4a9c1047354dbe5a4ed41e5951ae623e3772e113 |
|
29-Jan-2018 |
René Genz <liebundartig@freenet.de> |
Fix minor spelling mistakes in providers/*
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
ed891c0c55985cd25de05f65e82debf4452987e1 |
|
03-Mar-2017 |
Fabiano Fidêncio <fidencio@redhat.com> |
PAM: Use cache_req to perform initgroups lookups
PAM responder has been already taking advantage of the cache_req
interface, so this patch is just replacing some code that performs
initgroups lookups by using cache_req to do so.
Resolves:
https://fedorahosted.org/sssd/ticket/1126
Signed-off-by: Fabiano Fidêncio <fidencio@redhat.com>
Reviewed-by: Sumit Bose <sbose@redhat.com>
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
50c740cbc2bb27cbe488fa8587e2901b8b85cf87 |
|
15-Feb-2017 |
Jakub Hrozek <jhrozek@redhat.com> |
RESPONDER: Contact inconsistent domains
Reviewed-by: Pavel Březina <pbrezina@redhat.com> |
ca68b1b4ba06b1cda316ae8af470647bd7015a5a |
|
16-Jan-2017 |
Lukas Slebodnik <lslebodn@redhat.com> |
DP: Remove unused attr_type from struct dp_id_data
Structure member attr_type was set to BE_ATTR_CORE on all places
and there was a single place src/providers/ldap/ldap_id.c where
we checked to other values. It is not used anymore; it's better to
remove it.
Reviewed-by: Michal Židek <mzidek@redhat.com> |
8b026b55ff30ed24fb6795fbd5f59bd5949c303b |
|
16-Jan-2017 |
Lukas Slebodnik <lslebodn@redhat.com> |
DP: Remove unused constants BE_ATTR_*
Neither BE_ATTR_MEM nor BE_ATTR_ALL are set anywhere in sssd.code.
sh$ git grep -E "BE_ATTR_ALL|BE_ATTR_MEM"
src/providers/data_provider.h:#define BE_ATTR_MEM 2
src/providers/data_provider.h:#define BE_ATTR_ALL 3
src/providers/data_provider/dp_target_id.c: case BE_ATTR_MEM:
src/providers/data_provider/dp_target_id.c: case BE_ATTR_ALL:
Reviewed-by: Michal Židek <mzidek@redhat.com> |
04e870d99e72aa3160bdb6ab05d986fb4005c3ed |
|
16-Aug-2016 |
Pavel Březina <pbrezina@redhat.com> |
DP: Remove old data provider interface
Reverse data provider interface is moved to a better location in
NSS responder. All responders now can have an sbus interface
defined per data provider connection. The unused old data provider
interface is removed.
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
83a79d93035c2d75a1941f3b54426119174044a0 |
|
20-Jun-2016 |
Pavel Březina <pbrezina@redhat.com> |
RESPONDER: New interface for client registration
This is just a beginning of new responder interface to data provider
and it is just to make the client registration work. It needs further
improvement.
The idea is to take the existing interface and make it work better
with further extensions of data provider. The current interface has
several disadvantages such as it is originally build only for
account requests and doesn't take different set of output parameters.
It also doesn't work well with integration into tevent-made responders.
Reviewed-by: Sumit Bose <sbose@redhat.com>
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
a1bf79449204ce9a5392b9d09b953a6bdf53a122 |
|
20-Jun-2016 |
Pavel Březina <pbrezina@redhat.com> |
DP: Add callback for backward compatibility
Reviewed-by: Sumit Bose <sbose@redhat.com>
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
ff275f4c0b8cc1a098dbd0c5f6d52d6a93cda597 |
|
17-Feb-2016 |
Pavel Reichl <preichl@redhat.com> |
SDAP: Add return code ERR_ACCOUNT_LOCKED
Add code to distinquish state when account is locked in Active
Directory server.
Tested against Windows Server 2012
This patch is best effort only as decision whether account is actually
locked is based on parsing error message returned by AD. The format and
content of this error message might be subject of change in future
releases and also can be modified by AD administrators.
