<feed xmlns='http://www.w3.org/2005/Atom'>
<title>sssd.git/src/providers/data_provider.h, branch token3</title>
<subtitle>System Security Services Daemon [okos' clone]</subtitle>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/okos/public_git/sssd.git/'/>
<entry>
<title>Add two new request types to the data-provider interface</title>
<updated>2013-05-02T17:33:56+00:00</updated>
<author>
<name>Sumit Bose</name>
<email>sbose@redhat.com</email>
</author>
<published>2013-04-22T14:29:51+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/okos/public_git/sssd.git/commit/?id=f0944fdd627bd684ff36c9670dc857ffdedc343f'/>
<id>f0944fdd627bd684ff36c9670dc857ffdedc343f</id>
<content type='text'>
The patch adds two new request types for SID related requests. The first
one is used if a SID is given and the corresponding object should be
found. The second one can be used if the SID for an object is requested
but it is not clear if the object is a user or a group.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
The patch adds two new request types for SID related requests. The first
one is used if a SID is given and the corresponding object should be
found. The second one can be used if the SID for an object is requested
but it is not clear if the object is a user or a group.
</pre>
</div>
</content>
</entry>
<entry>
<title>Add secid filter to responder-dp protocol</title>
<updated>2013-05-02T17:33:56+00:00</updated>
<author>
<name>Sumit Bose</name>
<email>sbose@redhat.com</email>
</author>
<published>2013-04-11T16:23:27+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/okos/public_git/sssd.git/commit/?id=206329d3901738036352f2ac1e8d7804f728861d'/>
<id>206329d3901738036352f2ac1e8d7804f728861d</id>
<content type='text'>
This patch add a new filter type to the data-provider interface which
can be used for SID-based lookups.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
This patch add a new filter type to the data-provider interface which
can be used for SID-based lookups.
</pre>
</div>
</content>
</entry>
<entry>
<title>Init failover with be_res options</title>
<updated>2013-04-03T12:42:00+00:00</updated>
<author>
<name>Jakub Hrozek</name>
<email>jhrozek@redhat.com</email>
</author>
<published>2013-03-25T21:54:48+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/okos/public_git/sssd.git/commit/?id=584eda085e83a428f2c39dadf0d7adeaff5c87f4'/>
<id>584eda085e83a428f2c39dadf0d7adeaff5c87f4</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>Making the authtok structure really opaque.</title>
<updated>2013-04-02T15:01:08+00:00</updated>
<author>
<name>Lukas Slebodnik</name>
<email>lslebodn@redhat.com</email>
</author>
<published>2013-03-14T08:10:39+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/okos/public_git/sssd.git/commit/?id=9acfb09f7969a69f58bd45c856b01700541853ca'/>
<id>9acfb09f7969a69f58bd45c856b01700541853ca</id>
<content type='text'>
Definition of structure sss_auth_token was removed from header file
authtok.h and there left only declaration of this structure.
Therefore only way how to use this structure is to use accessory function from
same header file.

To creating new empty authotok can only be used newly created function
sss_authtok_new(). TALLOC context was removed from copy and setter functions,
because pointer to stuct sss_auth_token is used as a memory context.

All declaration of struct sss_auth_token variables was replaced with
pointer to this structure and related changes was made in source code.

Function copy_pam_data can copy from argument src which was dynamically
allocated with function create_pam_data() or zero initialized struct pam_data
allocated on stack.

https://fedorahosted.org/sssd/ticket/1830
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Definition of structure sss_auth_token was removed from header file
authtok.h and there left only declaration of this structure.
Therefore only way how to use this structure is to use accessory function from
same header file.

To creating new empty authotok can only be used newly created function
sss_authtok_new(). TALLOC context was removed from copy and setter functions,
because pointer to stuct sss_auth_token is used as a memory context.

All declaration of struct sss_auth_token variables was replaced with
pointer to this structure and related changes was made in source code.

Function copy_pam_data can copy from argument src which was dynamically
allocated with function create_pam_data() or zero initialized struct pam_data
allocated on stack.

