summaryrefslogtreecommitdiffstats
path: root/source3/include/ads.h
Commit message (Collapse)AuthorAgeFilesLines
* s3-kerberos: only use krb5 headers where required.Günther Deschner2009-11-271-53/+18
| | | | | | | This seems to be the only way to deal with mixed heimdal/MIT setups during merged build. Guenther
* s3-ads: removed 3 unused definesAndrew Tridgell2009-10-021-3/+0
| | | | | These are in nbt.idl and netlogon.idl as well, no need to have them here under different names, especially when the comments are wrong
* spnego: share spnego_parse.Günther Deschner2009-09-171-0/+6
| | | | Guenther
* libds: share UF_ flags between samba3 and 4.Günther Deschner2009-07-131-125/+2
| | | | Guenther
* Move gpo_sec to top-level.Jelmer Vernooij2009-04-201-2/+0
| | | | Signed-off-by: Günther Deschner <gd@samba.org>
* s3: use pidl to pull a KRB5_EDATA_NTSTATUS.Günther Deschner2009-02-061-6/+0
| | | | Guenther
* s3: correctly detect if the current dc is the closest oneStefan Metzmacher2008-12-131-1/+0
| | | | | | | | | | ads->config.tried_closest_dc was never set. metze Signed-off-by: Stefan Metzmacher <metze@samba.org> Signed-off-by: Günther Deschner <gd@samba.org> (cherry picked from commit dfe5b00db35e1e7c7bb3ba36729fc3f97eb48db3)
* * Allow an admin to define the "uid" attribute for a RFC2307Gerald (Jerry) Carter2008-09-161-0/+5
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | user object in AD to be the username alias. For example: $ net ads search "(uid=coffeedude)" distinguishedName: CN=Gerald W. Carter,CN=Users,DC=pink,DC=plainjoe,DC=org sAMAccountName: gcarter memberOf: CN=UnixUsers,CN=Users,DC=pink,DC=plainjoe,DC=org memberOf: CN=Domain Admins,CN=Users,DC=pink,DC=plainjoe,DC=org memberOf: CN=Enterprise Admins,CN=Users,DC=pink,DC=plainjoe,DC=org memberOf: CN=Schema Admins,CN=Users,DC=pink,DC=plainjoe,DC=org uid: coffeedude uidNumber: 10000 gidNumber: 10000 unixHomeDirectory: /home/gcarter loginShell: /bin/bash $ ssh coffeedude@192.168.56.91 Password: coffeedude@orville:~$ id uid=10000(coffeedude) gid=10000(PINK\unixusers) groups=10000(PINK\unixusers) $ getent passwd PINK\\gcarter coffeedude:*:10000:10000::/home/gcarter:/bin/bash $ getent passwd coffeedude coffeedude:*:10000:10000::/home/gcarter:/bin/bash $ getent group PINK\\Unixusers PINK\unixusers:x:10000:coffeedude
* kerberos: fix HAVE_KRB5 related build issue.Günther Deschner2008-08-291-3/+4
| | | | | Guenther (This used to be commit 7d7ba8397743af52a74d00fd717bdeb5e3e12a28)
* kerberos: add KRB5_KT_KEY abstraction macro.Günther Deschner2008-08-291-1/+9
| | | | | Guenther (This used to be commit be846d5383ef31136cca6b11eb6181736fb2e29d)
* kerberos: move the KRB5_KEY* macros to header file.Günther Deschner2008-08-291-0/+12
| | | | | Guenther (This used to be commit c28fa17ffffee3e6fd4897c9c6b4937388a19600)
* libads: Add API call to connect to a global catalog server.Gerald W. Carter2008-06-271-1/+3
| | | | | | | Extends ads_connect() to a new call ads_connect_gc() which connects on port 3268 rather than port 389. Also makes ads_try_connect() static and only used internally to ldap.c (This used to be commit f4c37dbe2c986fb7bfe510cdff3b4a9fbc06d079)
* libads: add ADS_AUTH_USER_CREDS to avoid magic overwriting of usernames.Günther Deschner2008-06-241-8/+9
| | | | | Guenther (This used to be commit b5aaf5aa0f280f69e05b613271c96473a79b812e)
* Remove DomainControllerAddressType which we now have in IDL.Günther Deschner2008-02-281-5/+0
| | | | | Guenther (This used to be commit 0a012c12d643e627ea1bad2a2ad6214f78918fa7)
* Move DS_DOMAIN_FUNCTION defines to ads.h.Günther Deschner2008-01-291-0/+7
| | | | | Guenther (This used to be commit 2605c6758ebb2f53c0c91f99d766e3db548e07ce)
* This is a large patch (sorry). Migrate from struct in_addrJeremy Allison2007-10-241-1/+1
