<feed xmlns='http://www.w3.org/2005/Atom'>
<title>freeipa.git/ipaserver, branch mspac</title>
<subtitle>FreeIPA patches</subtitle>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/freeipa.git/'/>
<entry>
<title>Do not fail upgrade if the global anonymous read ACI is not found</title>
<updated>2013-10-04T13:41:56+00:00</updated>
<author>
<name>Petr Viktorin</name>
<email>pviktori@redhat.com</email>
</author>
<published>2013-10-04T11:28:16+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/freeipa.git/commit/?id=c813b8fbd39c700e25f591080a1e2d0d1645a173'/>
<id>c813b8fbd39c700e25f591080a1e2d0d1645a173</id>
<content type='text'>
This helps forward compatibility: the anon ACI is scheduled for removal.

https://fedorahosted.org/freeipa/ticket/3956
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
This helps forward compatibility: the anon ACI is scheduled for removal.

https://fedorahosted.org/freeipa/ticket/3956
</pre>
</div>
</content>
</entry>
<entry>
<title>Allow PKCS#12 files with empty password in install tools.</title>
<updated>2013-10-04T08:27:23+00:00</updated>
<author>
<name>Jan Cholasta</name>
<email>jcholast@redhat.com</email>
</author>
<published>2013-09-25T08:40:05+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/freeipa.git/commit/?id=194556beb04241d965561cc6bb4d050b5be8879f'/>
<id>194556beb04241d965561cc6bb4d050b5be8879f</id>
<content type='text'>
https://fedorahosted.org/freeipa/ticket/3897
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
https://fedorahosted.org/freeipa/ticket/3897
</pre>
</div>
</content>
</entry>
<entry>
<title>Read passwords from stdin when importing PKCS#12 files with pk12util.</title>
<updated>2013-10-04T08:27:23+00:00</updated>
<author>
<name>Jan Cholasta</name>
<email>jcholast@redhat.com</email>
</author>
<published>2013-09-25T08:33:35+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/freeipa.git/commit/?id=c123264ac77cd533a08978909f837c8f4d3e224e'/>
<id>c123264ac77cd533a08978909f837c8f4d3e224e</id>
<content type='text'>
This works around pk12util refusing to use empty password files, which prevents
the use of PKCS#12 files with empty password.

https://fedorahosted.org/freeipa/ticket/3897
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
This works around pk12util refusing to use empty password files, which prevents
the use of PKCS#12 files with empty password.

https://fedorahosted.org/freeipa/ticket/3897
</pre>
</div>
</content>
</entry>
<entry>
<title>trust: integrate subdomains support into trust-add</title>
<updated>2013-10-04T08:25:31+00:00</updated>
<author>
<name>Alexander Bokovoy</name>
<email>abokovoy@redhat.com</email>
</author>
<published>2013-09-27T10:39:57+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/freeipa.git/commit/?id=f734988e24012bccdc5f982d56795213f9733f84'/>
<id>f734988e24012bccdc5f982d56795213f9733f84</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>ipaserver/dcerpc: remove use of trust account authentication</title>
<updated>2013-10-04T08:25:31+00:00</updated>
<author>
<name>Alexander Bokovoy</name>
<email>abokovoy@redhat.com</email>
</author>
<published>2013-09-27T10:36:59+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/freeipa.git/commit/?id=a87813bf420c19a99b1a19711e63d231cd4afd86'/>
<id>a87813bf420c19a99b1a19711e63d231cd4afd86</id>
<content type='text'>
Since FreeIPA KDC supports adding MS-PAC to HTTP/ipa.server principal,
it is possible to use it when talking to the trusted AD DC.

Remove support for authenticating as trust account because it should not
really be used other than within Samba.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Since FreeIPA KDC supports adding MS-PAC to HTTP/ipa.server principal,
it is possible to use it when talking to the trusted AD DC.

Remove support for authenticating as trust account because it should not
really be used other than within Samba.
</pre>
</div>
</content>
</entry>
<entry>
<title>trusts: support subdomains in a forest</title>
<updated>2013-10-04T08:25:31+00:00</updated>
<author>
<name>Alexander Bokovoy</name>
<email>abokovoy@redhat.com</email>
</author>
<published>2013-09-18T15:04:19+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/freeipa.git/commit/?id=0b29bfde0df92ed0a61b5ce099295c0b0c6495d4'/>
<id>0b29bfde0df92ed0a61b5ce099295c0b0c6495d4</id>
<content type='text'>
Add IPA CLI to manage trust domains.

ipa trust-fetch-domains &lt;trust&gt;      -- fetch list of subdomains from AD side and add new ones to IPA
ipa trustdomain-find &lt;trust&gt;         -- show all available domains
ipa trustdomain-del &lt;trust&gt; &lt;domain&gt; -- remove domain from IPA view about &lt;trust&gt;
ipa trustdomain-enable &lt;trust&gt; &lt;domain&gt; -- allow users from trusted domain to access resources in IPA
ipa trustdomain-disable &lt;trust&gt; &lt;domain&gt; -- disable access to resources in IPA from trusted domain

By default all discovered trust domains are allowed to access IPA resources

IPA KDC needs also information for authentication paths to subdomains in case they
are not hierarchical under AD forest trust root. This information is managed via capaths
section in krb5.conf. SSSD should be able to generate it once
ticket https://fedorahosted.org/sssd/ticket/2093 is resolved.

