of an entry, as well
as details on the changes made to attributes. This has the potential to
expose sensitive values so exclude those from logging.

https://fedorahosted.org/freeipa/ticket/3782
</pre>
</div>
</content>
</entry>
<entry>
<title>Add Camellia ciphers to allowed list.</title>
<updated>2013-07-18T07:49:38+00:00</updated>
<author>
<name>Rob Crittenden</name>
<email>rcritten@redhat.com</email>
</author>
<published>2013-07-12T15:28:20+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/abbra/public_git/freeipa.git/commit/?id=198d82d4cea94e401bffea1ebed9fd00d5fdd832'/>
<id>198d82d4cea94e401bffea1ebed9fd00d5fdd832</id>
<content type='text'>
https://fedorahosted.org/freeipa/ticket/3749
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
https://fedorahosted.org/freeipa/ticket/3749
</pre>
</div>
</content>
</entry>
<entry>
<title>Require new selinux-policy replacing old server-selinux subpackage</title>
<updated>2013-07-17T14:21:14+00:00</updated>
<author>
<name>Martin Kosek</name>
<email>mkosek@redhat.com</email>
</author>
<published>2013-07-17T14:21:14+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/abbra/public_git/freeipa.git/commit/?id=1dcbb3adfae78e6f46ff76f72d651d75850c46ab'/>
<id>1dcbb3adfae78e6f46ff76f72d651d75850c46ab</id>
<content type='text'>
Features of the new policy:
- labels /var/lib/ipa/pki-ca/publish as pki_tomcat_cert_t which is
  writeable by PKI and readable by HTTPD
- contains Conflicts with old freeipa-server-selinux package to avoid
  SELinux upgrade issues

https://fedorahosted.org/freeipa/ticket/3788
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Features of the new policy:
- labels /var/lib/ipa/pki-ca/publish as pki_tomcat_cert_t which is
  writeable by PKI and readable by HTTPD
- contains Conflicts with old freeipa-server-selinux package to avoid
  SELinux upgrade issues

https://fedorahosted.org/freeipa/ticket/3788
</pre>
</div>
</content>
</entry>
<entry>
<title>Run gpg-agent explicitly when encrypting/decrypting files.</title>
<updated>2013-07-17T14:15:15+00:00</updated>
<author>
<name>Jan Cholasta</name>
<email>jcholast@redhat.com</email>
</author>
<published>2013-07-17T12:11:57+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/abbra/public_git/freeipa.git/commit/?id=b5d008ed5a2ec074bf28ca5835785ee3160d6a9d'/>
<id>b5d008ed5a2ec074bf28ca5835785ee3160d6a9d</id>
<content type='text'>
Also add an option to ipautil.run to redirect command output to /dev/null.

https://fedorahosted.org/freeipa/ticket/3767
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Also add an option to ipautil.run to redirect command output to /dev/null.

https://fedorahosted.org/freeipa/ticket/3767
</pre>
</div>
</content>
</entry>
</feed>
