diff options
author | Alexander Bokovoy <abokovoy@redhat.com> | 2013-11-27 12:17:43 +0200 |
---|---|---|
committer | Martin Kosek <mkosek@redhat.com> | 2013-11-29 13:13:55 +0100 |
commit | 32df84f04ba300020bbc232ed7119838ae31fea6 (patch) | |
tree | 93d2ba907819174af2f2b6cd5cd01fbc8fb494f7 /freeipa.spec.in | |
parent | 2d86d7d85a67e47280828b749511d22050b58fa2 (diff) | |
download | freeipa-32df84f04ba300020bbc232ed7119838ae31fea6.tar.gz freeipa-32df84f04ba300020bbc232ed7119838ae31fea6.tar.xz freeipa-32df84f04ba300020bbc232ed7119838ae31fea6.zip |
subdomains: Use AD admin credentials when trust is being established
When AD administrator credentials passed, they stored in realm_passwd,
not realm_password in the options.
When passing credentials to ipaserver.dcerpc.fetch_domains(), make sure
to normalize them.
Additionally, force Samba auth module to use NTLMSSP in case we have
credentials because at the point when trust is established, KDC is not
yet ready to issue tickets to a service in the other realm due to
MS-PAC information caching effects. The logic is a bit fuzzy because
credentials code makes decisions on what to use based on the smb.conf
parameters and Python bindings to set parameters to smb.conf make it so
that auth module believes these parameters were overidden by the user
through the command line and ignore some of options. We have to do calls
in the right order to force NTLMSSP use instead of Kerberos.
Fixes https://fedorahosted.org/freeipa/ticket/4046
Diffstat (limited to 'freeipa.spec.in')
0 files changed, 0 insertions, 0 deletions