summaryrefslogtreecommitdiffstats
path: root/ipa-server
Commit message (Collapse)AuthorAgeFilesLines
* Bump the version numbers for release. Also removeKarl MacMillan2007-11-213-8/+8
| | | | | | specific version check on freeradius. Packages aren't available and the freeradius support isn't ready anyway.
* Generate master password from Simo.Karl MacMillan2007-11-213-27/+5
|
* Added replication.pyKarl MacMillan2007-11-211-0/+316
|
* Initial replication setup.Karl MacMillan2007-11-2113-252/+704
| | | | | | | | | | | | | | | | | | | This add replication setup through two new commands: ipa-replica-prepare and ipa-replica-install. The procedure is to run ipa-replica-prepare on an existing master. This will collect information about the realm and the current master and create a file storing all of the information. After copying that file to the new replica, ipa-replica-install is run (with -r to create a read-only replica). This version of the patch also includes fixes for the sasl mappings on the replicas. Remaining features: - ssl for replication. - automatic configuration of mesh topology for master (or a simpler way to replicate multiple masters. - tool for view / configuring current replication.
* more s/unique// wrt groups members/objectclassesSimo Sorce2007-11-212-3/+3
|
* Use groupOfNames and member, not groupOfUniqueNames and uniqueMemberSimo Sorce2007-11-203-21/+21
|
* Fix subtle errors in kpasswdSimo Sorce2007-11-201-25/+73
|
* Use same tzinfo as the time parser to avoid TypeError from being thrownRob Crittenden2007-11-211-1/+1
|
* Enable group inactivation by using the Class of Service plugin.Rob Crittenden2007-11-2011-32/+214
| | | | | | | | | | | | | | | | | | | | This adds 2 new groups: activated and inactivated. If you, or a group you are a member of, is in inactivated then you are too. If you, or a group you are a member of, is in the activated group, then you are too. In a fight between activated and inactivated, activated wins. The DNs for doing this matching is case and white space sensitive. The goal is to never have to actually set nsAccountLock in a user directly but move them between these groups. We need to decide where in the CLI this will happen. Right it is split between ipa-deluser and ipa-usermod. To inactivate groups for now just add the group to inactivate or active.
* Fix bad segfault when pwvals is nullSimo Sorce2007-11-191-34/+24
|
* Remove default SASL mappings if any to avoid conflicts with IPA SASL mappingsSimo Sorce2007-11-191-0/+19
|
* fix ldif typoSimo Sorce2007-11-191-1/+0
|
* Minor fixes.Karl MacMillan2007-11-193-3/+2
|
* Add pyasn1 requirement to rpms.Karl MacMillan2007-11-192-0/+2
|
* Fix installationSimo Sorce2007-11-184-0/+41
| | | | | Add missing schema for GUI Config, and missing objectclass for cn=accounts container
* Merge upstream and fix bad suffix in default-aciSimo Sorce2007-11-1818-168/+532
|\
| * - Report correct information back to users when policies prevent a successfulSimo Sorce2007-11-161-43/+202
| | | | | | | | | | | | | | password change. - Fix some minor error Initial code to read the Kerberos Master Key from the Directory
| * Small fix from Rob to pwd-extop-pluginKarl MacMillan2007-11-171-1/+1
| |
| * - Store Master Key in Ldap (Makes it easier to set up replicas)Simo Sorce2007-11-164-183/+502
| | | | | | | | | | | | | | | | | | | | | | | | | | | | - Does not require dirsrv access to stash file - Finalize password history support - Fix strict password length default in pwd_extop (fix install sctript too) - fix plugin configuration - Introduce 3 kind of password change: normal, admin, and ds manager - normal require adherence to policies - admin does not but password is immediately expired - ds manager can just change the password any way he likes. Initial code to read the Kerberos Master Key from the Directory
| * Implement the password policy UI and finish IPA policy UIRob Crittenden2007-11-1610-142/+506
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This includes a default password policy Custom fields are now read from LDAP. The format is a list of dicts with keys: label, field, required. The LDAP-based configuration now specifies: ipaUserSearchFields: uid,givenName,sn,telephoneNumber,ou,title ipaGroupSearchFields: cn,description ipaSearchTimeLimit: 2 ipaSearchRecordsLimit: 0 ipaCustomFields: ipaHomesRootDir: /home ipaDefaultLoginShell: /bin/sh ipaDefaultPrimaryGroup: ipausers ipaMaxUsernameLength: 8 ipaPwdExpAdvNotify: 4 This could use some optimization.
| * Replace references to Person and People with User and UsersRob Crittenden2007-11-159-25/+25
| |
* | - Report correct information back to users when policies prevent a successfulSimo Sorce2007-11-161-43/+202
| | | | | | | | | | | | | | password change. - Fix some minor error Initial code to read the Kerberos Master Key from the Directory
* | - Store Master Key in Ldap (Makes it easier to set up replicas)Simo Sorce2007-11-164-183/+502
|/ | | | | | | | | | | | | | - Does not require dirsrv access to stash file - Finalize password history support - Fix strict password length default in pwd_extop (fix install sctript too) - fix plugin configuration - Introduce 3 kind of password change: normal, admin, and ds manager - normal require adherence to policies - admin does not but password is immediately expired - ds manager can just change the password any way he likes. Initial code to read the Kerberos Master Key from the Directory
* Add memberof-task.ldif.Karl MacMillan2007-11-151-0/+7
|
* Check for existance of of the target file in update_file. It used to silentlyRob Crittenden2007-11-151-1/+6
| | | | fail if the file it was to update didn't exist.