| | | | | | | | | | | | | | to struct sockaddr_storage in most places that matter (ie. not the nmbd and NetBIOS lookups). This passes make test on an IPv4 box, but I'll have to do more work/testing on IPv6 enabled boxes. This should now give us a framework for testing and finishing the IPv6 migration. It's at the state where someone with a working IPv6 setup should (theorecically) be able to type : smbclient //ipv6-address/share and have it work. Jeremy. (This used to be commit 98e154c3125d5732c37a72d74b0eb5cd7b6155fd)
* r24804: As a temporary workaround, also try to guess the server's principal ↵Günther Deschner2007-10-101-0/+2
| | | | | | | | | | in the "not_defined_in_RFC4178@please_ignore" case to make at least LDAP SASL binds succeed with windows server 2008. Guenther (This used to be commit f5b3de4d3069eaa750240e3422bac5cb169b6c0a)
* r24131: - make it more clear what the different min and max fields meanStefan Metzmacher2007-10-101-4/+5
| | | | | | | | | | - with the "GSSAPI" sasl mech the plain, sign or seal negotiation is independed from the req_flags and ret_flags - verify the server supports the wrapping type we want - better handling on negotiated buffer sizes metze (This used to be commit d0ec7323870ca16b28d458ff5f7dacce278b7d54)
* r24039: remove unused global variable...Stefan Metzmacher2007-10-101-1/+1
| | | | | metze (This used to be commit 05fce8815f2f08f71522ba326224185dcecd62ae)
* r23946: add support for NTLMSSP sign and sealStefan Metzmacher2007-10-101-1/+1
| | | | | | | NOTE: windows servers are broken with sign only... metze (This used to be commit 408bb2e6e2171196a2bd314db181d9b124e931a1)
* r23945: add infrastructure to select plain, sign or seal LDAP connectionStefan Metzmacher2007-10-101-1/+12
| | | | | metze (This used to be commit 2075c05b3d8baa7d6d8510cd962471a5781740a6)
* r23926: implement output buffer handling for the SASL write wrapperStefan Metzmacher2007-10-101-2/+2
| | | | | metze (This used to be commit 65ce6fa21adec704b3cde30c57001e5620f048e4)
* r23922: implement input buffer handling for the SASL read wrapperStefan Metzmacher2007-10-101-15/+46
| | | | | metze (This used to be commit 7d8518ebd9470062b499b7074a940e14520e99f2)
* r23898: rename HAVE_ADS_SASL_WRAPPING -> HAVE_LDAP_SASL_WRAPPINGStefan Metzmacher2007-10-101-3/+3
| | | | | metze (This used to be commit 873eaff8febb50f00f9dac64c57b2a22c16f4f9b)
* r23896: hopefully fix the build on most systemsStefan Metzmacher2007-10-101-1/+1
| | | | | metze (This used to be commit d5512da62a6ae38321709611b04f419cc6c3b190)
* r23893: add dummy callbacks for LDAP SASL wrapping,Stefan Metzmacher2007-10-101-4/+6
| | | | | | | they're not used yet... metze (This used to be commit a3b97cdce719d9d5e82f26096c0e8c3a86ff3965)
* r23888: move elements belonging to the current ldap connection to aStefan Metzmacher2007-10-101-10/+13
| | | | | | | substructure. metze (This used to be commit 00909194a6c1ed193dfdb296f50f58a53450583c)
* r23838: Allow to store schema and config path in ADS_STRUCT config.Günther Deschner2007-10-101-0/+2
| | | | | Guenther (This used to be commit 1d5b08326fa72bd3423b377a4e6243466e778622)
* r23826: Fix gpo security filtering by matching the security descriptor ace's ↵Günther Deschner2007-10-101-0/+3
| | | | | | | | | for the extended apply group policy right. Guenther (This used to be commit d832014a6fef657f484412372b5d09047552b183)
* r23766: Add GTYPE_SECURITY_UNIVERSAL_GROUP define.Günther Deschner2007-10-101-0/+5
| | | | | Guenther (This used to be commit 964acb2716e230172e716d8d24ee2f888930130d)
* r23607: Add legacy support for Services for Unix (SFU) 2.0.Günther Deschner2007-10-101-4/+12
| | | | | Guenther (This used to be commit 11b390309b9677805e5b68f3a1b780658ae85137)
* r23128: Fix typo.Günther Deschner2007-10-101-1/+1
| | | | | Guenther (This used to be commit 52fdbbda53df79461322b9d21aba998f19181df8)
