<feed xmlns='http://www.w3.org/2005/Atom'>
<title>sssd2.git/src/external, branch master</title>
<subtitle>System Security Services Daemon [okos' clone]</subtitle>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/okos/public_git/sssd2.git/'/>
<entry>
<title>DNS sites support - add AD SRV plugin</title>
<updated>2013-05-02T14:48:12+00:00</updated>
<author>
<name>Pavel Březina</name>
<email>pbrezina@redhat.com</email>
</author>
<published>2013-04-16T13:41:33+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/okos/public_git/sssd2.git/commit/?id=a679f0167b646cffdae86546ed77e105576991b0'/>
<id>a679f0167b646cffdae86546ed77e105576991b0</id>
<content type='text'>
https://fedorahosted.org/sssd/ticket/1032
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
https://fedorahosted.org/sssd/ticket/1032
</pre>
</div>
</content>
</entry>
<entry>
<title>DB: Switch to new libini_config API</title>
<updated>2013-04-25T22:26:26+00:00</updated>
<author>
<name>Ondrej Kos</name>
<email>okos@redhat.com</email>
</author>
<published>2013-03-28T14:35:03+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/okos/public_git/sssd2.git/commit/?id=7de6e3534fd61c7619ed34a6b1afe7230b5e6504'/>
<id>7de6e3534fd61c7619ed34a6b1afe7230b5e6504</id>
<content type='text'>
https://fedorahosted.org/sssd/ticket/1786

Since we need to support the old interface as well, the configure scritp
is modified and correct ini interface is chosen.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
https://fedorahosted.org/sssd/ticket/1786

Since we need to support the old interface as well, the configure scritp
is modified and correct ini interface is chosen.
</pre>
</div>
</content>
</entry>
<entry>
<title>Allow usage of enterprise principals</title>
<updated>2013-04-22T13:33:40+00:00</updated>
<author>
<name>Sumit Bose</name>
<email>sbose@redhat.com</email>
</author>
<published>2013-03-25T16:41:19+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/okos/public_git/sssd2.git/commit/?id=edaa983d094c239c3e1ba667bcd20ed3934be3b8'/>
<id>edaa983d094c239c3e1ba667bcd20ed3934be3b8</id>
<content type='text'>
Enterprise principals are currently most useful for the AD provider and
hence enabled here by default while for the other Kerberos based
authentication providers they are disabled by default.

If additional UPN suffixes are configured for the AD domain the user
principal stored in the AD LDAP server might not contain the real
Kerberos realm of the AD domain but one of the additional suffixes which
might be completely randomly chooses, e.g. are not related to any
existing DNS domain. This make it hard for a client to figure out the
right KDC to send requests to.

To get around this enterprise principals (see
http://tools.ietf.org/html/rfc6806 for details) were introduced.
Basically a default realm is added to the principal so that the Kerberos
client libraries at least know where to send the request to. It is not
in the responsibility of the KDC to either handle the request itself,
return a client referral if he thinks a different KDC can handle the
request or return and error. This feature is also use to allow
authentication in AD environments with cross forest trusts.

Fixes https://fedorahosted.org/sssd/ticket/1842
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Enterprise principals are currently most useful for the AD provider and
hence enabled here by default while for the other Kerberos based
authentication providers they are disabled by default.

If additional UPN suffixes are configured for the AD domain the user
principal stored in the AD LDAP server might not contain the real
Kerberos realm of the AD domain but one of the additional suffixes which
might be completely randomly chooses, e.g. are not related to any
existing DNS domain. This make it hard for a client to figure out the
right KDC to send requests to.

To get around this enterprise principals (see
http://tools.ietf.org/html/rfc6806 for details) were introduced.
Basically a default realm is added to the principal so that the Kerberos
client libraries at least know where to send the request to. It is not
in the responsibility of the KDC to either handle the request itself,
return a client referral if he thinks a different KDC can handle the
request or return and error. This feature is also use to allow
authentication in AD environments with cross forest trusts.

Fixes https://fedorahosted.org/sssd/ticket/1842
</pre>
</div>
</content>
</entry>
<entry>
<title>Provide libnl3 support</title>
<updated>2013-03-27T19:15:52+00:00</updated>
<author>
<name>Ondrej Kos</name>
<email>okos@redhat.com</email>
</author>
<published>2013-02-18T13:43:19+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/okos/public_git/sssd2.git/commit/?id=539b1be3507abdf8ac235b06eeed5011b0b5cde2'/>
<id>539b1be3507abdf8ac235b06eeed5011b0b5cde2</id>
<content type='text'>
https://fedorahosted.org/sssd/ticket/812

Update the monitor code to be using the new libnl3 API.

Changed configure option
--with-libnl

By default, it tries to build with libnl3, if not found, then with
libnl1, if this isn't found either, build proceeds without libnl, just
with warning.

Specifing --with-libnl=&lt;libnl3|libnl1|no&gt; checks for the specific given
version, if not found, configure ends with error.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
https://fedorahosted.org/sssd/ticket/812

Update the monitor code to be using the new libnl3 API.

Changed configure option
--with-libnl

By default, it tries to build with libnl3, if not found, then with
libnl1, if this isn't found either, build proceeds without libnl, just
with warning.

