summaryrefslogtreecommitdiffstats
path: root/source4/dsdb/samdb
Commit message (Collapse)AuthorAgeFilesLines
* Revert "s4:password_hash LDB module - don't break the provision"Stefan Metzmacher2010-05-111-3/+0
| | | | | | | | This reverts commit 6276343ce1b7dd7d217e5a419c09f209f5f87379. This is not needed anymore. metze
* Revert "s4:password hash LDB module - check that password hashes are != NULL ↵Stefan Metzmacher2010-05-111-10/+6
| | | | | | | | | | before copying them" This reverts commit fa87027592f71179c22f132e375038217bc9d36a. This check is done one level above now. metze
* s4:dsdb/password_hash: only try to handle a hash in the unicodePwd field if ↵Stefan Metzmacher2010-05-111-2/+2
| | | | | | | | it's given Sorry, I removed this logic while cleaning up indentation levels... metze
* s4:password_hash LDB module - we might not have a cleartext password at allMatthias Dieter Wallnöfer2010-05-101-26/+29
| | | | | When we don't have the cleartext of the new password then don't check it using "samdb_check_password".
* s4:password_hash LDB module - quiet a warningMatthias Dieter Wallnöfer2010-05-101-1/+1
|
* s4:password hash LDB module - check that password hashes are != NULL before ↵Matthias Dieter Wallnöfer2010-05-101-6/+10
| | | | copying them
* s4:password_hash LDB module - don't break the provisionMatthias Dieter Wallnöfer2010-05-101-0/+3
| | | | | This is to don't break the provision process at the moment. We need to find a better solution.
* s4:password_hash - Implement password restrictionsStefan Metzmacher2010-05-101-0/+195
| | | | | | Based on the Patch from Matthias Dieter Wallnöfer <mwallnoefer@yahoo.de>. metze
* s4:password_hash - Rework to handle password changesMatthias Dieter Wallnöfer2010-05-101-138/+450
| | | | | | | | - Implement the password restrictions as specified in "samdb_set_password" (complexity, minimum password length, minimum password age...). - We support only (administrative) password reset operations at the moment - Support password (administrative) reset and change operations (consider MS-ADTS 3.1.1.3.1.5)
* s4:password_hash - Rework unique value checksMatthias Dieter Wallnöfer2010-05-101-49/+71
| | | | | Windows Server performs the constraint checks in a different way than we do. All testing has been done using "passwords.py".
* s4:password_hash - Various (mostly cosmetic) preworkMatthias Dieter Wallnöfer2010-05-101-176/+240
| | | | | | | | - Enhance comments - Get some more attributes from the domain and user object (needed later) - Check for right objectclass on change/set operations (instances of "user" and/or "inetOrgPerson") - otherwise forward the request - (Cosmetic) cleanup in asynchronous results regarding return values
* s4:dsdb: add new controlsMatthias Dieter Wallnöfer2010-05-101-0/+21
| | | | | | | - Add a new control for getting status informations (domain informations, password change status) directly from the module - Add a new control for allowing direct hash changes - Introduce an addtional control "change_old password checked" for the password
* s4:acl ldb module - fix typosMatthias Dieter Wallnöfer2010-05-101-3/+3
|
* s4:samldb LDB module - make "samldb_member_check" synchronous againMatthias Dieter Wallnöfer2010-05-091-64/+33
|
* s4:samldb LDB module - make "samldb_prim_group_users_check" synchronous againMatthias Dieter Wallnöfer2010-05-091-235/+24
|
* s4:samldb LDB module - update the copyright noticeMatthias Dieter Wallnöfer2010-05-091-1/+1
|
* dsdb/password_hash: remove usage of msDs-KeyVersionNumberStefan Metzmacher2010-05-091-37/+1
| | | | metze
* s4:dsdb Use replPropertyMetaData as the basis for msDS-KeyVersionNumberAndrew Bartlett2010-05-091-10/+76
| | | | | | | | | | | | | This means that the existing kvno will no longer be valid, all unix-based domain members may need to be rejoined, and upgradeprovision run to update the local kvno in secrets.ldb/secrets.keytab. This is required to match the algorithm used by Windows DCs, which we may be replicating with. We also need to find a way to generate a reasonable kvno with the OpenLDAP backend. Andrew Bartlett
* s4/rodc: Support read-only databaseAnatoliy Atanasov2010-05-044-13/+75
| | | | | | Check on modify if we are RODC and return referral. On the ldap backend side now we pass context and ldb_modify_default_callback to propagate the referral error to the client.