* r22841: Add comment to endif statement.Lars Müller2007-10-101-1/+1
| | | | (This used to be commit 1351207626ee0f99aef93326ef96bf69651bf472)
* r22797: We are only interested in the DACL of the security descriptor, so ↵Günther Deschner2007-10-101-0/+1
| | | | | | | | | search with the SD_FLAGS control. Guenther (This used to be commit 648df57e53ddabe74052e816b8eba95180736208)
* r22664: When we have krb5_get_init_creds_opt_get_error() then try to get the ↵Günther Deschner2007-10-101-0/+6
| | | | | | | | | NTSTATUS codes directly out of the krb5_error edata. Guenther (This used to be commit dcd902f24a59288bbb7400d59c0afc0c8303ed69)
* r21240: Fix longstanding Bug #4009.Günther Deschner2007-10-101-1/+2
| | | | | | | | | | | | | | | | | | For the winbind cached ADS LDAP connection handling (ads_cached_connection()) we were (incorrectly) assuming that the service ticket lifetime equaled the tgt lifetime. For setups where the service ticket just lives 10 minutes, we were leaving hundreds of LDAP connections in CLOSE_WAIT state, until we fail to service entirely with "Too many open files". Also sequence_number() in winbindd_ads.c needs to delete the cached LDAP connection after the ads_do_search_retry() has failed to submit the search request (although the bind succeeded (returning an expired service ticket that we cannot delete from the memory cred cache - this will get fixed later)). Guenther (This used to be commit 7e1a84b7226fb8dcd5d34c64a3478a6d886a9a91)
* r20986: Commit the prototype of the nss_info plugin interface.Gerald Carter2007-10-101-10/+11
| | | | | | | | | | | | This allows a provider to supply the homedirectory, etc... attributes for a user without requiring support in core winbindd code. The idmap_ad.c module has been modified to provide the idmap 'ad' library as well as the rfc2307 and sfu "winbind nss info" support. The SID/id mapping is working in idmap_ad but the nss_info still has a few quirks that I'm in the process of resolving. (This used to be commit aaec0115e2c96935499052d9a637a20c6445986e)
* r20857: Silence gives assent :-). Checking in the fix forJeremy Allison2007-10-101-0/+1
| | | | | | | | | | site support in a network where many DC's are down. I heard via Volker there is still a bug w.r.t the wrong site being chosen with trusted domains but we'll have to layer that fix on top of this. Gd - complain if this doesn't work for you. Jeremy. (This used to be commit 97e248f89ac6548274f03f2ae7583a255da5ddb3)
* r18019: Fix a C++ warnings: Don't use void * in libads/ for LDAPMessage anymore.Volker Lendecke2007-10-101-0/+4
| | | | | | | | Compiled it on systems with and without LDAP, I hope it does not break the build farm too badly. If it does, I'll fix it tomorrow. Volker (This used to be commit b2ff9680ebe0979fbeef7f2dabc2e3f27c959d11)
* r17970: Add missing include-guards around ads.h and ads_cldap.h.Jeremy Allison2007-10-101-0/+3
| | | | | | | Remove all reference to "Default-First-Site-Name" and treat it like any other site. Jeremy. (This used to be commit 5ae3564d6844f44a6943b2028917bd457371af1e)
* r17945: Store the server and client sitenames in the ADSJeremy Allison2007-10-101-0/+2
| | | | | | | struct so we can see when they match - only create the ugly krb5 hack when they do. Jeremy. (This used to be commit 9be4ecf24b6b5dacf4c2891bddb072fa7543753f)
* r17943: The horror, the horror. Add KDC site support byJeremy Allison2007-10-101-0/+1
| | | | | | | | writing out a custom krb5.conf file containing the KDC I need. This may suck.... Needs some testing :-). Jeremy. (This used to be commit d500e1f96d92dfcc6292c448d1b399195f762d89)
* r16548: Fix bug #3867 reported by jason@ncac.gwu.edu.Jeremy Allison2007-10-101-0/+1
| | | | | Jeremy. (This used to be commit 2b8d72f09c6d79d5d41421545b538da573adcd9d)