If account is locked bind operation is expected to return following
error message:
-----------------------------------------------------------------------
Invalid credentials(49), 80090308: LdapErr: DSID-0C0903C5, comment:
AcceptSecurityContext error, data 775, v23f0
-----------------------------------------------------------------------
Where sub string 'data 775' implies that account is locked
(ERROR_ACCOUNT_LOCKED_OUT) [1]. However the 80090308 (error code
0x80090308, SEC_E_INVALID_TOKEN) is the only guaranteed part of error
string [2].
Error message is described in further detail as [3]:
-----------------------------------------------------------------------
When the server fails an LDAP operation with an error, and the server
has sufficient resources to compute a string value for the errorMessage
field of the LDAPResult, it includes a string in the errorMessage field
of the LDAPResult (see [RFC2251] section 4.1.10). The string contains
further information about the error.
The first eight characters of the errorMessage string are a 32-bit
integer, expressed in hexadecimal. Where protocol specifies the extended
error code "<unrestricted>" there is no restriction on the value of the
32-bit integer. It is recommended that implementations use a Windows
error code for the 32-bit integer in this case in order to improve
usability of the directory for clients. Where protocol specifies an
extended error code which is a Windows error code, the 32-bit integer is
the specified Windows error code. Any data after the eighth character
is strictly informational and used only for debugging. Conformant
implementations need not put any value beyond the eighth character of
the errorMessage field.
-----------------------------------------------------------------------
[1] https://msdn.microsoft.com/en-us/library/windows/desktop/ms681386%28v=vs.85%29.aspx
[2] https://social.msdn.microsoft.com/Forums/en-US/e1d600c8-60b7-4ed0-94cb-20ddd6c1a1c6/msadts-user-locking-password-policies?forum=os_windowsprotocols
[3] MS-ADTS 3.1.1.3.1.9
https://msdn.microsoft.com/en-us/library/cc223253.aspx
Resolves:
https://fedorahosted.org/sssd/ticket/2839
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>
Reviewed-by: Alexander Bokovoy <abokovoy@redhat.com>
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
376eaf187c13c2a1eaea0ffbdd970b6b563ab74c |
|
14-Sep-2015 |
Petr Cech <pcech@redhat.com> |
DATA_PROVIDER: BE_REQ as string in log message
Add be_req2str() for translation BE_REQ to string.
So we will have
|| Got request for [0x1001][FAST BE_REQ_USER][1][name=celestian]
instead of
|| Got request for [0x1001][1][name=celestian]
Function be_req2str() is used in data provider and in responder too.
So this patch create new header file data_provider_req.h which
delivers function be_req2str() and definitions of BE_REQ_*.
Resolves:
https://fedorahosted.org/sssd/ticket/2708
Reviewed-by: Pavel Reichl <preichl@redhat.com> |
cdc44abdf944b0de541fe93ecd77df4d09c856b1 |
|
15-Jul-2015 |
Jakub Hrozek <jhrozek@redhat.com> |
DP: Add DP_WILDCARD and SSS_DP_WILDCARD_USER/SSS_DP_WILDCARD_GROUP
Related:
https://fedorahosted.org/sssd/ticket/2553
Extends the Data Provider interface and the responder<->Data provider
interface with wildcard lookups.
The patch uses a new "wildcard" prefix rather than reusing the existing
user/group prefixes.
Reviewed-by: Pavel Březina <pbrezina@redhat.com> |
caacea0dbfdc92613ae992681053b1d2665b80ca |
|
19-Jun-2015 |
Sumit Bose <sbose@redhat.com> |
LDAP/IPA: add user lookup by certificate
Related to https://fedorahosted.org/sssd/ticket/2596
Reviewed-by: Pavel Březina <pbrezina@redhat.com> |
b3d110fbc424a03674a6e50e489a7cbab9702f0b |
|
05-Jun-2015 |
Jakub Hrozek <jhrozek@redhat.com> |
DP: Add a function to inherit DP options, if set
Related to:
https://fedorahosted.org/sssd/ticket/2644
Adds a utility function that checks if a DP option is present in
the subdomain_inherit list. If it is, then the option is set from source
to destination dp_option array.