Specifing --with-libnl=&lt;libnl3|libnl1|no&gt; checks for the specific given
version, if not found, configure ends with error.
</pre>
</div>
</content>
</entry>
<entry>
<title>Move signal.m4 from src/util to external</title>
<updated>2013-03-21T16:41:56+00:00</updated>
<author>
<name>Jakub Hrozek</name>
<email>jhrozek@redhat.com</email>
</author>
<published>2013-03-18T13:49:27+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/okos/public_git/sssd2.git/commit/?id=6b0a7c72bb841d6885a620c68bd51d55109b66c7'/>
<id>6b0a7c72bb841d6885a620c68bd51d55109b66c7</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>Making the ldb check configurable</title>
<updated>2013-03-20T11:28:55+00:00</updated>
<author>
<name>Lukas Slebodnik</name>
<email>lslebodn@redhat.com</email>
</author>
<published>2013-03-13T10:09:11+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/okos/public_git/sssd2.git/commit/?id=ec26d836b1b2a41ec2692976a539da51f261412b'/>
<id>ec26d836b1b2a41ec2692976a539da51f261412b</id>
<content type='text'>
It is possible to enable/disable checking in LDB memberof plugin
whether it was built against the same version of LDB that is present
on the system. This feature is turned off by default
and enabled in Fedora/RHEL spec file.

https://fedorahosted.org/sssd/ticket/1813
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
It is possible to enable/disable checking in LDB memberof plugin
whether it was built against the same version of LDB that is present
on the system. This feature is turned off by default
and enabled in Fedora/RHEL spec file.

https://fedorahosted.org/sssd/ticket/1813
</pre>
</div>
</content>
</entry>
<entry>
<title>Detect the presence of libcmocka during configure</title>
<updated>2013-03-08T21:19:26+00:00</updated>
<author>
<name>Jakub Hrozek</name>
<email>jhrozek@redhat.com</email>
</author>
<published>2013-02-12T13:47:35+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/okos/public_git/sssd2.git/commit/?id=a5077712fc8c24e8cad08207b7b5a6603bde6a7c'/>
<id>a5077712fc8c24e8cad08207b7b5a6603bde6a7c</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>Add support for krb5 1.11's responder callback.</title>
<updated>2013-03-08T20:58:03+00:00</updated>
<author>
<name>Nathaniel McCallum</name>
<email>npmccallum@redhat.com</email>
</author>
<published>2013-03-08T17:06:10+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/okos/public_git/sssd2.git/commit/?id=b40583c6d52b72e41bf01106534535e54b4fba4f'/>
<id>b40583c6d52b72e41bf01106534535e54b4fba4f</id>
<content type='text'>
krb5 1.11 adds support for a new method for responding to
structured data queries. This method, called the responder,
provides an alternative to the prompter interface.

This patch adds support for this method. It takes the password
and provides it via a responder instead of the prompter. In the
case of OTP authentication, it also disables the caching of
credentials (since the credentials are one-time only).
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
krb5 1.11 adds support for a new method for responding to
structured data queries. This method, called the responder,
provides an alternative to the prompter interface.

This patch adds support for this method. It takes the password
and provides it via a responder instead of the prompter. In the
case of OTP authentication, it also disables the caching of
credentials (since the credentials are one-time only).
</pre>
</div>
</content>
</entry>
<entry>
<title>krb5: include backwards compatible declaration of krb5_trace_info</title>
<updated>2013-02-11T14:42:17+00:00</updated>
<author>
<name>Jakub Hrozek</name>
<email>jhrozek@redhat.com</email>
</author>
<published>2013-02-04T16:30:48+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/okos/public_git/sssd2.git/commit/?id=4e78fab6a1b2e9653a7959cbdb7d54bb750041d0'/>
<id>4e78fab6a1b2e9653a7959cbdb7d54bb750041d0</id>
<content type='text'>
krb5-1.10 used to include "struct krb5_trace_info", now krb5-1.11
includes a "krb5_trace_info" typedefed from "struct _krb5_trace_info".

Do the same in the SSSD to allow compiling with both 1.10 and 1.11.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
krb5-1.10 used to include "struct krb5_trace_info", now krb5-1.11
includes a "krb5_trace_info" typedefed from "struct _krb5_trace_info".

Do the same in the SSSD to allow compiling with both 1.10 and 1.11.
</pre>
</div>
</content>
</entry>
<entry>
<title>BUILD: Temporary workaround for Kerberos build</title>
<updated>2012-11-20T08:02:50+00:00</updated>
<author>
<name>Stephen Gallagher</name>
<email>sgallagh@redhat.com</email>
</author>
<published>2012-11-19T15:41:06+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/okos/public_git/sssd2.git/commit/?id=ff4e9f4d59368004b3917a86dc82c24deb47d905'/>
<id>ff4e9f4d59368004b3917a86dc82c24deb47d905</id>
<content type='text'>
This patch extends the Kerberos version check to support Kerberos
version 1.11 alpha and later. It is a temporary measure until we
can redesign the configure checks for better granularity.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
This patch extends the Kerberos version check to support Kerberos
version 1.11 alpha and later. It is a temporary measure until we
can redesign the configure checks for better granularity.
</pre>
</div>
</content>
</entry>
</feed>