* Broke invididual Requires and BuildRequires onto separate lines andRob Crittenden2007-11-152-14/+68
| | | | | | reordered them Added python-tgexpandingformwidget as a dependency Require at least fedora-ds-base 1.1
* Initialize memberof patch from Pete Rowley.Karl MacMillan2007-11-152-1/+16
|
* Remove reference to a bogus system and make the error message more genericRob Crittenden2007-11-141-1/+1
|
* Forgot to include FQDN in the substitition listRob Crittenden2007-11-131-1/+1
|
* Make the group cn an editable field though protected by default.Rob Crittenden2007-11-143-26/+26
| | | | Fix some issues with the multi-value to single-value reversion.
* Include multi-value fields on the Add Person pageRob Crittenden2007-11-147-117/+241
| | | | Remove multi-valued cn from groups
* Add an editors group. This is used to generally grant access for usersRob Crittenden2007-11-1410-47/+62
| | | | | | | | to edit other users (the Edit link won't appear otherwise). Additional delegation is need to grant permission to individual attributes. Update the failed login page to indicate that it is a permission issue. Don't allow access to policy at all for non-admins. By default users can only edit themselves.
* Initial implementation of policies support.Simo Sorce2007-11-132-104/+533
| | | | | | | | | | | | | | | | | | | This patch uses the kerberos schema policy, this is the same policy used by kadmin. While this patch allows for krbPwdPolicy objects anywhere the kldap module will make the kdc fail to provide tickets if the "krbPwdPolicyReference" points to any object that is not a child of cn=<REALM>,cn=kerberos,dc=.... To let us set policies anywhere in the tree I enabled the code to actually look at parent entries and the user entry itself and specify policies directly on these objects by adding the krbPwdPolicy objectclass to them (I know its structural but DS seem to allow multiple Structural classes on the same entry). The only side effect is that kadmin will not understand this, but we don't want to use kadmin anyway as it does not understand way too many things about the directory. I've tested a few scenarios and all seem working as expected, but further testing is welcome of course.
* Add more fields to the IPA Policy formRob Crittenden2007-11-134-1/+68
|
* Remove non-existent files from Makefile targetsRob Crittenden2007-11-132-2/+0
|
* Use the dna plugin to automatically assign uidRob Crittenden2007-11-131-7/+14
| | | | | Set gid to the group "ipausers" Add the user to this default group
* The e-mail field should not be required.Rob Crittenden2007-11-131-1/+1
|
* Restrict access to some parts of the UI to those in the admins groupRob Crittenden2007-11-134-14/+41
|
* Allow a user or group to change an attribute in its RDNRob Crittenden2007-11-123-4/+109
| | | | | Add secretary to the list of indexes otherwise RDN changing could be slow Port --addattr, --setattr and --delattr from usermod to groupmod
* Handle ldap.UNWILLING_TO_PERFORM more gracefullyRob Crittenden2007-11-091-1/+4
|
* Don't continue if a kerberos credentials cache is not availableRob Crittenden2007-11-091-8/+8
| | | | | forked-model detection was incorrect. Both of these return an error instead of raising one
* Fix editing groups when cn is a single-valued fieldRob Crittenden2007-11-091-2/+4
| | | | Fix some error messages that were printing the entire detail message
* Require uniqueness in the name/comment field of delegationsRob Crittenden2007-11-092-6/+31
| | | | | | Fix error reporting in the UI to include the detailed message Sort delegations by name when displaying them Update the name field from "Name" to "Delegation Name"
* Underline columns on sort results page so users will know it is a linkRob Crittenden2007-11-121-0/+19
| | | | Restore the CSS to display the up/down arrow on sort columns
* Redirect to the FQDN otherwise kerberos auth may failRob Crittenden2007-11-121-2/+8
|
* Initial support for policy editingRob Crittenden2007-11-1213-2/+349
| | | | More work is needed as the values are currently hardcoded and not saved
* Enable multi-value field support for some attributes on the edit pagesRob Crittenden2007-11-0810-79/+472
| | | | | Better error reporting in the GUI Include a document describing how multi-valued fields work
* Add posix auto gen for single master casePete Rowley2007-11-067-13/+106
|
* remove offensive use of rpmJohn Dennis2007-11-063-9/+25
| | | | add the radiusprofile to the list of objectclasses used when creating a user
* Update text to reflect new CSS code (sidebar now on right)Rob Crittenden2007-11-061-1/+1
|