Reviewed-by: Pavel Reichl <preichl@redhat.com> |
0f9c28eb52d2b45c8a97f709308dc11377831b8c |
|
06-May-2015 |
Sumit Bose <sbose@redhat.com> |
IPA: allow initgroups by UUID for FreeIPA users
If a FreeIPA user is searched with the help of an override name the UUID
from the override anchor is used to search the user. Currently the
initgroups request only allows searches by SID or name. With this patch
a UUID can be used as well.
Related to https://fedorahosted.org/sssd/ticket/2642
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
f70a1adbfc30b9acc302027439fb8157e0c6ea2a |
|
29-Apr-2015 |
Sumit Bose <sbose@redhat.com> |
IPA: allow initgroups by SID for AD users
If a user from a trusted AD domain is search with the help of an
override name the SID from the override anchor is used to search the
user in AD. Currently the initgroups request only allows searches by
name. With this patch a SID can be used as well.
Resolves https://fedorahosted.org/sssd/ticket/2632
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
7964d2bd7ea6a0f5bf5acdf94279d72122eca6ad |
|
20-Nov-2014 |
Sumit Bose <sbose@redhat.com> |
LDAP: add support for lookups by UUID
Related to https://fedorahosted.org/sssd/ticket/2481
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
ed4a9bd4d0f7fb359bed66a8d63a92e7be633aae |
|
16-Oct-2014 |
Sumit Bose <sbose@redhat.com> |
views: search overrides for user and group requests
If the name or the POSIX ID of a user or a group is overridden the
search request for those objects have to check the overide objects first
before looking up the original objects.
This patch adds a new request for the IPA sub-domain users which checks
the overrides first if
- SSSD is running in ipa-server-mode and a name or a POSIX ID is
searched, since we do not override the SIDs we can skip the search in
the override tree here
- if the responder indicates it has not found the corresponding object
in the cache and the input might be an override name or ID and not the
original one of an object.
If an override object was found the SID is extracted from the anchor
attribute and the original object is search by its SID. If no override
object was found the original object is search with the original input
and finally it is checked if an override object exits for the found
object.
Relates to https://fedorahosted.org/sssd/ticket/2375
Reviewed-by: Pavel Březina <pbrezina@redhat.com> |
663fd9bcdcc6b299785ba3434532cd7e6c462bff |
|
29-Sep-2014 |
Daniel Gollub <dgollub at brocade.com> |
PAM: Add domains= option to pam_sss
Design document:
https://fedorahosted.org/sssd/wiki/DesignDocs/RestrictDomainsInPAM
Fixes:
https://fedorahosted.org/sssd/ticket/1021
Signed-off-by: Pavel Reichl <preichl@redhat.com>
Reviewed-by: Sven-Thorsten Dietrich <sven@brocade.com>
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
899d1bdc048cd74518170d7d9535d76d3f46d4af |
|
01-Sep-2014 |
Sumit Bose <sbose@redhat.com> |
PAM, NSS: allow UPN login names
With this patch the NSS and PAM responders can handle user principal
names besides the fully qualified user names.
User principal names are build from a user name and a domain suffix
separated by an '@' sign. But the domain suffix does not necessarily has
to be the same as the configured domain name in sssd.conf of the
dynamically discovered DNS domain name of a domain. The typical use case
is an Active Directory forest with lots of different domains. To not
force the users to remember the name of the individual domain they
belong to the AD administrator can set a common domain suffix for all
users from all domains in the forest. This is typically the domain name
used for emails to make it even more easy to the users to remember it.
Since SSSD splits name and domain part at the '@' sign and the common
domain suffix might not be resolvable by DNS or the given user is not a
member of that domain (e.g. in the case where the forest root is used as
common domain suffix) SSSD might fail to look up the user.
With this patch the NSS and PAM responder will do an extra lookup for a
UPN if the domain part of the given name is not known or the user was
not found and the login name contained the '@' sign.
