summaryrefslogtreecommitdiffstats
path: root/server/providers/ldap/sdap.h
Commit message (Collapse)AuthorAgeFilesLines
* Reactivate old fd handling conditionallySumit Bose2010-02-051-0/+4
| | | | | | | Older versions of openLDAP do not provide a connection callback. This patch adds a configure check to see if the callback is available and activates the old way of handling the file description of the LDAP connection. This also means that it is not possible to follow referrals.
* Add new option ldap_referralsSumit Bose2010-02-021-0/+1
|
* Use ldap connection callbacks to get file descriptorsSumit Bose2010-02-021-1/+15
|
* Add ldap_pwd_policy optionSumit Bose2009-11-231-0/+1
|
* Add initial failover support for ldap and ipaSimo Sorce2009-11-201-0/+5
| | | | | | | The retun values are still not directly used with ldap libraries that still do their own name resolution, but this patch introduces a very basic framework to have a multiple providers in one domain use and share a single failover service if they want to.
* Add cleanup taskSimo Sorce2009-11-101-0/+1
|
* Unify parse routines, use maps in generic searchesSimo Sorce2009-11-061-5/+5
| | | | | This remove redundant code and also allows the generic search to be used to use maps to convert attributes.
* Make useful function more broadly available.Simo Sorce2009-11-061-0/+3
|
* Rename sdap_id_map to sdap_attr_mapSimo Sorce2009-11-031-7/+15
| | | | | | Also start adding some infrastructure to use the USN counter when available. In particular add a place to add generic attrs mapping, ie attributes that are neither user nor group specific.
* Add support to get rootDSE from the LDAP server.Simo Sorce2009-10-291-0/+3
| | | | | | | | | | | | Also fic sdap_get_generic_send() to be a bit more "generic" :-) Also figs bugs within it. This patch allow us 2 good things. A) we check that the server effectively supports GSSAPI auth before we try to use it. B) against IPA it substantially cuts delays when the server is offline because it uses a 5 second async timeout on the connection and doesn't try to do a slow synchronous kinit+sasl_bind if the server is not even available.
* Tidy up ipa optionsSimo Sorce2009-10-291-0/+1
| | | | | | | | | | | | | | Do not replicate every and each option we may want to set in ipa. Just read out ldap and krb provider options (added reference in the manual too, and removed mention of ipa specific timeout values, use ldap options for that) Avoid calling auth module initialization twice, just pass the auth context to the chpass module too. Add a new ldap option SDAP_SEARCH_BASE, so that a single searching base can be used for both users and groups. the user and group search bases can still be set separately if necessary but they are now optional and set to be identical to SDAP_SEARCH_BASE if not explicitly specified in the configuration.
* Move responsibility for entry expiration timeoutSimo Sorce2009-10-271-1/+1
| | | | | The providers are now responsible for determining how long a cached entry is considered valid. The default is the same as before (600s)
* Add proper support for IPA/AD schemasSimo Sorce2009-10-271-1/+2
| | | | | | Nested groups weren't properly handled. Add 2 pass strategy to update groups memberships Stuff work as expected when enumeration is enabled now.
* added generic LDAP search sdap_get_generic_send/_recvSumit Bose2009-10-221-0/+5
|
* Check for expired passwords in LDAP providerSumit Bose2009-10-151-1/+27
|
* Move ldap provider configuration into its own fileSimo Sorce2009-10-141-4/+11
|
* Make options parser available to all providersSimo Sorce2009-10-141-47/+4
|
* add a replacement if ldap_control_create is missingSumit Bose2009-10-131-1/+1
|
* Differentiate between search and network timeoutsSimo Sorce2009-10-091-0/+1
| | | | | | Network timeouts are used in quick operations like bind. Search timeout is used for operations that can "legally" require more time. Change defaults to 6 and 60 seconds respectively.
* add support for server side LDAP password policiesSumit Bose2009-10-081-1/+2
| | | | | | | - password policy request controls are send during bind and change password extended operation - the response control is evaluated to see if the password is expired or will expire, soon
* Initial implementation of sasl bind supportSimo Sorce2009-10-011-0/+6
| | | | | | Inits krb5 credentials, if sasl mech is GSSAPI. Tested with GSSAPI and host keytab as well as user credentials. Updates also manpages with the new options.
* add new config options ldap_tls_cacert and ldap_tls_cacertdirSumit Bose2009-09-251-0/+4
|
* Turn ldap driver options into multitypeSimo Sorce2009-09-141-53/+88
| | | | | | | | | | This patch makes basic options multiype, the init function assigns a type from the initialization array, and processes values fetched from confdb accordingly. 4 types are supported so far: string, number, blob and boolean Also convert defines into enums where appropriate. Add fetch functions that check the requested type.
* Complete the removal of "legacy" option.Simo Sorce2009-09-111-0/+3
| | | | | | | | | The code was still dependent on it for the ldap driver. Changed the driver code to depend on the schema type. Fix defaults for user and groups trees. ATM if you use the rfc2307bis schema you have to put users and groups in 2 separate trees (what people does by default anyway. If this limitation will turn to be too hard, we will change this later.
* fix internal order of ldap user mapping optionsSumit Bose2009-08-281-4/+4
|
* Make enumeration an independent taskSimo Sorce2009-08-271-3/+7
| | | | | | Always immediately return to DP, and update users/groups in the background. Also implements an optimization to retrieve only changed/new users/groups by filtering using the modifyTimestamp after the first query.
* some UPN handling fixesSumit Bose2009-08-241-1/+3
| | | | | | - making the realm part upper case is now optional and done in the LDAP backend - using a username@realm UPN is now optional
* Fix race condition in sdap codeSimo Sorce2009-08-041-1/+9
| | | | | | | Retrieving ldap results and storing users could sometimes results in race conditions where the final ldap result was retrieved before the store operations where finished resulting in the operations to be aborted before termination. Implement a serialization mechanism per operation.
* Rework the engine that deals with openldap librariesSimo Sorce2009-07-201-5/+23
| | | | | | | The way openldap libraries work, require to have a single engine per connection as all replies are read at the same time. So we need to always read anything that comes in from the wire and then loop to dispatch results to the requests that are waiting.
* Implement the ldap identity module.Simo Sorce2009-07-081-0/+7
| | | | This uses and exapands the async helpers.
* Add async helper functionsSimo Sorce2009-07-081-0/+132
These functions use the tevent_req async model, where a pair of _send/_recv functions pilot requests, with additional helpers like _done functions, and where needed multiple stage helpers.