<feed xmlns='http://www.w3.org/2005/Atom'>
<title>freeipa.git/daemons/ipa-slapi-plugins/ipa-pwd-extop, branch getkeytab</title>
<subtitle>FreeIPA patches</subtitle>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/freeipa.git/'/>
<entry>
<title>keytab: Add new extended operation to get a keytab.</title>
<updated>2014-06-09T18:49:42+00:00</updated>
<author>
<name>Simo Sorce</name>
<email>simo@redhat.com</email>
</author>
<published>2013-09-17T04:30:14+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/freeipa.git/commit/?id=aa785cf1ce101382c2adbc4a3c70361d1e7a27e0'/>
<id>aa785cf1ce101382c2adbc4a3c70361d1e7a27e0</id>
<content type='text'>
This new extended operation allow to create new keys or retrieve
existing ones.
The new set of keys is returned as a ASN.1 structure similar to the one
that is passed in by the 'set keytab' extended operation.

Access to the operation is regulated through a new special ACI that
allows 'retrieval' only if the user has access to an attribute
named ipaProtectedOperation postfixed by the subtypes 'read_keys' and
'write_keys' to distinguish between creation and retrieval operation.

For example for allowing retrieval by a specific user the following ACI
is set on cn=accounts:

(targetattr="ipaProtectedOperation;read_keys") ...
 ... userattr=ipaAllowedToPerform;read_keys#USERDN)

This ACI matches only if the service object hosts a new attribute named
ipaAllowedToPerform that holds the DN of the user attempting the operation.

Resolves:
https://fedorahosted.org/freeipa/ticket/3859
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
This new extended operation allow to create new keys or retrieve
existing ones.
The new set of keys is returned as a ASN.1 structure similar to the one
that is passed in by the 'set keytab' extended operation.

Access to the operation is regulated through a new special ACI that
allows 'retrieval' only if the user has access to an attribute
named ipaProtectedOperation postfixed by the subtypes 'read_keys' and
'write_keys' to distinguish between creation and retrieval operation.

For example for allowing retrieval by a specific user the following ACI
is set on cn=accounts:

(targetattr="ipaProtectedOperation;read_keys") ...
 ... userattr=ipaAllowedToPerform;read_keys#USERDN)

This ACI matches only if the service object hosts a new attribute named
ipaAllowedToPerform that holds the DN of the user attempting the operation.

Resolves:
https://fedorahosted.org/freeipa/ticket/3859
</pre>
</div>
</content>
</entry>
<entry>
<title>keytabs: Expose and modify key encoding function</title>
<updated>2014-06-09T18:35:00+00:00</updated>
<author>
<name>Simo Sorce</name>
<email>simo@redhat.com</email>
</author>
<published>2013-09-17T04:28:32+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/freeipa.git/commit/?id=f440e927d8a66a3dd2e6505825e671052f66ae3e'/>
<id>f440e927d8a66a3dd2e6505825e671052f66ae3e</id>
<content type='text'>
Make it available outside of the encoding.c file for use in a follow-up
patch.
Add option to not pass a password and generate a random key instead.

Related:
https://fedorahosted.org/freeipa/ticket/3859
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Make it available outside of the encoding.c file for use in a follow-up
patch.
Add option to not pass a password and generate a random key instead.

Related:
https://fedorahosted.org/freeipa/ticket/3859
</pre>
</div>
</content>
</entry>
<entry>
<title>keytabs: Modularize setkeytab operation</title>
<updated>2014-06-09T18:34:58+00:00</updated>
<author>
<name>Simo Sorce</name>
<email>simo@redhat.com</email>
</author>
<published>2013-09-17T04:25:14+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/freeipa.git/commit/?id=7589c3144c7680ce0761c969a21869098d367dbd'/>
<id>7589c3144c7680ce0761c969a21869098d367dbd</id>
<content type='text'>
In preparation of adding another function to avoid code duplication.

Related:
https://fedorahosted.org/freeipa/ticket/3859
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
In preparation of adding another function to avoid code duplication.

Related:
https://fedorahosted.org/freeipa/ticket/3859
</pre>
</div>
</content>
</entry>
<entry>
<title>Check for password expiration in pre-bind</title>
<updated>2014-06-09T06:18:16+00:00</updated>
<author>
<name>Simo Sorce</name>
<email>simo@redhat.com</email>
</author>
<published>2013-05-09T18:25:14+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/freeipa.git/commit/?id=bfdbd3b6ad7c437e7dd293d2488b2d53f4ea7ba6'/>
<id>bfdbd3b6ad7c437e7dd293d2488b2d53f4ea7ba6</id>
<content type='text'>
If the password is expired fail a password bind.

Resolves: https://fedorahosted.org/freeipa/ticket/1539
Reviewed-By: Martin Kosek &lt;mkosek@redhat.com&gt;
Reviewed-By: Nathaniel McCallum &lt;npmccallum@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
If the password is expired fail a password bind.