Resolves https://fedorahosted.org/sssd/ticket/1749 |
cda952ca3e00d324c7e53eeaeda394eb0d142818 |
|
01-Sep-2014 |
Sumit Bose <sbose@redhat.com> |
PAM: extract checks from parsing routines
This patch saves the original name given at a login prompt and send to
the PAM responder in the logon_name member of the pam_data struct for
later use.
Additionally it separates the parsing of the data send by the PAM client
and the checks of this data. |
25a387c2e90c74b27a26ea207503df8e4b6a1a76 |
|
01-Sep-2014 |
Sumit Bose <sbose@redhat.com> |
LDAP: If extra_value is 'U' do a UPN search
Besides the name the responders always send an extra string attribute to
the backends which is so far mostly empty. Since the only difference in
the processing of a request for a user name or a user principal name is
a different search attribute in the LDAP provider this extra value can
be used to indicate the type of the name. Providers which do not support
UPN lookup can just ignore this attribute.
Related to https://fedorahosted.org/sssd/ticket/1749 |
90afedb00608547ae1f32aa7aafd552c4b306909 |
|
26-Feb-2014 |
Jakub Hrozek <jhrozek@redhat.com> |
DP: Provide separate dp_copy_defaults function
https://fedorahosted.org/sssd/ticket/2257
Reviewed-by: Pavel Březina <pbrezina@redhat.com> |
b668c77874c6fed325471bdcf5954979a0d734e2 |
|
24-Feb-2014 |
Stef Walter <stefw@redhat.com> |
sbus: Use constants to make dbus calls
This allows us to remove duplicated information, and have the
compiler check that when an method name is changed or removed
the callers are updated.
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>
Reviewed-by: Sumit Bose <sbose@redhat.com>
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com>
Reviewed-by: Simo Sorce <simo@redhat.com> |
769347ad4d35d43488eb98f980143495b0db415d |
|
24-Feb-2014 |
Stef Walter <stefw@redhat.com> |
sbus: Rework sbus to use interface metadata and vtables
Previous commits added support for interface metadata and
handler vtables. This commit ports sbus_dbus_connection to
use them.
Port the internal uses of dbus to use the new scheme in a
very minimal way. Further cleanup is possible here.
This commit provides basic definitions of the internal
dbus interfaces. The interfaces aren't fully defined, as the
handlers will continue to unpack manually, and often overload
DBus methods with different arguments (which is rather
unorthodox, but not the end of the world).
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>
Reviewed-by: Sumit Bose <sbose@redhat.com>
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com>
Reviewed-by: Simo Sorce <simo@redhat.com> |
3e7d7af1953410f3f009bf3b2e481a46fb80de83 |
|
24-Feb-2014 |
Stef Walter <stefw@redhat.com> |
nss: Stop using one DBus interface with totally different methods
This is an incorrect use of DBus, where we use a single interface
name with completely different sets of methods.
Easily fixed.
Once the vtable stuff is in use then this would be automatically
detected and fail to build.
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>
Reviewed-by: Sumit Bose <sbose@redhat.com>
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com>
Reviewed-by: Simo Sorce <simo@redhat.com> |
5c233380e1ebf641f6106a34d7b94f9e9a606589 |
|
12-Feb-2014 |
Nikolai Kondrashov <Nikolai.Kondrashov@redhat.com> |
Remove DEBUG macro support for old debug levels
Remove support for specifying old debug levels to the DEBUG macro:
* remove debug_get_level function which was used for conversion,
* remove debug_get_level tests,
* remove mentions of old/new levels from DEBUG and DEBUG_IS_SET
macro descriptions,
* rename "newlevel" argument of debug_fn to just "level".
