d380148b0a23dd1a04d1d0767ba41d3e76fb7d23 |
|
07-Feb-2018 |
Lukas Slebodnik <lslebodn@redhat.com> |
KRB5: Pass special flag to krb5_child
We will need to distinguish between standard version
of krb5_get_init_creds_password or custom one which can distinguish
KERB-EXT-ERROR error code for expired and disabled AD users.
Flag is set only in case of auth provider ad.
Resolves:
https://pagure.io/SSSD/sssd/issue/3198
Reviewed-by: Sumit Bose <sbose@redhat.com> |
7e394400eefd0e7c5ba0c64ab3fa28bee21ef2d7 |
|
28-Nov-2016 |
Sumit Bose <sbose@redhat.com> |
krb5: Use command line arguments instead env vars for krb5_child
Resolves:
https://fedorahosted.org/sssd/ticket/697
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
dea636af4d1902a081ee891f1b19ee2f8729d759 |
|
20-Jun-2016 |
Pavel Březina <pbrezina@redhat.com> |
DP: Switch to new interface
Reviewed-by: Sumit Bose <sbose@redhat.com>
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
cc2d77d5218c188119fa954c856e858cbde76947 |
|
20-Jun-2016 |
Pavel Březina <pbrezina@redhat.com> |
Rename dp_backend.h to backend.h
Reviewed-by: Sumit Bose <sbose@redhat.com>
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
3683195b292afe77ce04ec446f3a1bb92d8876df |
|
05-Jun-2015 |
Pavel Reichl <preichl@redhat.com> |
krb: remove duplicit decl. of write_krb5info_file
function write_krb5info_file() was declared twice in krb5_common.h
Reviewed-by: Pavel Březina <pbrezina@redhat.com> |
aa8a8318aaa3270e9d9957d0c22dec6342360a37 |
|
28-May-2015 |
Pavel Reichl <preichl@redhat.com> |
krb5: new option krb5_map_user
New option `krb5_map_user` providing mapping of ID provider names to
Kerberos principals.
Resolves:
https://fedorahosted.org/sssd/ticket/2509
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
a0ab15ceb80290db80c2052520830a95390de385 |
|
02-Dec-2014 |
Sumit Bose <sbose@redhat.com> |
krb5: add copy_keytab_into_memory()
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
45aeb924ec3ac448bb8d174a5cc061ed98b147c7 |
|
18-Nov-2014 |
Jakub Hrozek <jhrozek@redhat.com> |
KRB5: Move ccache-related functions to krb5_ccache.c
Add a new module krb5_ccache.c that contains all ccache-related
operations. The only user of this module shall be krb5_child.c as the
other modules will run unprivileged and accessing the ccache requires
either privileges of root or the ccache owner.
Related:
https://fedorahosted.org/sssd/ticket/2370
Reviewed-by: Sumit Bose <sbose@redhat.com>
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
d20a5a74666413cadbf64c02eb656a5a3b4bb1de |
|
09-Sep-2013 |
Simo Sorce <simo@redhat.com> |
krb5: Remove unused ccache backend infrastructure
Remove struct sss_krb5_cc_be and the remaining functions that reference
it as they are all unused now.
Resolves:
https://fedorahosted.org/sssd/ticket/2061 |
48657b5de36a63b0c13ed5d53065871d59d8f10b |
|
23-Jul-2013 |
Jakub Hrozek <jhrozek@redhat.com> |
KRB5: Do not send PAC in server mode
The krb5 child contacts the PAC responder for any user except for the
IPA native users if the PAC is configured. This works fine for the
general case but the ipa_server_mode is a special one. The PAC responder
is there, but since in the server mode we should be operating as AD
provider default, the PAC shouldn't be analyzed either in this case. |
58dd26b1c5b60ee992dd5d1214bb168aebb42d54 |
|
27-Jun-2013 |
Jakub Hrozek <jhrozek@redhat.com> |
AD: Write out domain-realm mappings
This patch reuses the code from IPA provider to make sure that
domain-realm mappings are written even for AD sub domains. |
80a874555d8b2737827bb150133ba70a83c65bb7 |
|
27-Jun-2013 |
Jakub Hrozek <jhrozek@redhat.com> |
KRB5: guess UPN for subdomain users |
fa4a9c4afcc0c62a693034e21f33356e64735687 |
|
25-Jun-2013 |
Sumit Bose <sbose@redhat.com> |
krb5: do not send pac for IPA users from the local domain
So far we didn't send the PAC of IPA users to the PAC responder during
password authentication because group memberships for IPA users can be
retrieved efficiently with LDAP calls. Recently patches added PAC
support for the AD provider as well and removed the restriction for the
IPA users. This patch restores the original behaviour by introducing a
new flag in struct krb5_ctx which is only set for the IPA provider.
Additionally a different flag is renamed to make it's purpose more
clear.
