<feed xmlns='http://www.w3.org/2005/Atom'>
<title>freeipa.git/ipaserver/install, branch ad-work</title>
<subtitle>FreeIPA project</subtitle>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/abbra/public_git/freeipa.git/'/>
<entry>
<title>ipa-adtrust-install: configure compatibility tree to serve trusted domain users</title>
<updated>2013-07-18T07:56:37+00:00</updated>
<author>
<name>Alexander Bokovoy</name>
<email>abokovoy@redhat.com</email>
</author>
<published>2013-07-15T16:13:50+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/abbra/public_git/freeipa.git/commit/?id=e375aca57cfea570e2b92d7f555bda6267d05d7a'/>
<id>e375aca57cfea570e2b92d7f555bda6267d05d7a</id>
<content type='text'>
Enables  support  for  trusted  domains  users  for old clients through Schema
Compatibility plugin.  SSSD supports trusted domains natively starting with
version 1.9 platform. For platforms that lack SSSD or run older SSSD version
one needs  to  use  this  option.  When  enabled, slapi-nis  package  needs  to
be  installed  and schema-compat-plugin will be configured to provide lookup of
users and groups from trusted domains via SSSD on IPA server. These users and
groups will be available under  cn=users,cn=compat,$SUFFIX  and
cn=groups,cn=compat,$SUFFIX trees.  SSSD will normalize names of users and
groups to lower case.

In  addition  to  providing  these users and groups through the compat tree,
this option enables authentication over LDAP for trusted domain users with DN
under compat tree, i.e. using bind DN uid=administrator@ad.domain,cn=users,cn=compat,$SUFFIX.

This authentication  is related to  PAM  stack  using  'system-auth' PAM
service. If you have disabled HBAC rule 'allow_all', then make sure there is
special service called 'system-auth' created and HBAC rule to allow access to
anyone to this rule on IPA masters is added. Please note that system-auth PAM
service is  not used directly by any other application, therefore it is safe to
create one specifically to support trusted domain users via compatibility path.

https://fedorahosted.org/freeipa/ticket/3567
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Enables  support  for  trusted  domains  users  for old clients through Schema
Compatibility plugin.  SSSD supports trusted domains natively starting with
version 1.9 platform. For platforms that lack SSSD or run older SSSD version
one needs  to  use  this  option.  When  enabled, slapi-nis  package  needs  to
be  installed  and schema-compat-plugin will be configured to provide lookup of
users and groups from trusted domains via SSSD on IPA server. These users and
groups will be available under  cn=users,cn=compat,$SUFFIX  and
cn=groups,cn=compat,$SUFFIX trees.  SSSD will normalize names of users and
groups to lower case.

In  addition  to  providing  these users and groups through the compat tree,
this option enables authentication over LDAP for trusted domain users with DN
under compat tree, i.e. using bind DN uid=administrator@ad.domain,cn=users,cn=compat,$SUFFIX.

This authentication  is related to  PAM  stack  using  'system-auth' PAM
service. If you have disabled HBAC rule 'allow_all', then make sure there is
special service called 'system-auth' created and HBAC rule to allow access to
anyone to this rule on IPA masters is added. Please note that system-auth PAM
service is  not used directly by any other application, therefore it is safe to
create one specifically to support trusted domain users via compatibility path.

https://fedorahosted.org/freeipa/ticket/3567
</pre>
</div>
</content>
</entry>
<entry>
<title>Hide sensitive attributes in LDAP updater logging and output</title>
<updated>2013-07-18T07:49:43+00:00</updated>
<author>
<name>Rob Crittenden</name>
<email>rcritten@redhat.com</email>
</author>
<published>2013-07-12T15:28:43+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/abbra/public_git/freeipa.git/commit/?id=240b12169b9a52113426f6b7893ea9c6bfaf4ea4'/>
<id>240b12169b9a52113426f6b7893ea9c6bfaf4ea4</id>
<content type='text'>
The LDAP updater prints the initial and final states of an entry, as well
as details on the changes made to attributes. This has the potential to
expose sensitive values so exclude those from logging.

