<feed xmlns='http://www.w3.org/2005/Atom'>
<title>freeipa.git/daemons/ipa-kdb, branch mindatefix</title>
<subtitle>FreeIPA patches</subtitle>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/freeipa.git/'/>
<entry>
<title>kdb: check for local realm in enterprise principals</title>
<updated>2016-07-12T10:26:28+00:00</updated>
<author>
<name>Sumit Bose</name>
<email>sbose@redhat.com</email>
</author>
<published>2016-07-06T15:29:37+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/freeipa.git/commit/?id=6d6da6b281173737bd31ba4845af11a097846c05'/>
<id>6d6da6b281173737bd31ba4845af11a097846c05</id>
<content type='text'>
Reviewed-By: Martin Babinsky &lt;mbabinsk@redhat.com&gt;
Reviewed-By: Jakub Hrozek &lt;jhrozek@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Reviewed-By: Martin Babinsky &lt;mbabinsk@redhat.com&gt;
Reviewed-By: Jakub Hrozek &lt;jhrozek@redhat.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>Allow unexpiring passwords</title>
<updated>2016-07-01T09:22:02+00:00</updated>
<author>
<name>David Kupka</name>
<email>dkupka@redhat.com</email>
</author>
<published>2016-06-30T06:52:33+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/freeipa.git/commit/?id=d2cb9ed327ee4003598d5e45d80ab7918b89eeed'/>
<id>d2cb9ed327ee4003598d5e45d80ab7918b89eeed</id>
<content type='text'>
Treat maxlife=0 in password policy as "never expire". Delete
krbPasswordExpiration in user entry when password should never expire.

https://fedorahosted.org/freeipa/ticket/2795

Reviewed-By: Thierry Bordaz &lt;tbordaz@redhat.com&gt;
Reviewed-By: Pavel Vomacka &lt;pvomacka@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Treat maxlife=0 in password policy as "never expire". Delete
krbPasswordExpiration in user entry when password should never expire.

https://fedorahosted.org/freeipa/ticket/2795

Reviewed-By: Thierry Bordaz &lt;tbordaz@redhat.com&gt;
Reviewed-By: Pavel Vomacka &lt;pvomacka@redhat.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>ipa-kdb: set krbCanonicalName when creating new principals</title>
<updated>2016-06-23T07:48:06+00:00</updated>
<author>
<name>Martin Babinsky</name>
<email>mbabinsk@redhat.com</email>
</author>
<published>2015-09-08T15:36:47+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/freeipa.git/commit/?id=7ed7a86511ec516c2f785968050f5d0a42978ba5'/>
<id>7ed7a86511ec516c2f785968050f5d0a42978ba5</id>
<content type='text'>
Additionally, stop setting ipakrbprincipalalias attribute during principal
creation.

Part of https://fedorahosted.org/freeipa/ticket/3864

Reviewed-By: David Kupka &lt;dkupka@redhat.com&gt;
Reviewed-By: Simo Sorce &lt;ssorce@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Additionally, stop setting ipakrbprincipalalias attribute during principal
creation.

Part of https://fedorahosted.org/freeipa/ticket/3864

Reviewed-By: David Kupka &lt;dkupka@redhat.com&gt;
Reviewed-By: Simo Sorce &lt;ssorce@redhat.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>perform case-insensitive principal search when canonicalization is requested</title>
<updated>2016-06-23T07:48:06+00:00</updated>
<author>
<name>Martin Babinsky</name>
<email>mbabinsk@redhat.com</email>
</author>
<published>2015-09-08T14:45:23+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/freeipa.git/commit/?id=e43231456d8de954423582dbee439e330573d04b'/>
<id>e43231456d8de954423582dbee439e330573d04b</id>
<content type='text'>
When canonicalization is requested, the krbprincipalname attribute is searched
for case-insensitively.

In the case that krbcanonicalname is not set, the matched alias is returned
with the casing stored in backend, not the one input by client.

Part of https://fedorahosted.org/freeipa/ticket/3864

Reviewed-By: David Kupka &lt;dkupka@redhat.com&gt;
Reviewed-By: Simo Sorce &lt;ssorce@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
When canonicalization is requested, the krbprincipalname attribute is searched
for case-insensitively.

