summaryrefslogtreecommitdiffstats
path: root/src/man/sssd-ad.5.xml
Commit message (Collapse)AuthorAgeFilesLines
* DYNDNS: special value '*' for dyndns_iface optionPavel Reichl2015-09-071-2/+4
| | | | | Option dyndns_iface has now special value '*' which implies that IPs from add interfaces should be sent during DDNS update.
* DYNDNS: support mult. interfaces for dyndns_iface optPavel Reichl2015-09-071-4/+5
| | | | | Resolves: https://fedorahosted.org/sssd/ticket/2549
* AD GPO: Change default to "enforcing"Stephen Gallagher2015-05-281-1/+4
| | | | | | | | | | | | | | | | | When a user enrolls a system against Active Directory, the expectation is that the client will honor the centrally-managed settings. In the past, we avoided changing the default (and left it in permissive mode, to warn admins that the security policy wasn't being honored) in order to avoid breaking existing Active Directory enrollments. However, sufficient time has likely passed for users to become accustomed to using GPOs to manage access-control for their systems. This patch changes the default to enforcing and adds a configure flag for distributions to use if they wish to provide a different default value. Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>
* MAN: Clarify how are GPO mappings called in GPO editorJakub Hrozek2015-04-101-3/+19
| | | | | | https://fedorahosted.org/sssd/ticket/2618 Reviewed-by: Pavel Březina <pbrezina@redhat.com>
* AD: add new option ad_sitePavel Reichl2015-01-261-0/+14
| | | | | | | | | This option overrides a result of the automatic site discovery. Resolves: https://fedorahosted.org/sssd/ticket/2486 Reviewed-by: Pavel Březina <pbrezina@redhat.com>
* MAN: dyndns_iface supports only one interfacePavel Reichl2015-01-151-0/+3
| | | | | | | Resolves: https://fedorahosted.org/sssd/ticket/2548 Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>
* GPO: add systemd-user to gpo default permit listPavel Reichl2015-01-151-0/+5
| | | | | | | Resolves: https://fedorahosted.org/sssd/ticket/2556 Reviewed-by: Stephen Gallagher <sgallagh@redhat.com>
* MAN: Remove indentation in element programlisteningLukas Slebodnik2015-01-141-7/+7
| | | | | | | | The indentation is automatically in resulting man page. It isn't necessary to add spaces and moreover it can cause unreadable page asi in case of ad_gpo_map examples. Reviewed-by: Roland Mainz <rmainz@redhat.com>
* MAN: Clarify ad_gpo_map* optionsDan Lavu2014-12-161-0/+11
| | | | | Resolves: https://fedorahosted.org/sssd/ticket/2515
* AD/IPA: add krb5_confd_path configuration optionSumit Bose2014-11-251-0/+18
| | | | | | | | | With this new parameter the directory where Kerberos configuration snippets are created can be specified. Fixes https://fedorahosted.org/sssd/ticket/2473 Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>
* AD-GPO: config changes for gpo_map_* optionsYassir Elley2014-09-081-0/+329
| | | | | Reviewed-by: Sumit Bose <sbose@redhat.com> Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com>
* AD-GPO: add ad_gpo_cache_timeout optionYassir Elley2014-07-311-0/+16
| | | | Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>
* MAN: Document that each provider type uses its own set of optionsJakub Hrozek2014-07-141-1/+4
| | | | | | | | | | | | | | | https://fedorahosted.org/sssd/ticket/2281 Many users were configuring the combination of id_provider=ad access_provider=ldap expecting that the access_provider would use the same serves the id_provider does. That's not the case, each provider type must be configured separately. Reviewed-by: Stephen Gallagher <sgallagh@redhat.com>
* NSS: Add option to expand homedir template formatLukas Slebodnik2014-06-021-0/+1