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>
Reviewed-by: Stephen Gallagher <sgallagh@redhat.com>
Reviewed-by: Simo Sorce <simo@redhat.com> |
19b4bb652f5cdc2797b66595eaf8811881aa9873 |
|
22-Oct-2013 |
Jakub Hrozek <jhrozek@redhat.com> |
Include external headers with #include <foo.h>
I find it more readable to include headers from outside the sssd tree
with <foo.h>, not "foo.h". The latter should be used for in-tree headers
only. |
f0944fdd627bd684ff36c9670dc857ffdedc343f |
|
02-May-2013 |
Sumit Bose <sbose@redhat.com> |
Add two new request types to the data-provider interface
The patch adds two new request types for SID related requests. The first
one is used if a SID is given and the corresponding object should be
found. The second one can be used if the SID for an object is requested
but it is not clear if the object is a user or a group. |
206329d3901738036352f2ac1e8d7804f728861d |
|
02-May-2013 |
Sumit Bose <sbose@redhat.com> |
Add secid filter to responder-dp protocol
This patch add a new filter type to the data-provider interface which
can be used for SID-based lookups. |
584eda085e83a428f2c39dadf0d7adeaff5c87f4 |
|
03-Apr-2013 |
Jakub Hrozek <jhrozek@redhat.com> |
Init failover with be_res options |
9acfb09f7969a69f58bd45c856b01700541853ca |
|
02-Apr-2013 |
Lukas Slebodnik <lslebodn@redhat.com> |
Making the authtok structure really opaque.
Definition of structure sss_auth_token was removed from header file
authtok.h and there left only declaration of this structure.
Therefore only way how to use this structure is to use accessory function from
same header file.
To creating new empty authotok can only be used newly created function
sss_authtok_new(). TALLOC context was removed from copy and setter functions,
because pointer to stuct sss_auth_token is used as a memory context.
All declaration of struct sss_auth_token variables was replaced with
pointer to this structure and related changes was made in source code.
Function copy_pam_data can copy from argument src which was dynamically
allocated with function create_pam_data() or zero initialized struct pam_data
allocated on stack.
https://fedorahosted.org/sssd/ticket/1830 |
53b58615fbc13eddcd6e2f28066b67cb5f16b6d3 |
|
02-Apr-2013 |
Lukas Slebodnik <lslebodn@redhat.com> |
Reusing create_pam_data() on the other places.
Function create_pam_data() should be only one way how to create new
struct pam_data, because it also initialize destructor to created
object. |
64af76e2bef2565caa9738f675c108a4b3789237 |
|
10-Jan-2013 |
Simo Sorce <simo@redhat.com> |
Change pam data auth tokens.
Use the new authtok abstraction and interfaces throught the code. |
408914f68673f2caa1c82a1a21336fcb7ddd52ef |
|
05-Dec-2012 |
Simo Sorce <simo@redhat.com> |
Hook for mmap cache update on initgroup calls
This set of functions enumerate the user's groups and invalidate them all
if the list does not matches what we get from the caller. |
ebba1aa6b9783daa0d530e9f5e307f7be17d3cd3 |
|
05-Dec-2012 |
Simo Sorce <simo@redhat.com> |
Hook to perform a mmap cache update from sssd_nss
This set of functions enumerate each user/group from all domains
and invalidate any mmap cache record that matches. |
e11c7dc43f4ff9897e37cc0d793f8e1fb3b8453a |
|
04-Dec-2012 |
Simo Sorce <simo@redhat.com> |
Use an entry type mask macro to filter entry types
Avoids hardcoding magic numbers everywhere and self documents why a
mask is being applied. |
d3dca30d3a6feba062d0299718d1a9fcdc8b9d17 |
|
26-Oct-2012 |
Sumit Bose <sbose@redhat.com> |
krb5_child: send back the client principal
In general Kerberos is case sensitive but the KDC of Active Directory
typically handles request case in-sensitive. In the case where we guess
a user principal by combining the user name and the realm and are not
sure about the cases of the letters used in the user name we might get a
valid ticket from the AD KDC but are not able to access it with the
Kerberos client library because we assume a wrong case.