In the case that krbcanonicalname is not set, the matched alias is returned
with the casing stored in backend, not the one input by client.

Part of https://fedorahosted.org/freeipa/ticket/3864

Reviewed-By: David Kupka &lt;dkupka@redhat.com&gt;
Reviewed-By: Simo Sorce &lt;ssorce@redhat.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>adtrust: support UPNs for trusted domain users</title>
<updated>2016-06-11T15:25:50+00:00</updated>
<author>
<name>Alexander Bokovoy</name>
<email>abokovoy@redhat.com</email>
</author>
<published>2016-06-06T08:41:46+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/freeipa.git/commit/?id=bb75f5a5836ea011b8920f8bb8d58c1f4cd9b4c8'/>
<id>bb75f5a5836ea011b8920f8bb8d58c1f4cd9b4c8</id>
<content type='text'>
Add support for additional user name principal suffixes from
trusted Active Directory forests. UPN suffixes are property
of the forest and as such are associated with the forest root
domain.

FreeIPA stores UPN suffixes as ipaNTAdditionalSuffixes multi-valued
attribute of ipaNTTrustedDomain object class.

In order to look up UPN suffixes, netr_DsRGetForestTrustInformation
LSA RPC call is used instead of netr_DsrEnumerateDomainTrusts.

For more details on UPN and naming in Active Directory see
https://technet.microsoft.com/en-us/library/cc739093%28v=ws.10%29.aspx

https://fedorahosted.org/freeipa/ticket/5354

Reviewed-By: Martin Babinsky &lt;mbabinsk@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Add support for additional user name principal suffixes from
trusted Active Directory forests. UPN suffixes are property
of the forest and as such are associated with the forest root
domain.

FreeIPA stores UPN suffixes as ipaNTAdditionalSuffixes multi-valued
attribute of ipaNTTrustedDomain object class.

In order to look up UPN suffixes, netr_DsRGetForestTrustInformation
LSA RPC call is used instead of netr_DsrEnumerateDomainTrusts.

For more details on UPN and naming in Active Directory see
https://technet.microsoft.com/en-us/library/cc739093%28v=ws.10%29.aspx

https://fedorahosted.org/freeipa/ticket/5354

Reviewed-By: Martin Babinsky &lt;mbabinsk@redhat.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>Migrate from #ifndef guards to #pragma once</title>
<updated>2016-05-29T12:04:45+00:00</updated>
<author>
<name>Nathaniel McCallum</name>
<email>npmccallum@redhat.com</email>
</author>
<published>2016-05-24T14:18:43+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/freeipa.git/commit/?id=4bafba06f2b8cc51cd95a725e1c8adf7bbf9a5fc'/>
<id>4bafba06f2b8cc51cd95a725e1c8adf7bbf9a5fc</id>
<content type='text'>
Using a pragma instead of guards is easier to write, less error prone
and avoids name clashes (a source of very subtle bugs). This pragma
is supported on almost all compilers, including all the compilers we
care about: https://en.wikipedia.org/wiki/Pragma_once#Portability.

This patch does not change the autogenerated files: asn1/asn1c/*.h.

Reviewed-By: Martin Basti &lt;mbasti@redhat.com&gt;
Reviewed-By: Christian Heimes &lt;cheimes@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Using a pragma instead of guards is easier to write, less error prone
and avoids name clashes (a source of very subtle bugs). This pragma
is supported on almost all compilers, including all the compilers we
care about: https://en.wikipedia.org/wiki/Pragma_once#Portability.

This patch does not change the autogenerated files: asn1/asn1c/*.h.