Fixes https://fedorahosted.org/sssd/ticket/1995 |
14452cd066b51e32ca0ebad6c45ae909a1debe57 |
|
10-Jun-2013 |
Jakub Hrozek <jhrozek@redhat.com> |
A new option krb5_use_kdcinfo
https://fedorahosted.org/sssd/ticket/1883
The patch introduces a new Kerberos provider option called
krb5_use_kdcinfo. The option is true by default in all providers. When
set to false, the SSSD will not create krb5 info files that the locator
plugin consumes and the user would have to set up the Kerberos options
manually in krb5.conf |
edaa983d094c239c3e1ba667bcd20ed3934be3b8 |
|
22-Apr-2013 |
Sumit Bose <sbose@redhat.com> |
Allow usage of enterprise principals
Enterprise principals are currently most useful for the AD provider and
hence enabled here by default while for the other Kerberos based
authentication providers they are disabled by default.
If additional UPN suffixes are configured for the AD domain the user
principal stored in the AD LDAP server might not contain the real
Kerberos realm of the AD domain but one of the additional suffixes which
might be completely randomly chooses, e.g. are not related to any
existing DNS domain. This make it hard for a client to figure out the
right KDC to send requests to.
To get around this enterprise principals (see
http://tools.ietf.org/html/rfc6806 for details) were introduced.
Basically a default realm is added to the principal so that the Kerberos
client libraries at least know where to send the request to. It is not
in the responsibility of the KDC to either handle the request itself,
return a client referral if he thinks a different KDC can handle the
request or return and error. This feature is also use to allow
authentication in AD environments with cross forest trusts.
Fixes https://fedorahosted.org/sssd/ticket/1842 |
29c0fdd1838a4b9892146f7019d12811c1d0d59b |
|
26-Oct-2012 |
Sumit Bose <sbose@redhat.com> |
Add new call find_or_guess_upn()
With the current approach the upn was either a pointer to a const string
in a ldb_message or a string created with the help of talloc. This new
function always makes it a talloc'ed value.
Additionally krb5_get_simple_upn() is enhanced to handle sub-domains as
well. |
83f24636ef8d3d2b9c5be46272781ed5e0497ca7 |
|
26-Oct-2012 |
Sumit Bose <sbose@redhat.com> |
krb5_auth: check if principal belongs to a different realm
Add a flag if the principal used for authentication does not belong
to our realm. This can be used to act differently for users from other
realms. |
07b7b76d7cd494cbd26263503ba2732c21819941 |
|
01-Aug-2012 |
Jan Zeleny <jzeleny@redhat.com> |
Primary server support: new options in krb5 provider
This patch adds support for new config options krb5_backup_server and
krb5_backup_kpasswd. The description of this option's functionality
is included in man page in one of previous patches. |
b418d3b65c95f02b82268188f17d27fc1b1b49f0 |
|
01-Aug-2012 |
Jan Zeleny <jzeleny@redhat.com> |
Primary server support: krb5 adaptation
This patch adds support for the primary server functionality
into krb5 provider. No backup servers are added at the moment,
just the basic support is in place. |
d92c50f6d75ae980b0d130134112a33e1584724c |
|
06-Jul-2012 |
Stephen Gallagher <sgallagh@redhat.com> |
AD: Add AD auth and chpass providers
These new providers take advantage of existing code for the KRB5
provider, providing sensible defaults for operating against an
Active Directory 2008 R2 or later server. |
69905bf968003216d444fc68d8597e139362f2e6 |
|
06-Jul-2012 |
Stephen Gallagher <sgallagh@redhat.com> |
KRB5: Drop memctx parameter of krb5_try_kdcip
This function is not supposed to return any newly-allocated memory
directly. It was actually leaking the memory for krb5_servers if
krb5_kdcip was being used, though it was undetectable because it
was allocated on the provided memctx.
This patch removes the memctx parameter and allocates krb5_servers
temporarily on NULL and ensures that it is freed on all exit
conditions. It is not necessary to retain this memory, as
dp_opt_set_string() performs a talloc_strdup onto the appropriate
context internally.
