<feed xmlns='http://www.w3.org/2005/Atom'>
<title>freeipa.git/ipaserver, branch ccachesess</title>
<subtitle>FreeIPA patches</subtitle>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/freeipa.git/'/>
<entry>
<title>WebUI: Add cermapmatch module</title>
<updated>2017-03-08T15:22:01+00:00</updated>
<author>
<name>Pavel Vomacka</name>
<email>pvomacka@redhat.com</email>
</author>
<published>2017-03-07T20:31:22+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/freeipa.git/commit/?id=61cd4372e142662c06c881886709fe1b573102a9'/>
<id>61cd4372e142662c06c881886709fe1b573102a9</id>
<content type='text'>
Add module which can show users which are mapped to the provided certificate.
Additionaly, the certificate is parsed and parsed information are
also displayed.

https://pagure.io/freeipa/issue/6601

Reviewed-By: Petr Vobornik &lt;pvoborni@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Add module which can show users which are mapped to the provided certificate.
Additionaly, the certificate is parsed and parsed information are
also displayed.

https://pagure.io/freeipa/issue/6601

Reviewed-By: Petr Vobornik &lt;pvoborni@redhat.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>Allow login to WebUI using Kerberos aliases/enterprise principals</title>
<updated>2017-03-08T14:56:11+00:00</updated>
<author>
<name>Martin Babinsky</name>
<email>mbabinsk@redhat.com</email>
</author>
<published>2016-09-22T07:58:47+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/freeipa.git/commit/?id=f8d7e37a091c1df4c989b80b8d19e12ab35533c8'/>
<id>f8d7e37a091c1df4c989b80b8d19e12ab35533c8</id>
<content type='text'>
The logic of the extraction/validation of principal from the request and
subsequent authentication was simplified and most of the guesswork will
be done by KDC during kinit. This also allows principals from trusted
domains to login via rpcserver.

https://fedorahosted.org/freeipa/ticket/6343

Reviewed-By: Alexander Bokovoy &lt;abokovoy@redhat.com&gt;
Reviewed-By: Simo Sorce &lt;ssorce@redhat.com&gt;
Reviewed-By: David Kupka &lt;dkupka@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
The logic of the extraction/validation of principal from the request and
subsequent authentication was simplified and most of the guesswork will
be done by KDC during kinit. This also allows principals from trusted
domains to login via rpcserver.

https://fedorahosted.org/freeipa/ticket/6343

Reviewed-By: Alexander Bokovoy &lt;abokovoy@redhat.com&gt;
Reviewed-By: Simo Sorce &lt;ssorce@redhat.com&gt;
Reviewed-By: David Kupka &lt;dkupka@redhat.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>dns: fix `dnsrecord_add` interactive mode</title>
<updated>2017-03-08T14:52:41+00:00</updated>
<author>
<name>Jan Cholasta</name>
<email>jcholast@redhat.com</email>
</author>
<published>2017-02-23T13:21:59+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/freeipa.git/commit/?id=1e912f5b83166154806e0382f3f028d0eac81731'/>
<id>1e912f5b83166154806e0382f3f028d0eac81731</id>
<content type='text'>
`dnsrecord_add` interactive mode might prompt for value of non-existent
arguments `a_part_create_reverse` and `aaaa_part_create_reverse`. This
happens because `dnsrecord_add` extra flags are incorrectly defined as
parts of the respective DNS records.

Remove extra flags from DNS record parts to fix the interactive mode on old
clients talking to new servers. Skip non-existent arguments in the
interactive mode to fix new clients talking to old servers.

https://fedorahosted.org/freeipa/ticket/6457

Reviewed-By: Martin Basti &lt;mbasti@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
`dnsrecord_add` interactive mode might prompt for value of non-existent
arguments `a_part_create_reverse` and `aaaa_part_create_reverse`. This
happens because `dnsrecord_add` extra flags are incorrectly defined as
parts of the respective DNS records.