https://fedorahosted.org/freeipa/ticket/3782
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
The LDAP updater prints the initial and final states of an entry, as well
as details on the changes made to attributes. This has the potential to
expose sensitive values so exclude those from logging.

https://fedorahosted.org/freeipa/ticket/3782
</pre>
</div>
</content>
</entry>
<entry>
<title>Change group ownership of CRL publish directory</title>
<updated>2013-07-16T10:17:40+00:00</updated>
<author>
<name>Tomas Babej</name>
<email>tbabej@redhat.com</email>
</author>
<published>2013-07-16T10:10:54+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/abbra/public_git/freeipa.git/commit/?id=7a105604e265222cf6f96b0ac060d4f1b2504b6c'/>
<id>7a105604e265222cf6f96b0ac060d4f1b2504b6c</id>
<content type='text'>
Spec file modified so that /var/lib/ipa/pki-ca/publish/ is no
longer owned by created with package installation. The directory
is rather created/removed with the CA instance itself.

This ensures proper creation/removeal, group ownership
and SELinux context.

https://fedorahosted.org/freeipa/ticket/3727
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Spec file modified so that /var/lib/ipa/pki-ca/publish/ is no
longer owned by created with package installation. The directory
is rather created/removed with the CA instance itself.

This ensures proper creation/removeal, group ownership
and SELinux context.

https://fedorahosted.org/freeipa/ticket/3727
</pre>
</div>
</content>
</entry>
<entry>
<title>Make sure replication works after DM password is changed</title>
<updated>2013-07-11T09:39:29+00:00</updated>
<author>
<name>Ana Krivokapic</name>
<email>akrivoka@redhat.com</email>
</author>
<published>2013-05-15T09:22:41+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/abbra/public_git/freeipa.git/commit/?id=c1e9b6fa1d3b334e6331c00158bf8e71926cd658'/>
<id>c1e9b6fa1d3b334e6331c00158bf8e71926cd658</id>
<content type='text'>
Replica information file contains the file `cacert.p12` which is protected by
the Directory Manager password of the initial IPA server installation. The DM
password of the initial installation is also used for the PKI admin user
password.

If the DM password is changed after the IPA server installation, the replication
fails.

To prevent this failure, add the following steps to ipa-replica-prepare:
1. Regenerate the `cacert.p12` file and protect it with the current DM password
2. Update the password of the PKI admin user with the current DM password

https://fedorahosted.org/freeipa/ticket/3594
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Replica information file contains the file `cacert.p12` which is protected by
the Directory Manager password of the initial IPA server installation. The DM
password of the initial installation is also used for the PKI admin user
password.

If the DM password is changed after the IPA server installation, the replication
fails.

To prevent this failure, add the following steps to ipa-replica-prepare:
1. Regenerate the `cacert.p12` file and protect it with the current DM password
2. Update the password of the PKI admin user with the current DM password

https://fedorahosted.org/freeipa/ticket/3594
</pre>
</div>
</content>
</entry>
<entry>
<title>Permit reads to ipatokenRadiusProxyUser objects</title>
<updated>2013-07-11T09:39:27+00:00</updated>
<author>
<name>Nathaniel McCallum</name>
<email>npmccallum@redhat.com</email>
</author>
<published>2013-06-18T18:21:25+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/abbra/public_git/freeipa.git/commit/?id=4bbbc11029aae9c29b9da2347ed1e905c885c0fd'/>
<id>4bbbc11029aae9c29b9da2347ed1e905c885c0fd</id>
<content type='text'>
This fixes an outstanding permissions issue from the OTP work.

https://fedorahosted.org/freeipa/ticket/3693
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
This fixes an outstanding permissions issue from the OTP work.

