| Commit message (Collapse) | Author | Age | Files | Lines |
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
|
|
|
| |
consequences during ipa-server-install.
|
|
|
|
| |
Fix some copy-paste errors from the password policy update
|
|
|
|
| |
Don't allow the default group for users to be removed.
|
| |
|
| |
|
| |
|
|
|
|
|
| |
Fix bootstrap.ldif to add new Class of Service entries properly
Include some man pages that weren't being installed
|
| |
|
| |
|
| |
|
| |
|
|
|
|
| |
Warning: this lacks any sort of authorization.
|
| |
|
|
|
|
|
|
| |
specific version check on freeradius. Packages aren't
available and the freeradius support isn't ready
anyway.
|
| |
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
This add replication setup through two new commands: ipa-replica-prepare
and ipa-replica-install. The procedure is to run ipa-replica-prepare
on an existing master. This will collect information about the realm
and the current master and create a file storing all of the information.
After copying that file to the new replica, ipa-replica-install is
run (with -r to create a read-only replica).
This version of the patch also includes fixes for the sasl mappings
on the replicas.
Remaining features:
- ssl for replication.
- automatic configuration of mesh topology for
master (or a simpler way to replicate multiple
masters.
- tool for view / configuring current replication.
|
| |
|
| |
|
| |
|
| |
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
This adds 2 new groups: activated and inactivated.
If you, or a group you are a member of, is in inactivated then you are too.
If you, or a group you are a member of, is in the activated group, then you
are too.
In a fight between activated and inactivated, activated wins.
The DNs for doing this matching is case and white space sensitive.
The goal is to never have to actually set nsAccountLock in a user directly
but move them between these groups.
We need to decide where in the CLI this will happen. Right it is split
between ipa-deluser and ipa-usermod. To inactivate groups for now just
add the group to inactivate or active.
|
| |
|
| |
|
| |
|
| |
|
| |
|
|
|
|
|
| |
Add missing schema for GUI Config, and missing objectclass for cn=accounts
container
|
|\ |
|
| |
| |
| |
| |
| |
| |
| |
| | |
reach the xml-rpc server.
- Assume the kdc/ldap server == xml-rpc server for v1.
Initial code to read the Kerberos Master Key from the Directory
|
| |
| |
| |
| |
| |
| |
| | |
password change.
- Fix some minor error
Initial code to read the Kerberos Master Key from the Directory
|
| | |
|
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
- Does not require dirsrv access to stash file
- Finalize password history support
- Fix strict password length default in pwd_extop (fix install sctript too)
- fix plugin configuration
- Introduce 3 kind of password change: normal, admin, and ds manager
- normal require adherence to policies
- admin does not but password is immediately expired
- ds manager can just change the password any way he likes.
Initial code to read the Kerberos Master Key from the Directory
|
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
This includes a default password policy
Custom fields are now read from LDAP. The format is a list of
dicts with keys: label, field, required.
The LDAP-based configuration now specifies:
ipaUserSearchFields: uid,givenName,sn,telephoneNumber,ou,title
ipaGroupSearchFields: cn,description
ipaSearchTimeLimit: 2
ipaSearchRecordsLimit: 0
ipaCustomFields:
ipaHomesRootDir: /home
ipaDefaultLoginShell: /bin/sh
ipaDefaultPrimaryGroup: ipausers
ipaMaxUsernameLength: 8
ipaPwdExpAdvNotify: 4
This could use some optimization.
|
| | |
|
| | |
|
| |
| |
| |
| | |
Add -a option to ipa-findgroup to print all attributes
|
| | |
|
| |
| |
| |
| |
| |
| |
| |
| | |
reach the xml-rpc server.
- Assume the kdc/ldap server == xml-rpc server for v1.
Initial code to read the Kerberos Master Key from the Directory
|
| |
| |
| |
| |
| |
| |
| | |
password change.
- Fix some minor error
Initial code to read the Kerberos Master Key from the Directory
|
|/
|
|
|
|
|
|
|
|
|
|
|
|
| |
- Does not require dirsrv access to stash file
- Finalize password history support
- Fix strict password length default in pwd_extop (fix install sctript too)
- fix plugin configuration
- Introduce 3 kind of password change: normal, admin, and ds manager
- normal require adherence to policies
- admin does not but password is immediately expired
- ds manager can just change the password any way he likes.
Initial code to read the Kerberos Master Key from the Directory
|
| |
|
|
|
|
| |
fail if the file it was to update didn't exist.
|