Reviewed-By: Martin Basti &lt;mbasti@redhat.com&gt;
Reviewed-By: Christian Heimes &lt;cheimes@redhat.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>Enable authentication indicators for OTP and RADIUS</title>
<updated>2016-05-26T16:47:05+00:00</updated>
<author>
<name>Nathaniel McCallum</name>
<email>npmccallum@redhat.com</email>
</author>
<published>2016-02-22T00:44:19+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/freeipa.git/commit/?id=8f356a4305a9aa74aacae36806d6e8ed1b765245'/>
<id>8f356a4305a9aa74aacae36806d6e8ed1b765245</id>
<content type='text'>
If the user is configured for OTP or RADIUS authentication, insert the
relevant authentication indicator.

https://fedorahosted.org/freeipa/ticket/433

Reviewed-By: Sumit Bose &lt;sbose@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
If the user is configured for OTP or RADIUS authentication, insert the
relevant authentication indicator.

https://fedorahosted.org/freeipa/ticket/433

Reviewed-By: Sumit Bose &lt;sbose@redhat.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>Return password-only preauth if passwords are allowed</title>
<updated>2016-05-26T16:47:05+00:00</updated>
<author>
<name>Nathaniel McCallum</name>
<email>npmccallum@redhat.com</email>
</author>
<published>2016-02-22T00:43:52+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/freeipa.git/commit/?id=204200d73bb135cb7b9b31b8f1ba5268d73094a5'/>
<id>204200d73bb135cb7b9b31b8f1ba5268d73094a5</id>
<content type='text'>
Before this patch, if either password or password+otp were permitted,
only the otp preauth mech would be returned to the client. Now, the
client will receive either enc_ts or enc_chl in addition to otp.

https://fedorahosted.org/freeipa/ticket/433

Reviewed-By: Sumit Bose &lt;sbose@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Before this patch, if either password or password+otp were permitted,
only the otp preauth mech would be returned to the client. Now, the
client will receive either enc_ts or enc_chl in addition to otp.

https://fedorahosted.org/freeipa/ticket/433

Reviewed-By: Sumit Bose &lt;sbose@redhat.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>ipa_kdb: add krbPrincipalAuthInd handling</title>
<updated>2016-05-02T17:15:45+00:00</updated>
<author>
<name>Matt Rogers</name>
<email>mrogers@redhat.com</email>
</author>
<published>2016-03-25T21:01:40+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/freeipa.git/commit/?id=8a2afcafee977675fc289acab50cc808b469a2b3'/>
<id>8a2afcafee977675fc289acab50cc808b469a2b3</id>
<content type='text'>
Store and retrieve the authentication indicator "require_auth" string in
the krbPrincipalAuthInd attribute. Skip storing auth indicators to
krbExtraData.

https://fedorahosted.org/freeipa/ticket/5782

Reviewed-By: Sumit Bose &lt;sbose@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Store and retrieve the authentication indicator "require_auth" string in
the krbPrincipalAuthInd attribute. Skip storing auth indicators to
krbExtraData.

https://fedorahosted.org/freeipa/ticket/5782

Reviewed-By: Sumit Bose &lt;sbose@redhat.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>Allow to specify Kerberos authz data type per user</title>
<updated>2016-03-09T18:00:43+00:00</updated>
<author>
<name>Simo Sorce</name>
<email>simo@redhat.com</email>
</author>
<published>2015-11-24T23:01:52+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/freeipa.git/commit/?id=7a20fc671b07344b0ee8460bef07398cb3ffaf59'/>
<id>7a20fc671b07344b0ee8460bef07398cb3ffaf59</id>
<content type='text'>
Like for services setting the ipaKrbAuthzData attribute on a user object will
allow us to control exactly what authz data is allowed for that user.
Setting NONE would allow no authz data, while setting MS-PAC would allow only
Active Directory compatible data.

Signed-off-by: Simo Sorce &lt;simo@redhat.com&gt;

Ticket: https://fedorahosted.org/freeipa/ticket/2579
Reviewed-By: Alexander Bokovoy &lt;abokovoy@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Like for services setting the ipaKrbAuthzData attribute on a user object will
allow us to control exactly what authz data is allowed for that user.
Setting NONE would allow no authz data, while setting MS-PAC would allow only
Active Directory compatible data.

Signed-off-by: Simo Sorce &lt;simo@redhat.com&gt;

Ticket: https://fedorahosted.org/freeipa/ticket/2579
Reviewed-By: Alexander Bokovoy &lt;abokovoy@redhat.com&gt;
</pre>
</div>
</content>
</entry>
</feed>
