<feed xmlns='http://www.w3.org/2005/Atom'>
<title>sssd.git/src/providers/ad, branch saveldapsid</title>
<subtitle>System Security Services Daemon [okos' clone]</subtitle>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/okos/public_git/sssd.git/'/>
<entry>
<title>AD: Set the bool value same as default value in opts</title>
<updated>2013-07-19T11:51:17+00:00</updated>
<author>
<name>Jakub Hrozek</name>
<email>jhrozek@redhat.com</email>
</author>
<published>2013-07-16T17:07:09+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/okos/public_git/sssd.git/commit/?id=35872dc24058c5e8028cb4082fd405a27835dcd1'/>
<id>35872dc24058c5e8028cb4082fd405a27835dcd1</id>
<content type='text'>
https://fedorahosted.org/sssd/ticket/2023

When the option values are copied using dp_opt_copy_map, the .val member
is used if it's not NULL. At the same time, the bool options are never
NULL, unlike integers or strings that can have special NULL-like values
such as NULL_STRING. This effectively means that when copying a bool
option, the .val member is always used.

But in the AD maps, some .val fields were set differently from the
.def_val fields. The effect was that when the AD subdomain provider was
initialized from IPA subdomain provider using only the defaults, some
options (notably referral chasing) were set to a value that didn't make
sense for the AD provider.

This patch makes sure that for all boolean option, the .val is always
the same as .def_val.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
https://fedorahosted.org/sssd/ticket/2023

When the option values are copied using dp_opt_copy_map, the .val member
is used if it's not NULL. At the same time, the bool options are never
NULL, unlike integers or strings that can have special NULL-like values
such as NULL_STRING. This effectively means that when copying a bool
option, the .val member is always used.

But in the AD maps, some .val fields were set differently from the
.def_val fields. The effect was that when the AD subdomain provider was
initialized from IPA subdomain provider using only the defaults, some
options (notably referral chasing) were set to a value that didn't make
sense for the AD provider.

This patch makes sure that for all boolean option, the .val is always
the same as .def_val.
</pre>
</div>
</content>
</entry>
<entry>
<title>IPA: Look up AD users directly if IPA server mode is on</title>
<updated>2013-06-28T20:22:20+00:00</updated>
<author>
<name>Jakub Hrozek</name>
<email>jhrozek@redhat.com</email>
</author>
<published>2013-06-19T08:51:19+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/okos/public_git/sssd.git/commit/?id=3d28e0e560b787b5c57ed7327d184310342a7e38'/>
<id>3d28e0e560b787b5c57ed7327d184310342a7e38</id>
<content type='text'>
https://fedorahosted.org/sssd/ticket/1962

If the ipa_server_mode is selected IPA subdomain user and group lookups
are not done with the help of the extdom plugin but directly against AD
using the AD ID code.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
https://fedorahosted.org/sssd/ticket/1962

If the ipa_server_mode is selected IPA subdomain user and group lookups
are not done with the help of the extdom plugin but directly against AD
using the AD ID code.
</pre>
</div>
</content>
</entry>
<entry>
<title>AD: Move storing sdap_domain for subdomain to generic LDAP code</title>
<updated>2013-06-28T20:22:20+00:00</updated>
<author>
<name>Jakub Hrozek</name>
<email>jhrozek@redhat.com</email>
</author>
<published>2013-06-19T11:00:41+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/okos/public_git/sssd.git/commit/?id=4e3ba17a3376b635cb0d9ae60a6d4e712ded01a0'/>
<id>4e3ba17a3376b635cb0d9ae60a6d4e712ded01a0</id>
<content type='text'>
Makes creating the sdap_domain structure for a subdomain reusable
outside AD subdomain code where it was created initially.

Subtask of:
    https://fedorahosted.org/sssd/ticket/1962
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Makes creating the sdap_domain structure for a subdomain reusable
outside AD subdomain code where it was created initially.

Subtask of:
    https://fedorahosted.org/sssd/ticket/1962
</pre>
</div>
</content>
</entry>
<entry>
<title>AD: initialize failover with custom realm, domain and failover service</title>
<updated>2013-06-28T20:22:20+00:00</updated>
<author>
<name>Jakub Hrozek</name>
<email>jhrozek@redhat.com</email>
</author>
<published>2013-06-19T08:49:05+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/okos/public_git/sssd.git/commit/?id=59415636c92c6e9764ddc65a85ad61002310519d'/>
<id>59415636c92c6e9764ddc65a85ad61002310519d</id>
<content type='text'>
This is needed so we can initialize failover using IPA realm and
on-the-fly discovered DNS domain. The subdomains discovered on-thefly
will use the subdomain name for realm, domain and failover service to
avoid conflicts.

Subtaks of:
https://fedorahosted.org/sssd/ticket/1962
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
This is needed so we can initialize failover using IPA realm and
on-the-fly discovered DNS domain. The subdomains discovered on-thefly
will use the subdomain name for realm, domain and failover service to
avoid conflicts.