* r16336: Fix Klocwork ID's 1087, 1095, 1096, 1098, 1099, 1101, 1102, 1105, ↵Volker Lendecke2007-10-101-0/+4
| | | | | | | | | 1107, 1109, 1111 Volker (This used to be commit def075baf873b24c522d09ddc0141d84431a1fae)
* r15698: An attempt to make the winbind lookup_usergroups() call in security=adsGünther Deschner2007-10-101-0/+15
| | | | | | | | | | | | | | | | | | | | | | | | | | more scalable: The most efficient way is to use the "tokenGroups" attribute which gives the nested group membership. As this attribute can not always be retrieved when binding with the machine account (the only garanteed way to get the tokenGroups I could find is when the machine account is a member of the "Pre Win2k Access" builtin group). Our current fallback when "tokenGroups" failed is looking for all groups where the userdn was in the "member" attribute. This behaves not very well in very large AD domains. The patch first tries the "memberOf" attribute on the user's dn in that case and directly retrieves the group's sids by using the LDAP Extended DN control from the user's object. The way to pass down the control to the ldap search call is rather painfull and probably will be rearranged later on. Successfully tested on win2k sp0, win2k sp4, wink3 sp1 and win2k3 r2. Guenther (This used to be commit 7d766b5505e4099ef7dd4e88bb000ebe38d71bd0)
* r15697: I take no comments as no objections :)Günther Deschner2007-10-101-5/+27
| | | | | | | | | | | Expand the "winbind nss info" to also take "rfc2307" to support the plain posix attributes LDAP schema from win2k3-r2. This work is based on patches from Howard Wilkinson and Bob Gautier (and closes bug #3345). Guenther (This used to be commit 52423e01dc209ba5abde808a446287714ed11567)
* r15543: New implementation of 'net ads join' to be more like Windows XP.Gerald Carter2007-10-101-15/+0
| | | | | | | | | | | | | | | | | | | | | | | | | | | | The motivating factor is to not require more privileges for the user account than Windows does when joining a domain. The points of interest are * net_ads_join() uses same rpc mechanisms as net_rpc_join() * Enable CLDAP queries for filling in the majority of the ADS_STRUCT->config information * Remove ldap_initialized() from sam/idmap_ad.c and libads/ldap.c * Remove some unnecessary fields from ADS_STRUCT * Manually set the dNSHostName and servicePrincipalName attribute using the machine account after the join Thanks to Guenther and Simo for the review. Still to do: * Fix the userAccountControl for DES only systems * Set the userPrincipalName in order to support things like 'kinit -k' (although we might be able to just use the sAMAccountName instead) * Re-add support for pre-creating the machine account in a specific OU (This used to be commit 4c4ea7b20f44cd200cef8c7b389d51b72eccc39b)
* r15243: Sorry for the breakage:Günther Deschner2007-10-101-1/+5
| | | | | | | | * Fix the build without kerberos headers * Fix memleak in the krb5_address handling Guenther (This used to be commit 10e42117559d4bc6a34e41a94914bf6c65c3477f)
* r15240: Correctly disallow unauthorized access when logging on with theGünther Deschner2007-10-101-0/+12
| | | | | | | | | | | | | kerberized pam_winbind and workstation restrictions are in effect. The krb5 AS-REQ needs to add the host netbios-name in the address-list. We don't get the clear NT_STATUS_INVALID_WORKSTATION code back yet from the edata of the KRB_ERROR but the login at least fails when the local machine is not in the workstation list on the DC. Guenther (This used to be commit 8b2ba11508e2730aba074d7c095291fac2a62176)
* r14051: Add remaining (documented) userAccountControl bits, thanks to LukeGünther Deschner2007-10-101-2/+2
| | | | | | | Howard for pointing this out. Guenther (This used to be commit 170038f4cdfa51ea31b2255a020740d28dfbfba2)