* s4/rodc: Fix the callbacks up the stack to handle referrals on modify requestsAnatoliy Atanasov2010-05-046-0/+48
|
* s4/rodc: Implement msDS-isRODC constructed attrAnatoliy Atanasov2010-05-031-1/+152
|
* s4:dsdb Fix use of memory after free in repl_meta_dataAndrew Bartlett2010-05-011-7/+9
| | | | | | | | | | The upgraded link values are were allocated on tmp_ctx, and need to be kept until they are written to the DB. If we don't give the correct context, they will be gone after the talloc_free(tmp_ctx). Found by Matthieu Patou <mat+Informatique.Samba@matws.net> Andrew Bartlett
* s4/rodc: RODC FAS initial implementationAnatoliy Atanasov2010-04-292-12/+13
|
* s4-repl: these messages are common, and don't deserve debug level 1Andrew Tridgell2010-04-271-2/+2
| | | | getting older attributes is quite common
* s4-ddb: don't create partitions with the UNINSTANT flag setAndrew Tridgell2010-04-261-1/+14
| | | | | | | these partitions and not on the server we are replicating from. Also check for deleted partitions. Pair-Programmed-With: Andrew Bartlett <abartlet@samba.org>
* s4-drs: make links to foreign partitions non-fatalAndrew Tridgell2010-04-261-8/+6
| | | | | | | DN links outside the set of partitions we are replication should be allowed. Pair-Programmed-With: Andrew Bartlett <abartlet@samba.org>
* s4-drs: added new SECURITY_RO_DOMAIN_CONTROLLER levelAndrew Tridgell2010-04-224-4/+4
| | | | | | | | | | | This is used for allowing operations by RODCs, and denying them operations that should only be allowed for a full DC This required a new domain_sid argument to security_session_user_level() Pair-Programmed-With: Andrew Bartlett <abartlet@samba.org> Pair-Programmed-With: Rusty Russell <rusty@samba.org>
* s4-dsdb: removed an unused variableAndrew Tridgell2010-04-221-1/+0
|
* s4-dsdb: moved rodc schema validation to samldb.cAndrew Tridgell2010-04-222-33/+37
| | | | | | This means we are only doing the checks for schema changes Pair-Programmed-With: Andrew Bartlett <abartlet@samba.org>
* s4-drs: Do not allow system-critical attributes to be RODC filteredFernando J V da Silva2010-04-221-0/+33
| | | | Signed-off-by: Andrew Tridgell <tridge@samba.org>
* s4:ldap-backend Fix LSA test failures with OpenLDAP backend - convert SIDsAndrew Bartlett2010-04-221-0/+24
| | | | | | | | The SIDs in some queries were not being passed as binary, but as strings in comparison with the securityIdentifer object. We need to recognise that these are SIDs in the simple_ldap_map. Andrew Bartlett
* s4:OpenLDAP-backend Use the new rdnval module in OpenLDAPAndrew Bartlett2010-04-222-3/+8
| | | | | | | | This is rather than rdn_name, which tries to do the job on the client side. We need to leave this module in the stack for Fedora DS (and of course the LDB backend). Andrew Bartlett
* s4:dsdb Revert accidentilly commited change for LDAP backendsAndrew Bartlett2010-04-221-1/+1
| | | | | | | In the future, LDAP backends will be resposible for maintaining the 'name' attributes. Andrew Bartlett
* s4:provision Pass in the invoication ID and NTDS Settings DN to Schema()Andrew Bartlett2010-04-201-1/+1
| | | | | | | By putting these values into the cache on the LDB, this reduces some of the noise in provision, particularly with the LDAP backend. Andrew Bartlett
* s4:Replaced dsdb_get_dom_sid_from_ldb_message() with samdb_result_dom_sid()Nadezhda Ivanova2010-04-161-24/+5
|
* s4:rootdse: only return "tokenGroups", when the client asked for themStefan Metzmacher2010-04-151-1/+1
| | | | metze
* s4:acl/descriptor LDB module - distinguish between root and default basednMatthias Dieter Wallnöfer2010-04-132-0/+12
| | | | | | | | The first is the forest base DN, the second the domain base DN. At the moment we assume that they are both the same but it hasn't to be so. Nadia, I would invite you to fix the outstanding parts regarding this (I added comments).
* Revert "s4:prefer "samdb_*_dn" basedn calls over the "ldb_get_*_dn" functions"Matthias Dieter Wallnöfer2010-04-136-9/+10
| | | | | We should use the "ldb_get_*_basedn" calls since they are available in the LDB library.
* s4:objectclass LDB module - remove a unneeded newlineMatthias Dieter Wallnöfer2010-04-131-2/+1
|
* s4:prefer "samdb_*_dn" basedn calls over the "ldb_get_*_dn" functionsMatthias Dieter Wallnöfer2010-04-121-1/+1
| | | | Purely cosmetic change.
* subunit: Remove more test output that could be interpreted by subunit.Jelmer Vernooij2010-04-111-1/+1
|
* s4:dsdb Don't return operational attributes on special DNsAndrew Bartlett2010-04-101-0/+5
|
* s4:rootdse Implement "tokenGroups" in the rootDSEAndrew Bartlett2010-04-101-0/+18
| | | | | | | This returns the currently connected user's full token. This is very useful for debugging, and should be used in ACL tests. Andrew Bartlett
* s4:dsdb Improve error message in extended_dn_inAndrew Bartlett2010-04-101-1/+1
| | | | | | | This error occours when an extended DN cannot be resolved, so it's most helpful to print the problematic extended DN. Andrew Bartlett
* s4:schema Try to fix OpenLDAP backend after schema reload support.Andrew Bartlett2010-04-101-4/+2
| | | | | | If we can't get @REPLCHANGED, default to a value of 0. Andrew Bartlett
* s4/samldb: schemaInfo attribute must be updated when adding new Schema objectKamen Mazdrashki2010-04-091-0/+50
|
* s4:dsdb - Handle INVALID_DN_SYNTAX from OpenLDAP in ↵Endi S. Dewata2010-04-081-1/+1
| | | | | | dsdb_module_load_partition_usn(). Signed-off-by: Matthias Dieter Wallnöfer <mwallnoefer@yahoo.de>
* s4-waf: mark the wscript files as python so vim/emacs knows how to highlight ↵Andrew Tridgell2010-04-061-0/+2
| | | | them
* build: waf quicktest nearly worksAndrew Tridgell2010-04-061-45/+41
| | | | | Rewrote wafsamba using a new dependency handling system, and started adding the waf test code
* build: commit all the waf build files in the treeAndrew Tridgell2010-04-061-0/+309
|