Remove extra flags from DNS record parts to fix the interactive mode on old
clients talking to new servers. Skip non-existent arguments in the
interactive mode to fix new clients talking to old servers.

https://fedorahosted.org/freeipa/ticket/6457

Reviewed-By: Martin Basti &lt;mbasti@redhat.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>KRA: add --setup-kra to ipa-server-install</title>
<updated>2017-03-08T14:50:30+00:00</updated>
<author>
<name>Martin Basti</name>
<email>mbasti@redhat.com</email>
</author>
<published>2017-03-02T16:08:59+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/freeipa.git/commit/?id=4006cbbc02c368ac9e5e3721613158decb34fd37'/>
<id>4006cbbc02c368ac9e5e3721613158decb34fd37</id>
<content type='text'>
This patch allows to install KRA on first IPA server in one step using
ipa-server-install

This option improves containers installation where ipa-server can be
installed with KRA using one call without need to call docker exec.

Please note the the original `kra.install()` calls in
ipaserver/install/server/install.py were empty operations as it did
nothing, so it is safe to move them out from CA block

https://pagure.io/freeipa/issue/6731

Reviewed-By: Jan Cholasta &lt;jcholast@redhat.com&gt;
Reviewed-By: Tomas Krizek &lt;tkrizek@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
This patch allows to install KRA on first IPA server in one step using
ipa-server-install

This option improves containers installation where ipa-server can be
installed with KRA using one call without need to call docker exec.

Please note the the original `kra.install()` calls in
ipaserver/install/server/install.py were empty operations as it did
nothing, so it is safe to move them out from CA block

https://pagure.io/freeipa/issue/6731

Reviewed-By: Jan Cholasta &lt;jcholast@redhat.com&gt;
Reviewed-By: Tomas Krizek &lt;tkrizek@redhat.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>IdM Server: list all Employees with matching Smart Card</title>
<updated>2017-03-08T14:08:41+00:00</updated>
<author>
<name>Florence Blanc-Renaud</name>
<email>flo@redhat.com</email>
</author>
<published>2017-02-23T17:04:47+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/freeipa.git/commit/?id=ea34e17a46a60efb9c4dc81dab919a1639dec73b'/>
<id>ea34e17a46a60efb9c4dc81dab919a1639dec73b</id>
<content type='text'>
Implement a new IPA command allowing to retrieve the list of users matching
the provided certificate.
The command is using SSSD Dbus interface, thus including users from IPA
domain and from trusted domains. This requires sssd-dbus package to be
installed on IPA server.

https://fedorahosted.org/freeipa/ticket/6646

Reviewed-By: David Kupka &lt;dkupka@redhat.com&gt;
Reviewed-By: Jan Cholasta &lt;jcholast@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Implement a new IPA command allowing to retrieve the list of users matching
the provided certificate.
The command is using SSSD Dbus interface, thus including users from IPA
domain and from trusted domains. This requires sssd-dbus package to be
installed on IPA server.

https://fedorahosted.org/freeipa/ticket/6646

Reviewed-By: David Kupka &lt;dkupka@redhat.com&gt;
Reviewed-By: Jan Cholasta &lt;jcholast@redhat.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>Add support for custom table pagination size</title>
<updated>2017-03-08T13:54:56+00:00</updated>
<author>
<name>Pavel Vomacka</name>
<email>pvomacka@redhat.com</email>
</author>
<published>2016-08-11T13:58:23+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/freeipa.git/commit/?id=e1dfc51e48050ac1ad431d56003dc26e17ca653e'/>
<id>e1dfc51e48050ac1ad431d56003dc26e17ca653e</id>
<content type='text'>
New customization button opens dialog with field for setting the number of lines
in tables. After saving the new value there is new topic which starts refreshing
current table facet (if shown) and set all other facets expired. Therefore all
tables are immediately regenerated.

https://fedorahosted.org/freeipa/ticket/5742

Reviewed-By: Petr Vobornik &lt;pvoborni@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
New customization button opens dialog with field for setting the number of lines
in tables. After saving the new value there is new topic which starts refreshing
current table facet (if shown) and set all other facets expired. Therefore all
tables are immediately regenerated.

https://fedorahosted.org/freeipa/ticket/5742

Reviewed-By: Petr Vobornik &lt;pvoborni@redhat.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>WebUI: Add certmap module</title>
<updated>2017-03-08T09:14:21+00:00</updated>
<author>
<name>Pavel Vomacka</name>
<email>pvomacka@redhat.com</email>
</author>
<published>2017-01-16T13:16:47+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/freeipa.git/commit/?id=19426f32ff99feb7c64a4174728cd2b6b946a49a'/>
<id>19426f32ff99feb7c64a4174728cd2b6b946a49a</id>
<content type='text'>
Add facets for certmaprule and certmapconfigure entities.