It also updates the DEBUG messages for this function to the
appropriate new macro levels. |
fd8595874aa06c8057740001ec465ba76b4af142 |
|
14-Jun-2012 |
Jakub Hrozek <jhrozek@redhat.com> |
Add a credential cache back end structure
To be able to add support for new credential cache types easily, this
patch creates a new structure sss_krb5_cc_be that defines common
operations with a credential cache, such as create, check if used or remove. |
7dfc7617085c403d30debe9f08d4c9bcca322744 |
|
02-Nov-2011 |
Jan Zeleny <jzeleny@redhat.com> |
Add support to request canonicalization on krb AS requests
https://fedorahosted.org/sssd/ticket/957 |
3ae08cdd894f777aff604a906a61fb76a310b27f |
|
13-Jul-2011 |
Jakub Hrozek <jhrozek@redhat.com> |
Remove unused krb5_service structure member |
8cf1b4183577237d965068d70cd06bd0716aea84 |
|
25-Apr-2011 |
Jan Zeleny <jzeleny@redhat.com> |
Allow new option to specify principal for FAST
https://fedorahosted.org/sssd/ticket/700 |
7d436b1bd6bcca29aa9874adc11bdfb862139cd8 |
|
20-Dec-2010 |
Sumit Bose <sbose@redhat.com> |
Serialize requests of the same user in the krb5 provider |
8d163c0a088318ed9fc0b22def2649e27992ea53 |
|
07-Dec-2010 |
Sumit Bose <sbose@redhat.com> |
Replace krb5_kdcip by krb5_server in LDAP provider |
5843ad321944a028f6dee7e1fd4f9381c4953d07 |
|
07-Dec-2010 |
Sumit Bose <sbose@redhat.com> |
Add support for FAST in krb5 provider |
f3f9ce8024d7610439d6c70ddafab1ab025cf8a8 |
|
03-Dec-2010 |
Sumit Bose <sbose@redhat.com> |
Add support for automatic Kerberos ticket renewal |
1709edfb690bb4ffa4b96c64d08853f47390eda3 |
|
03-Dec-2010 |
Sumit Bose <sbose@redhat.com> |
krb5_child returns TGT lifetime |
c7d73cf51642c7f89c1f21e54b8ce1b262bef899 |
|
03-Dec-2010 |
Sumit Bose <sbose@redhat.com> |
Add krb5_lifetime option |
c8b8901b05da9e31dba320f305ec20301e928cfb |
|
03-Dec-2010 |
Sumit Bose <sbose@redhat.com> |
Add krb5_renewable_lifetime option |
0bbe2065770968c70fd305da4f6eda1a360a3f1b |
|
04-Nov-2010 |
Sumit Bose <sbose@redhat.com> |
Add krb5_get_simple_upn() |
7051a30300d12163e890e4ec4b9a765567679a8b |
|
19-Oct-2010 |
Jan Zeleny <jzeleny@redhat.com> |
Option krb5_server is now used to store a list of KDCs instead of krb5_kdcip.
For the time being, if krb5_server is not found, still falls back to
krb5_kdcip with a warning. If both options are present in config file,
krb5_server has a higher priority.
Fixes: #543 |
93109c5f1d85c028ce5cf6e31e2249ca90a7f746 |
|
13-Oct-2010 |
Jakub Hrozek <jhrozek@redhat.com> |
Initialize kerberos service for GSSAPI |
f520e7a2f4fe29747f25118621e20b0d89d296fc |
|
14-Jun-2010 |
Jakub Hrozek <jhrozek@redhat.com> |
Remove krb5_changepw_principal option
Fixes: #531 |
eaf3dcc15e9eb093ecf8b934f6c3a82d01236a92 |
|
27-May-2010 |
Sumit Bose <sbose@redhat.com> |
Refactor krb5 SIGTERM handler installation |
6126d57239edc0ed0fac8082e00cd4a685c0566d |
|
27-May-2010 |
Sumit Bose <sbose@redhat.com> |
Add callback to remove krb5 info files when going offline |
6e64fe7158875dc5e7f25c45b234cc4a3c584644 |
|
27-May-2010 |
Sumit Bose <sbose@redhat.com> |
Revert "Create kdcinfo and kpasswdinfo file at startup"
This reverts commit f3c31d11bf365eb6a79c4f698667915a4c81eeb7. |
02e38eae1b9cb5df2036a707dafd86f6047c17de |
|
26-May-2010 |
Sumit Bose <sbose@redhat.com> |
Add support for delayed kinit if offline
If the configuration option krb5_store_password_if_offline is set to
true and the backend is offline the plain text user password is stored
and used to request a TGT if the backend becomes online. If available
the Linux kernel key retention service is used. |
66da80489c0114878043b40592c5f47d41eb0ffd |
|
07-May-2010 |
Jakub Hrozek <jhrozek@redhat.com> |
Use service discovery in backends
Integrate the failover improvements with our back ends. The DNS domain
used in the SRV query is always the SSSD domain name.
Please note that this patch changes the default value of ldap_uri from
"ldap://localhost" to "NULL" in order to use service discovery with no
server set. |
f3c31d11bf365eb6a79c4f698667915a4c81eeb7 |
|
07-May-2010 |
Sumit Bose <sbose@redhat.com> |
Create kdcinfo and kpasswdinfo file at startup |
67607dda05e36c4d0be4647160ad376b89d89c51 |
|
07-May-2010 |
Stephen Gallagher <sgallagh@redhat.com> |
Clean up kdcinfo and kpasswdinfo files when exiting |
5096bb4c2242b426aa6f5ea2cb82223e0b81a345 |
|
12-Mar-2010 |
Sumit Bose <sbose@redhat.com> |
Add krb5_kpasswd option |
1c48b5a62f73234ed26bb20f0ab345ab61cda0ab |
|
18-Feb-2010 |
Stephen Gallagher <sgallagh@redhat.com> |
Rename server/ directory to src/
Also update BUILD.txt |