The client principal in the returned credentials will always have the
right cases. To be able to update the cache user principal name the
krb5_child will return the principal for further processing. |
dfafb437f49d31e015184e212571e9917aa94eef |
|
29-Jun-2012 |
Pavel Březina <pbrezina@redhat.com> |
sudo: clean up |
d16b3f456d1100f4058d9a73ee59397f964b8760 |
|
29-Jun-2012 |
Pavel Březina <pbrezina@redhat.com> |
sudo ldap provider: add support for on demand refresh of specific rules |
f8cbe2ddc3bd6e1f003f1d16a609b0697cafc721 |
|
29-Jun-2012 |
Pavel Březina <pbrezina@redhat.com> |
sudo ldap provider: add support for on demand full refresh |
fe1ac2443811a7125f2ddd0382a3f437f20377de |
|
24-Apr-2012 |
Sumit Bose <sbose@redhat.com> |
data provider: added subdomains |
c0f9698cd951b7223f251ff2511c4b22a6e4ba60 |
|
24-Apr-2012 |
Jan Zeleny <jzeleny@redhat.com> |
Responder part of the subdomain retrieval work |
419ddca29f074cf446c316b735fbbafc59084458 |
|
28-Mar-2012 |
Stephen Gallagher <sgallagh@redhat.com> |
Add terminator for dp_option |
74505b09d056883741e90cac45838c844365cae5 |
|
07-Feb-2012 |
Jan Cholasta <jcholast@redhat.com> |
DP: Add host info handler |
9e80079370ff3b943832adc3c5ef430e64be0a0c |
|
06-Feb-2012 |
Jakub Hrozek <jhrozek@redhat.com> |
AUTOFS: responder |
5708dc97b69a468f077616d7a75e81f4172f63fa |
|
06-Feb-2012 |
Jakub Hrozek <jhrozek@redhat.com> |
AUTOFS: Data Provider request |
7a571a9d9be35360cc0f283fcd8124bda11ebf51 |
|
27-Jan-2012 |
Pavel Březina <pbrezina@redhat.com> |
SUDO Integration - prepare data provider for new responder commands
https://fedorahosted.org/sssd/ticket/1143 |
3b09b74bf65867d882af87ec60e2a517b15264a6 |
|
27-Jan-2012 |
Jakub Hrozek <jhrozek@redhat.com> |
SUDO: Provide a sudo DP request based on the internal_req |
6748486d61680426e8739bb5e7db7dd8409ef44c |
|
27-Jan-2012 |
Stephen Gallagher <sgallagh@redhat.com> |
DP: Add support for services in dp requests |
88c5d362804244a5a74785b94018ddf887094553 |
|
16-Dec-2011 |
Pavel Březina <pbrezina@redhat.com> |
SUDO integration - data provider backend handler |
4a6a5421113ab662a665c62ed6a24b61a5a36950 |
|
28-Sep-2011 |
Jakub Hrozek <jhrozek@redhat.com> |
Multiline macro cleanup
This is mostly a cosmetic patch.
The purpose of wrapping a multi-line macro in a do { } while(0) is to
make the macro usable as a regular statement, not a compound statement.
When the while(0) is terminated with a semicolon, the do { } while(0);
block becomes a compound statement again. |
99dd40a885ed3d42af4bbbde7ee2fc98830544d0 |
|
25-Aug-2011 |
Pavel Březina <pbrezina@redhat.com> |
New DEBUG facility - conversion
https://fedorahosted.org/sssd/ticket/925
Conversion of the old debug_level format to the new one.
(only where it was necessary)
Removed:
SSS_DEFAULT_DEBUG_LEVEL (completely replaced with SSSDBG_DEFAULT) |
222072fd4383f742e0a1b1722946d4586fe37de7 |
|
06-May-2011 |
Jakub Hrozek <jhrozek@redhat.com> |
Remove unused constants from data_provider.h |
e63307a858eaa56f46cd5bf562653911eb2e9826 |
|
08-Mar-2011 |
Jan Zeleny <jzeleny@redhat.com> |
Remove unused be_check_online() SBUS call |
d2d23847f879712d6e191134018a8bff70a5e2ab |
|
03-Dec-2010 |
Sumit Bose <sbose@redhat.com> |
Add support for server-side pam response messages |
d1571f8c173ca9172fa295e6aac48b8c0c367950 |
|
02-Dec-2010 |
Sumit Bose <sbose@redhat.com> |
Add a special filter type to handle enumerations |
9468a58f9bd191ef80c114943a288037c635a835 |
|
15-Nov-2010 |
Sumit Bose <sbose@redhat.com> |
Introduce pam_verbosity config option
Currently we display all PAM messages generated by sssd to the user. But
only some of them are important and others are just some useful
information.