Subtaks of:
https://fedorahosted.org/sssd/ticket/1962
</pre>
</div>
</content>
</entry>
<entry>
<title>AD: decouple ad_id_ctx initialization</title>
<updated>2013-06-28T20:22:20+00:00</updated>
<author>
<name>Jakub Hrozek</name>
<email>jhrozek@redhat.com</email>
</author>
<published>2013-06-17T16:32:53+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/okos/public_git/sssd.git/commit/?id=ebc6ab564dc2a0a2b08c42d727fc403dde4a2dc9'/>
<id>ebc6ab564dc2a0a2b08c42d727fc403dde4a2dc9</id>
<content type='text'>
The IPA subdomain code will perform lookups on its own in the server
mode. For this, the AD provider must offer a way to initialize the
ad_id_ctx for external consumers.

Subtask of:
https://fedorahosted.org/sssd/ticket/1962
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
The IPA subdomain code will perform lookups on its own in the server
mode. For this, the AD provider must offer a way to initialize the
ad_id_ctx for external consumers.

Subtask of:
https://fedorahosted.org/sssd/ticket/1962
</pre>
</div>
</content>
</entry>
<entry>
<title>Save mpg state for subdomains</title>
<updated>2013-06-28T18:20:59+00:00</updated>
<author>
<name>Sumit Bose</name>
<email>sbose@redhat.com</email>
</author>
<published>2013-06-27T19:49:26+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/okos/public_git/sssd.git/commit/?id=09d7c105839bfc7447ea0f766413ed86675ca075'/>
<id>09d7c105839bfc7447ea0f766413ed86675ca075</id>
<content type='text'>
The information of a subdomain will use magic private groups (mpg) or
not will be stored together with other information about the domain in
the cache.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
The information of a subdomain will use magic private groups (mpg) or
not will be stored together with other information about the domain in
the cache.
</pre>
</div>
</content>
</entry>
<entry>
<title>Replace new_subdomain() with find_subdomain_by_name()</title>
<updated>2013-06-28T18:20:59+00:00</updated>
<author>
<name>Sumit Bose</name>
<email>sbose@redhat.com</email>
</author>
<published>2013-06-27T15:07:36+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/okos/public_git/sssd.git/commit/?id=b8d703cf3aba81800cf1b8ccca64bb00ef0b30f7'/>
<id>b8d703cf3aba81800cf1b8ccca64bb00ef0b30f7</id>
<content type='text'>
new_subdomain() will create a new domain object and should not be used
anymore in the priovder code directly. Instead a reference to the domain
from the common domain object should be used.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
new_subdomain() will create a new domain object and should not be used
anymore in the priovder code directly. Instead a reference to the domain
from the common domain object should be used.
</pre>
</div>
</content>
</entry>
<entry>
<title>Add now options ldap_min_id and ldap_max_id</title>
<updated>2013-06-28T18:20:59+00:00</updated>
<author>
<name>Sumit Bose</name>
<email>sbose@redhat.com</email>
</author>
<published>2013-06-12T10:17:08+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/okos/public_git/sssd.git/commit/?id=eceefd520802efe356d413a13247c5f68d8e27c8'/>
<id>eceefd520802efe356d413a13247c5f68d8e27c8</id>
<content type='text'>
Currently the range for Posix IDs stored in an LDAP server is unbound.
This might lead to conflicts in a setup with AD and trusts when the
configured domain uses IDs from LDAP. With the two noe options this
conflict can be avoided.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Currently the range for Posix IDs stored in an LDAP server is unbound.
This might lead to conflicts in a setup with AD and trusts when the
configured domain uses IDs from LDAP. With the two noe options this
conflict can be avoided.
</pre>
</div>
</content>
</entry>
<entry>
<title>AD: Write out domain-realm mappings</title>
<updated>2013-06-27T16:43:57+00:00</updated>
<author>
<name>Jakub Hrozek</name>
<email>jhrozek@redhat.com</email>
</author>
<published>2013-06-26T20:39:41+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/okos/public_git/sssd.git/commit/?id=58dd26b1c5b60ee992dd5d1214bb168aebb42d54'/>
<id>58dd26b1c5b60ee992dd5d1214bb168aebb42d54</id>
<content type='text'>
This patch reuses the code from IPA provider to make sure that
domain-realm mappings are written even for AD sub domains.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
This patch reuses the code from IPA provider to make sure that
domain-realm mappings are written even for AD sub domains.
</pre>
</div>
</content>
</entry>
<entry>
<title>AD: kinit with the local DC even when talking to a GC</title>
<updated>2013-06-26T21:37:33+00:00</updated>
<author>
<name>Jakub Hrozek</name>
<email>jhrozek@redhat.com</email>
</author>
<published>2013-06-26T14:23:32+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/okos/public_git/sssd.git/commit/?id=ba95f1c434b430f0db7fddbd865af10488ecab17'/>
<id>ba95f1c434b430f0db7fddbd865af10488ecab17</id>
<content type='text'>
We tried to use the GC address even for kinit which gave us errors like:
"Realm not local to KDC while getting initial credentials".

This patch adds a new AD_GC service that is only used for ID lookups,
any sort of Kerberos operations are done against the local servers.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
We tried to use the GC address even for kinit which gave us errors like:
"Realm not local to KDC while getting initial credentials".

This patch adds a new AD_GC service that is only used for ID lookups,
any sort of Kerberos operations are done against the local servers.
</pre>
</div>
</content>
</entry>
</feed>