| | | | | | | | | LDAP server can contain template for home directory instead of plain string. This patch adds new expand option "%H", which will be replaced with value from configuration option homedir_substring (from sssd.conf) Resolves: https://fedorahosted.org/sssd/ticket/1853
* Implemented LDAP component of GPO-based access controlYassir Elley2014-05-131-0/+64
| | | | | Reviewed-by: Sumit Bose <sbose@redhat.com> Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>
* ad_access_filter man page typoYassir Elley2014-04-171-1/+1
| | | | Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com>
* MAN: Clarify the GC support a bitJakub Hrozek2014-03-111-5/+13
| | | | | | | | | It should be noted that disabling GC does *not* disable lookups from trusted domains. Disabling GC might be a a good way for admins who wish to use POSIX attributes in trusted domains and the man page should hint this option. Reviewed-by: Pavel Březina <pbrezina@redhat.com>
* SUDO: AD providerSumit Bose2014-03-021-3/+3
| | | | | | | | | | | | | | This patch adds the sudo target to the AD provider. The main reason is to cover different default settings in the LDAP and AD provider. E.g. the default for ldap_id_mapping is True in the AD provider and False in the LDAP provider. If ldap_id_mapping was not set explicitly in the config file both components worked with different setting. Fixes https://fedorahosted.org/sssd/ticket/2256 Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> Reviewed-by: Pavel Březina <pbrezina@redhat.com>
* AD: Add a new option to turn off GC lookupsJakub Hrozek2013-12-191-0/+17
| | | | | | | | | | SSSD now defaults to using GC by default. For some environments, for instance those that don't or can't replicate the POSIX attributes to Global Catalog, this might not be desirable. This patch introduces a new option ad_enable_gc, that is enabled by default. Setting this option to false makes the SSSD contact only the LDAP port of AD DCs.
* AD: Fix a typo in the man pageJakub Hrozek2013-11-271-1/+1
| | | | https://fedorahosted.org/sssd/ticket/2154
* AD: Add extended access filterJakub Hrozek2013-10-251-3/+38
| | | | | | | https://fedorahosted.org/sssd/ticket/2082 Adds a new option that allows the admin to specify a LDAP access filter that can be applied globally, per-domain or per-forest.
* AD: Add a new option ad_access_filterJakub Hrozek2013-10-251-0/+24
| | | | | | | This patch just adds the option, it doesn't do anything useful yet. Related: https://fedorahosted.org/sssd/ticket/2082
* MAN: Fix refsect-idJakub Hrozek2013-10-111-1/+1
| | | | | | The refsect id was copied from sssd.conf(5) and was wrong. Fixing the refsect might help us if we ever generate other formats from XML and certainly wouldn't hurt.
* MAN: Document that POSIX attributes must be replicated to GCJakub Hrozek2013-09-271-0/+5
| | | | | | Currently the AD provider relies on the presence of the POSIX attributes in the Global Catalog. This patch mentiones the fact in the sssd-ad(5) manual page.
* MAN: Fix provider man page subtitleJakub Hrozek2013-09-201-1/+1
|
* MAN: AD provider only supports trusted domains from the same forestJakub Hrozek2013-08-241-0/+5
| | | | | Resolves: https://fedorahosted.org/sssd/ticket/2044
* MAN: IP addresss does not work when used for ad_serverJakub Hrozek2013-07-171-1/+1
| | | | | | | https://fedorahosted.org/sssd/ticket/1998 Currently using IP address as value of ad_server is not supported, so the man pages should not mention that as an option.
* MAN: clarify the default access provider for ADJakub Hrozek2013-07-171-0/+5
| | | | | | | | https://fedorahosted.org/sssd/ticket/1965 After we added a section that clarified what access_provider=ad did, some users were confused and thought that "ad" was also the default access provider if "id_provider=ad" was specified.