part of https://fedorahosted.org/freeipa/ticket/3909
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Add IPA CLI to manage trust domains.

ipa trust-fetch-domains &lt;trust&gt;      -- fetch list of subdomains from AD side and add new ones to IPA
ipa trustdomain-find &lt;trust&gt;         -- show all available domains
ipa trustdomain-del &lt;trust&gt; &lt;domain&gt; -- remove domain from IPA view about &lt;trust&gt;
ipa trustdomain-enable &lt;trust&gt; &lt;domain&gt; -- allow users from trusted domain to access resources in IPA
ipa trustdomain-disable &lt;trust&gt; &lt;domain&gt; -- disable access to resources in IPA from trusted domain

By default all discovered trust domains are allowed to access IPA resources

IPA KDC needs also information for authentication paths to subdomains in case they
are not hierarchical under AD forest trust root. This information is managed via capaths
section in krb5.conf. SSSD should be able to generate it once
ticket https://fedorahosted.org/sssd/ticket/2093 is resolved.

part of https://fedorahosted.org/freeipa/ticket/3909
</pre>
</div>
</content>
</entry>
<entry>
<title>ipaserver/dcerpc.py: populate forest trust information using realmdomains</title>
<updated>2013-10-04T08:25:31+00:00</updated>
<author>
<name>Alexander Bokovoy</name>
<email>abokovoy@redhat.com</email>
</author>
<published>2013-09-11T18:34:55+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/freeipa.git/commit/?id=0637f590ed9cfffe29ceac45c68ed0541e5aa2f1'/>
<id>0637f590ed9cfffe29ceac45c68ed0541e5aa2f1</id>
<content type='text'>
Use realmdomains information to prepopulate forest trust info. As result,
all additional domains should now be enabled from the beginning, unless they
really conflict with existing DNS domains on AD side.

https://fedorahosted.org/freeipa/ticket/3919
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Use realmdomains information to prepopulate forest trust info. As result,
all additional domains should now be enabled from the beginning, unless they
really conflict with existing DNS domains on AD side.

https://fedorahosted.org/freeipa/ticket/3919
</pre>
</div>
</content>
</entry>
<entry>
<title>Use FQDN when creating MSDCS SRV records</title>
<updated>2013-10-03T12:14:07+00:00</updated>
<author>
<name>Martin Kosek</name>
<email>mkosek@redhat.com</email>
</author>
<published>2013-10-03T07:43:08+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/freeipa.git/commit/?id=88759cf7b6b3d6da1f10e4e8fbf26685e5235a7b'/>
<id>88759cf7b6b3d6da1f10e4e8fbf26685e5235a7b</id>
<content type='text'>
When IPA server hostname is outside of default DNS domain, instead
of relative domain name, FQDN should be used.

https://fedorahosted.org/freeipa/ticket/3908
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
When IPA server hostname is outside of default DNS domain, instead
of relative domain name, FQDN should be used.

https://fedorahosted.org/freeipa/ticket/3908
</pre>
</div>
</content>
</entry>
<entry>
<title>ipa-sam: do not modify objectclass when trust object already created</title>
<updated>2013-09-20T07:59:02+00:00</updated>
<author>
<name>Alexander Bokovoy</name>
<email>abokovoy@redhat.com</email>
</author>
<published>2013-09-05T05:13:53+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/freeipa.git/commit/?id=9cf8ec79c9e9d05ce9f21b4b187077e1fa650c95'/>
<id>9cf8ec79c9e9d05ce9f21b4b187077e1fa650c95</id>
<content type='text'>
When trust is established, last step done by IPA framework is to set
encryption types associated with the trust. This operation fails due
to ipa-sam attempting to modify object classes in trust object entry
which is not allowed by ACI.

Additionally, wrong handle was used by dcerpc.py code when executing
SetInformationTrustedDomain() against IPA smbd which prevented even to
reach the point where ipa-sam would be asked to modify the trust object.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
When trust is established, last step done by IPA framework is to set
encryption types associated with the trust. This operation fails due
to ipa-sam attempting to modify object classes in trust object entry
which is not allowed by ACI.

Additionally, wrong handle was used by dcerpc.py code when executing
SetInformationTrustedDomain() against IPA smbd which prevented even to
reach the point where ipa-sam would be asked to modify the trust object.
</pre>
</div>
</content>
</entry>
<entry>
<title>Do not show unexpected error in ipa-ldap-updater</title>
<updated>2013-09-16T10:35:36+00:00</updated>
<author>
<name>Ana Krivokapic</name>
<email>akrivoka@redhat.com</email>
</author>
<published>2013-09-03T10:42:48+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/freeipa.git/commit/?id=15cc9740c0ae7d4715df97a1b9ec0166d47c30c2'/>
<id>15cc9740c0ae7d4715df97a1b9ec0166d47c30c2</id>
<content type='text'>
Prevent showing of unfriendly "Unexpected error" message, when providing
incorrect DM password to ipa-ldap-updater.

https://fedorahosted.org/freeipa/ticket/3825
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Prevent showing of unfriendly "Unexpected error" message, when providing
incorrect DM password to ipa-ldap-updater.

https://fedorahosted.org/freeipa/ticket/3825
</pre>
</div>
</content>
</entry>
</feed>