https://fedorahosted.org/freeipa/ticket/3693
</pre>
</div>
</content>
</entry>
<entry>
<title>Check trust chain length in CA-less install.</title>
<updated>2013-07-11T09:39:25+00:00</updated>
<author>
<name>Jan Cholasta</name>
<email>jcholast@redhat.com</email>
</author>
<published>2013-06-18T08:57:12+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/abbra/public_git/freeipa.git/commit/?id=ab96ca7831ad8ab2ee2389093ea8b9327d94d6f0'/>
<id>ab96ca7831ad8ab2ee2389093ea8b9327d94d6f0</id>
<content type='text'>
https://fedorahosted.org/freeipa/ticket/3707
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
https://fedorahosted.org/freeipa/ticket/3707
</pre>
</div>
</content>
</entry>
<entry>
<title>Fix bug in adtrustinstance</title>
<updated>2013-07-09T15:44:38+00:00</updated>
<author>
<name>Ana Krivokapic</name>
<email>akrivoka@redhat.com</email>
</author>
<published>2013-06-25T13:52:29+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/abbra/public_git/freeipa.git/commit/?id=30e75797805b3483942ea76a21c9bb8a99d24ce1'/>
<id>30e75797805b3483942ea76a21c9bb8a99d24ce1</id>
<content type='text'>
Incorrect tuple unpacking in adtrustinstance was causing ipa-adtrust-install
to fail when IPA was installed with no DNS.

https://fedorahosted.org/freeipa/ticket/3746
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Incorrect tuple unpacking in adtrustinstance was causing ipa-adtrust-install
to fail when IPA was installed with no DNS.

https://fedorahosted.org/freeipa/ticket/3746
</pre>
</div>
</content>
</entry>
<entry>
<title>Enable SASL mapping fallback.</title>
<updated>2013-06-27T15:06:51+00:00</updated>
<author>
<name>Jan Cholasta</name>
<email>jcholast@redhat.com</email>
</author>
<published>2013-03-22T10:15:51+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/abbra/public_git/freeipa.git/commit/?id=ea7db35b6224b8c67b789ac1eb35c9bc6c3eb6b5'/>
<id>ea7db35b6224b8c67b789ac1eb35c9bc6c3eb6b5</id>
<content type='text'>
Assign a default priority of 10 to our SASL mappings.

https://fedorahosted.org/freeipa/ticket/3330
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Assign a default priority of 10 to our SASL mappings.

https://fedorahosted.org/freeipa/ticket/3330
</pre>
</div>
</content>
</entry>
<entry>
<title>Create Firefox configuration extension on CA-less install</title>
<updated>2013-06-27T14:01:52+00:00</updated>
<author>
<name>Petr Vobornik</name>
<email>pvoborni@redhat.com</email>
</author>
<published>2013-06-25T14:53:24+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/abbra/public_git/freeipa.git/commit/?id=f5bc155f56a3673a419f921db18e64f8647065ec'/>
<id>f5bc155f56a3673a419f921db18e64f8647065ec</id>
<content type='text'>
Create:
* kerberosauth.xpi
* krb.js

even when --http_pkcs12 option is used.

https://fedorahosted.org/freeipa/ticket/3747
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Create:
* kerberosauth.xpi
* krb.js

even when --http_pkcs12 option is used.

https://fedorahosted.org/freeipa/ticket/3747
</pre>
</div>
</content>
</entry>
<entry>
<title>Do not display traceback to user</title>
<updated>2013-06-24T12:23:09+00:00</updated>
<author>
<name>Ana Krivokapic</name>
<email>akrivoka@redhat.com</email>
</author>
<published>2013-06-17T13:04:50+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/abbra/public_git/freeipa.git/commit/?id=2775dec3bec3499c69de60d5bb581ffad7615cef'/>
<id>2775dec3bec3499c69de60d5bb581ffad7615cef</id>
<content type='text'>
Logging tracebacks at the INFO level caused them to be displayed to user on the
command line. Change the log level to DEBUG, so that tracebacks are not visible
to user.

https://fedorahosted.org/freeipa/ticket/3704
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Logging tracebacks at the INFO level caused them to be displayed to user on the
command line. Change the log level to DEBUG, so that tracebacks are not visible
to user.

https://fedorahosted.org/freeipa/ticket/3704
</pre>
</div>
</content>
</entry>
</feed>