* MAN: state default dyndns interfaceOndrej Kos2013-05-301-1/+4
| | | | https://fedorahosted.org/sssd/ticket/1924
* man: Clarify the AD site discovery documentationJakub Hrozek2013-05-141-1/+3
| | | | https://fedorahosted.org/sssd/ticket/1909
* man: Clarify that AD dyndns updates are secured using GSS-TSIGJakub Hrozek2013-05-131-1/+4
| | | | https://fedorahosted.org/sssd/ticket/1910
* Enable the AD dynamic DNS updates by defaultJakub Hrozek2013-05-131-1/+1
| | | | https://fedorahosted.org/sssd/ticket/1915
* Fix a typo in sssd-ad man pageJakub Hrozek2013-05-131-1/+1
| | | | s/IPA/AD/
* AD: read flat name and SID of the AD domainSumit Bose2013-05-071-0/+4
| | | | | | | | | | | | | | | For various features either the flat/short/NetBIOS domain name or the domain SID is needed. Since the responders already try to do a subdomain lookup when and known domain name is encountered I added a subdomain lookup to the AD provider which currently only reads the SID from the base DN and the NetBIOS name from a reply of a LDAP ping. The results are written to the cache to have them available even if SSSD is started in offline mode. Looking up trusted domains can be added later. Since all the needed responder code is already available from the corresponding work for the IPA provider this patch fixes https://fedorahosted.org/sssd/ticket/1468
* Active Directory dynamic DNS updatesJakub Hrozek2013-05-031-0/+90
| | | | | | | | https://fedorahosted.org/sssd/ticket/1504 Implements dynamic DNS updates for the AD provider. By default, the updates also update the reverse zone and run periodically every 24 hours.
* DNS sites support - add AD SRV pluginPavel Březina2013-05-021-0/+21
| | | | https://fedorahosted.org/sssd/ticket/1032
* Document that the AD provider is case-insensitiveJakub Hrozek2013-04-261-0/+3
| | | | https://fedorahosted.org/sssd/ticket/1867
* Allow usage of enterprise principalsSumit Bose2013-04-221-0/+19
| | | | | | | | | | | | | | | | | | | | | | | | Enterprise principals are currently most useful for the AD provider and hence enabled here by default while for the other Kerberos based authentication providers they are disabled by default. If additional UPN suffixes are configured for the AD domain the user principal stored in the AD LDAP server might not contain the real Kerberos realm of the AD domain but one of the additional suffixes which might be completely randomly chooses, e.g. are not related to any existing DNS domain. This make it hard for a client to figure out the right KDC to send requests to. To get around this enterprise principals (see http://tools.ietf.org/html/rfc6806 for details) were introduced. Basically a default realm is added to the principal so that the Kerberos client libraries at least know where to send the request to. It is not in the responsibility of the KDC to either handle the request itself, return a client referral if he thinks a different KDC can handle the request or return and error. This feature is also use to allow authentication in AD environments with cross forest trusts. Fixes https://fedorahosted.org/sssd/ticket/1842
* Put the override_homedir into an included xml fileJakub Hrozek2013-04-101-87/+1
| | | | | The description was duplicated on two places, leading to errors where one was amended but the other was not.
* Document what does access_provider=ad doJakub Hrozek2013-03-211-0/+14
| | | | https://fedorahosted.org/sssd/ticket/1841
* Allow setting the default_shell option per-domain as wellJakub Hrozek2012-10-181-1/+2
| | | | https://fedorahosted.org/sssd/ticket/1583
* Fix various typos in documentation.Yuri Chornoivan2012-08-031-1/+1
|
* Primary server support: new option in AD providerJan Zeleny2012-08-011-1/+1
| | | | | | This patch adds support for new config option ad_backup_server. The description of this option's functionality is included in man page in one of previous patches.
* MAN: Improvements to the AD provider manpageStephen Gallagher2012-07-201-0/+98
| | | | | | | Add information about ID mapping (including how to disable it) as well as information on how to handle homedir and shell. https://fedorahosted.org/sssd/ticket/1433
* AD: Add manpages and SSSDConfig entriesStephen Gallagher2012-07-061-0/+155