https://fedorahosted.org/sssd/ticket/1830
</pre>
</div>
</content>
</entry>
<entry>
<title>Reusing create_pam_data() on the other places.</title>
<updated>2013-04-02T15:01:08+00:00</updated>
<author>
<name>Lukas Slebodnik</name>
<email>lslebodn@redhat.com</email>
</author>
<published>2013-03-14T08:44:41+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/okos/public_git/sssd.git/commit/?id=53b58615fbc13eddcd6e2f28066b67cb5f16b6d3'/>
<id>53b58615fbc13eddcd6e2f28066b67cb5f16b6d3</id>
<content type='text'>
Function create_pam_data() should be only one way how to create new
struct pam_data, because it also initialize destructor to created
object.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Function create_pam_data() should be only one way how to create new
struct pam_data, because it also initialize destructor to created
object.
</pre>
</div>
</content>
</entry>
<entry>
<title>Change pam data auth tokens.</title>
<updated>2013-01-10T17:24:59+00:00</updated>
<author>
<name>Simo Sorce</name>
<email>simo@redhat.com</email>
</author>
<published>2012-10-18T22:43:56+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/okos/public_git/sssd.git/commit/?id=64af76e2bef2565caa9738f675c108a4b3789237'/>
<id>64af76e2bef2565caa9738f675c108a4b3789237</id>
<content type='text'>
Use the new authtok abstraction and interfaces throught the code.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Use the new authtok abstraction and interfaces throught the code.
</pre>
</div>
</content>
</entry>
<entry>
<title>Hook for mmap cache update on initgroup calls</title>
<updated>2012-12-05T22:01:37+00:00</updated>
<author>
<name>Simo Sorce</name>
<email>simo@redhat.com</email>
</author>
<published>2012-12-05T17:40:44+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/okos/public_git/sssd.git/commit/?id=408914f68673f2caa1c82a1a21336fcb7ddd52ef'/>
<id>408914f68673f2caa1c82a1a21336fcb7ddd52ef</id>
<content type='text'>
This set of functions enumerate the user's groups and invalidate them all
if the list does not matches what we get from the caller.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
This set of functions enumerate the user's groups and invalidate them all
if the list does not matches what we get from the caller.
</pre>
</div>
</content>
</entry>
<entry>
<title>Hook to perform a mmap cache update from sssd_nss</title>
<updated>2012-12-05T22:01:37+00:00</updated>
<author>
<name>Simo Sorce</name>
<email>simo@redhat.com</email>
</author>
<published>2012-12-05T17:40:43+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/okos/public_git/sssd.git/commit/?id=ebba1aa6b9783daa0d530e9f5e307f7be17d3cd3'/>
<id>ebba1aa6b9783daa0d530e9f5e307f7be17d3cd3</id>
<content type='text'>
This set of functions enumerate each user/group from all domains
and invalidate any mmap cache record that matches.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
This set of functions enumerate each user/group from all domains
and invalidate any mmap cache record that matches.
</pre>
</div>
</content>
</entry>
<entry>
<title>Use an entry type mask macro to filter entry types</title>
<updated>2012-12-04T11:58:22+00:00</updated>
<author>
<name>Simo Sorce</name>
<email>simo@redhat.com</email>
</author>
<published>2012-11-28T03:24:58+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/okos/public_git/sssd.git/commit/?id=e11c7dc43f4ff9897e37cc0d793f8e1fb3b8453a'/>
<id>e11c7dc43f4ff9897e37cc0d793f8e1fb3b8453a</id>
<content type='text'>
Avoids hardcoding magic numbers everywhere and self documents why a
mask is being applied.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Avoids hardcoding magic numbers everywhere and self documents why a
mask is being applied.
</pre>
</div>
</content>
</entry>
<entry>
<title>krb5_child: send back the client principal</title>
<updated>2012-10-26T08:32:05+00:00</updated>
<author>
<name>Sumit Bose</name>
<email>sbose@redhat.com</email>
</author>
<published>2012-10-23T19:30:17+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/okos/public_git/sssd.git/commit/?id=d3dca30d3a6feba062d0299718d1a9fcdc8b9d17'/>
<id>d3dca30d3a6feba062d0299718d1a9fcdc8b9d17</id>
<content type='text'>
In general Kerberos is case sensitive but the KDC of Active Directory
typically handles request case in-sensitive. In the case where we guess
a user principal by combining the user name and the realm and are not
sure about the cases of the letters used in the user name we might get a
valid ticket from the AD KDC but are not able to access it with the
Kerberos client library because we assume a wrong case.

The client principal in the returned credentials will always have the
right cases. To be able to update the cache user principal name the
krb5_child will return the principal for further processing.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
In general Kerberos is case sensitive but the KDC of Active Directory
typically handles request case in-sensitive. In the case where we guess
a user principal by combining the user name and the realm and are not
sure about the cases of the letters used in the user name we might get a
valid ticket from the AD KDC but are not able to access it with the
Kerberos client library because we assume a wrong case.

The client principal in the returned credentials will always have the
right cases. To be able to update the cache user principal name the
krb5_child will return the principal for further processing.
</pre>
</div>
</content>
</entry>
</feed>