This patch introduces a new option to the PAM responder which controls
what kind of messages are displayed. As an example the 'Authenticated
with cached credentials' message is used. This message is only displayed
if pam_verbosity=1 or if there is an expire date. |
ef39c0adcb61b16f9edc7beb4cdc8f3b0d5a8f15 |
|
13-Oct-2010 |
Stephen Gallagher <sgallagh@redhat.com> |
Add netgroup support to the NSS responder |
a772f2e29661dda4c69124a4c794183798418ae4 |
|
27-May-2010 |
Sumit Bose <sbose@redhat.com> |
Copy pam data from DBus message
Instead of just using references to the pam data inside of the DBus
message the data is copied. New the DBus message can be freed at any
time and the pam data is part of the memory hierarchy. Additionally it
is possible to overwrite the authentication tokens in the DBus message,
because it is not used elsewhere. |
0507838f0194b37271c52acab1bdfa73af3929da |
|
27-May-2010 |
Stephen Gallagher <sgallagh@redhat.com> |
Make data provider id_callback public |
02e38eae1b9cb5df2036a707dafd86f6047c17de |
|
26-May-2010 |
Sumit Bose <sbose@redhat.com> |
Add support for delayed kinit if offline
If the configuration option krb5_store_password_if_offline is set to
true and the backend is offline the plain text user password is stored
and used to request a TGT if the backend becomes online. If available
the Linux kernel key retention service is used. |
55daaea86e0ba049d31f74fcdf6bfedc6e0a1e7b |
|
20-May-2010 |
Stephen Gallagher <sgallagh@redhat.com> |
Revert "Copy pam data from DBus message"
This reverts commit 2faf73eef14d66aeb345ffa38d0f53670fa8a9a1. |
2faf73eef14d66aeb345ffa38d0f53670fa8a9a1 |
|
20-May-2010 |
Sumit Bose <sbose@redhat.com> |
Copy pam data from DBus message
Instead of just using references to the pam data inside of the DBus
message the data is copied. New the DBus message can be freed at any
time and the pam data is part of the memory hierarchy. Additionally it
is possible to overwrite the authentication tokens in the DBus message,
because it is not used elsewhere. |
e55f1df17af45d2e32153b41006c06061d0337e5 |
|
22-Feb-2010 |
Stephen Gallagher <sgallagh@redhat.com> |
Remove unnecessary domain parameter from PAM requests
If we're sending a message to the backend, we already know which
domain the request is targeting. Carrying this information is not
useful and confuses the interface. |
b81f453b8ade026f9c19bfd557a986cbcf0c9c8c |
|
22-Feb-2010 |
Stephen Gallagher <sgallagh@redhat.com> |
Remove unnecessary "domain" parameter from DP registration
This was a holdover from when the DP and the providers were unique
processes. The NSS and PAM registrations do not need to send the
domain, as it is not ambiguous which one they are talking to. |
446dbddae224cb68422825445b3cbdeb6606aa81 |
|
19-Feb-2010 |
Sumit Bose <sbose@redhat.com> |
Add documentation for PAM response messages |
953e07b7c43bc9bb7c7616180b1ba1730e22c59a |
|
19-Feb-2010 |
Sumit Bose <sbose@redhat.com> |
Remove unneeded items from struct pam_data |
1c48b5a62f73234ed26bb20f0ab345ab61cda0ab |
|
18-Feb-2010 |
Stephen Gallagher <sgallagh@redhat.com> |
Rename server/ directory to src/
Also update BUILD.txt |