Resolves: https://fedorahosted.org/freeipa/ticket/1539
Reviewed-By: Martin Kosek &lt;mkosek@redhat.com&gt;
Reviewed-By: Nathaniel McCallum &lt;npmccallum@redhat.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>ipa-pwd-extop: Deny LDAP binds for accounts with expired principals</title>
<updated>2014-05-05T15:50:01+00:00</updated>
<author>
<name>Tomas Babej</name>
<email>tbabej@redhat.com</email>
</author>
<published>2014-04-01T10:41:16+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/freeipa.git/commit/?id=5d78cdf80951748f5f954a69c41a2a2cb1b84812'/>
<id>5d78cdf80951748f5f954a69c41a2a2cb1b84812</id>
<content type='text'>
Adds a check for krbprincipalexpiration attribute to pre_bind operation
in ipa-pwd-extop dirsrv plugin. If the principal is expired, auth is
denied and LDAP_UNWILLING_TO_PERFORM along with the error message is
sent back to the client. Since krbprincipalexpiration attribute is not
mandatory, if there is no value set, the check is passed.

https://fedorahosted.org/freeipa/ticket/3305

Reviewed-By: Simo Sorce &lt;simo@redhat.com&gt;
Reviewed-By: Alexander Bokovoy &lt;abokovoy@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Adds a check for krbprincipalexpiration attribute to pre_bind operation
in ipa-pwd-extop dirsrv plugin. If the principal is expired, auth is
denied and LDAP_UNWILLING_TO_PERFORM along with the error message is
sent back to the client. Since krbprincipalexpiration attribute is not
mandatory, if there is no value set, the check is passed.

https://fedorahosted.org/freeipa/ticket/3305

Reviewed-By: Simo Sorce &lt;simo@redhat.com&gt;
Reviewed-By: Alexander Bokovoy &lt;abokovoy@redhat.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>ipa-pwd-extop: Fix memory leak in ipapwd_pre_bind</title>
<updated>2014-04-08T12:23:18+00:00</updated>
<author>
<name>Tomas Babej</name>
<email>tbabej@redhat.com</email>
</author>
<published>2014-04-01T10:48:57+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/freeipa.git/commit/?id=5a0d52b9393a2a4f154aca617855cba3f83e989b'/>
<id>5a0d52b9393a2a4f154aca617855cba3f83e989b</id>
<content type='text'>
We need to free the entry before returning from the function.

https://fedorahosted.org/freeipa/ticket/4295
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
We need to free the entry before returning from the function.

https://fedorahosted.org/freeipa/ticket/4295
</pre>
</div>
</content>
</entry>
<entry>
<title>Teach ipa-pwd-extop to respect global ipaUserAuthType settings</title>
<updated>2014-02-21T09:26:02+00:00</updated>
<author>
<name>Nathaniel McCallum</name>
<email>npmccallum@redhat.com</email>
</author>
<published>2014-01-31T20:16:35+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/freeipa.git/commit/?id=9f62d0c15795ca9fca0c64a8b4bd1b09540b47f1'/>
<id>9f62d0c15795ca9fca0c64a8b4bd1b09540b47f1</id>
<content type='text'>
https://fedorahosted.org/freeipa/ticket/4105

Reviewed-By: Alexander Bokovoy &lt;abokovoy@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
https://fedorahosted.org/freeipa/ticket/4105

Reviewed-By: Alexander Bokovoy &lt;abokovoy@redhat.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>Add OTP sync support to ipa-pwd-extop</title>
<updated>2014-02-21T09:26:02+00:00</updated>
<author>
<name>Nathaniel McCallum</name>
<email>npmccallum@redhat.com</email>
</author>
<published>2014-01-28T22:09:58+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/freeipa.git/commit/?id=a51b07c27566ecf059cca96551028d8cbe5078d3'/>
<id>a51b07c27566ecf059cca96551028d8cbe5078d3</id>
<content type='text'>
Reviewed-By: Alexander Bokovoy &lt;abokovoy@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Reviewed-By: Alexander Bokovoy &lt;abokovoy@redhat.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>BUILD: Fix portability of NSS in file ipa_pwd.c</title>
<updated>2014-01-28T15:35:34+00:00</updated>
<author>
<name>Lukas Slebodnik</name>
<email>lslebodn@redhat.com</email>
</author>
<published>2014-01-28T15:35:34+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/freeipa.git/commit/?id=a4faa2f444f42644e6565675999d0db360716db0'/>
<id>a4faa2f444f42644e6565675999d0db360716db0</id>
<content type='text'>
Tested-by: Timo Aaltonen &lt;tjaalton@ubuntu.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Tested-by: Timo Aaltonen &lt;tjaalton@ubuntu.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>Harmonize policy discovery to kdb driver</title>
<updated>2014-01-16T08:00:35+00:00</updated>
<author>
<name>Simo Sorce</name>
<email>simo@redhat.com</email>
</author>
<published>2014-01-14T15:09:37+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/freeipa.git/commit/?id=d0ed25c8cbff54528133f6b78133ee8307b3faff'/>
<id>d0ed25c8cbff54528133f6b78133ee8307b3faff</id>
<content type='text'>
The KDB driver does not walk the tree back like the original password plugin.
Also we do not store the default policy in the base DN as we used to do in the
past anymore.
So doing a full subtree search and walking back the tree is just a waste of
time.
Instead hardcode the default policy like we do in the kdb driver.

Fixes: https://fedorahosted.org/freeipa/ticket/4085
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
The KDB driver does not walk the tree back like the original password plugin.
Also we do not store the default policy in the base DN as we used to do in the
past anymore.
So doing a full subtree search and walking back the tree is just a waste of
time.
Instead hardcode the default policy like we do in the kdb driver.

Fixes: https://fedorahosted.org/freeipa/ticket/4085
</pre>
</div>
</content>
</entry>
</feed>