https://fedorahosted.org/freeipa/ticket/6601

Reviewed-By: Florence Blanc-Renaud &lt;frenaud@redhat.com&gt;
Reviewed-By: Petr Vobornik &lt;pvoborni@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Add facets for certmaprule and certmapconfigure entities.

https://fedorahosted.org/freeipa/ticket/6601

Reviewed-By: Florence Blanc-Renaud &lt;frenaud@redhat.com&gt;
Reviewed-By: Petr Vobornik &lt;pvoborni@redhat.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>WebUI: Change structure of Identity submenu</title>
<updated>2017-03-07T19:04:01+00:00</updated>
<author>
<name>Pavel Vomacka</name>
<email>pvomacka@redhat.com</email>
</author>
<published>2017-03-02T09:31:48+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/freeipa.git/commit/?id=070bc48dd6c9bce32caa0f0f2de8d44b4e5bbbb1'/>
<id>070bc48dd6c9bce32caa0f0f2de8d44b4e5bbbb1</id>
<content type='text'>
Previously there were 'User Groups', 'Host Groups' and 'Netgroups'
separately, now these three items are grouped into one named 'Groups'
which has sidebar with three items mentioned above.

This change allows us to move ID views into Identity submenu.

https://pagure.io/freeipa/issue/6717

Reviewed-By: Simo Sorce &lt;ssorce@redhat.com&gt;
Reviewed-By: Petr Vobornik &lt;pvoborni@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Previously there were 'User Groups', 'Host Groups' and 'Netgroups'
separately, now these three items are grouped into one named 'Groups'
which has sidebar with three items mentioned above.

This change allows us to move ID views into Identity submenu.

https://pagure.io/freeipa/issue/6717

Reviewed-By: Simo Sorce &lt;ssorce@redhat.com&gt;
Reviewed-By: Petr Vobornik &lt;pvoborni@redhat.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>Add SHA256 fingerprints for certs</title>
<updated>2017-03-07T18:52:43+00:00</updated>
<author>
<name>Tomas Krizek</name>
<email>tkrizek@redhat.com</email>
</author>
<published>2017-02-23T16:03:01+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/freeipa.git/commit/?id=a06c71b1268850e485e89049ed3654f893edff0b'/>
<id>a06c71b1268850e485e89049ed3654f893edff0b</id>
<content type='text'>
https://fedorahosted.org/freeipa/ticket/6701

Reviewed-By: Pavel Vomacka &lt;pvomacka@redhat.com&gt;
Reviewed-By: Stanislav Laznicka &lt;slaznick@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
https://fedorahosted.org/freeipa/ticket/6701

Reviewed-By: Pavel Vomacka &lt;pvomacka@redhat.com&gt;
Reviewed-By: Stanislav Laznicka &lt;slaznick@redhat.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>rabase.get_certificate: make serial number arg mandatory</title>
<updated>2017-03-07T12:24:16+00:00</updated>
<author>
<name>Fraser Tweedale</name>
<email>ftweedal@redhat.com</email>
</author>
<published>2017-03-06T02:50:55+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/freeipa.git/commit/?id=3ba0375c831eca673c2df146b565a32dbc03fdb3'/>
<id>3ba0375c831eca673c2df146b565a32dbc03fdb3</id>
<content type='text'>
In rabase.get_certificate it does not make sense for the
serial_number argument to be optional.  Make it a mandatory
positional argument.

Part of: https://pagure.io/freeipa/issue/3473
Part of: https://pagure.io/freeipa/issue/5011

Reviewed-By: Tomas Krizek &lt;tkrizek@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
In rabase.get_certificate it does not make sense for the
serial_number argument to be optional.  Make it a mandatory
positional argument.

Part of: https://pagure.io/freeipa/issue/3473
Part of: https://pagure.io/freeipa/issue/5011

Reviewed-By: Tomas Krizek &lt;tkrizek@redhat.com&gt;
</pre>
</div>
</content>
</entry>
</feed>
