57cefea8305a57c1c0491afb739813b7f17d5a25 |
|
13-Nov-2017 |
Sumit Bose <sbose@redhat.com> |
PAM: add certificate's label to the selection prompt
Some types of Smartcards contain multiple certificate with the same
subject-DN for different usages. To make it easier to choose between
them in case the matching rules allow more than one of them for
authentication the label assigned to the certificate on the Smartcard is
shown in the selection prompt as well.
Related to https://pagure.io/SSSD/sssd/issue/3560
Reviewed-by: Fabiano Fidêncio <fidencio@redhat.com>
Tested-by: Scott Poore <spoore@redhat.com> |
177ab84f0e336b75289a3ac0b2df25bd5ab5198b |
|
13-Nov-2017 |
Sumit Bose <sbose@redhat.com> |
pam: filter certificates in the responder not in the child
With the new selection option and the handling of multiple certificates
in the PAM responder it is not needed anymore to filter the certificates
in p11_child but the matching rules can be applied by the PAM responder
directly.
Related to https://pagure.io/SSSD/sssd/issue/3560
Reviewed-by: Fabiano Fidêncio <fidencio@redhat.com>
Tested-by: Scott Poore <spoore@redhat.com> |
0bdd8800c16f39b8fe308d20694ad905c669dff3 |
|
13-Nov-2017 |
Sumit Bose <sbose@redhat.com> |
PAM: handled multiple certs in the responder
This patch refactors the handling of the certificate and the attributes
to address the certificate on the Smartcard (module name, token name and
key id). Instead of using individual variables the values are put into a
new struct cert_auth_info. Since the new struct can be used as a list
the PAM responder can now handle multiple certificates on the Smartcard
and can send the needed data to pam_sss with multiple SSS_PAM_CERT_INFO
messages.
Unit tests are added to confirm the expected behavior.
Related to https://pagure.io/SSSD/sssd/issue/3560
Reviewed-by: Fabiano Fidêncio <fidencio@redhat.com>
Tested-by: Scott Poore <spoore@redhat.com> |
39fd336e4390ece3a8465714735ef4203f329e54 |
|
13-Nov-2017 |
Sumit Bose <sbose@redhat.com> |
p11_child: return multiple certs
This patch refactors the handling of certificates in p11_child. Not only
the first but all certificates suitable for authentication are returned.
The PAM responder component calling p11_child is refactored to handle
multiple certificate returned by p11_child but so far only returns the
first one to its callers.
Related to https://pagure.io/SSSD/sssd/issue/3560
Reviewed-by: Fabiano Fidêncio <fidencio@redhat.com>
Tested-by: Scott Poore <spoore@redhat.com> |
6073cfc40747cd6d3142f0f98b880fc390dd7aad |
|
01-Jun-2017 |
Sumit Bose <sbose@redhat.com> |
add_pam_cert_response: add support for SSS_PAM_CERT_INFO_WITH_HINT
Related to https://pagure.io/SSSD/sssd/issue/3395
Reviewed-by: Fabiano Fidêncio <fidencio@redhat.com> |
3e789aa0bd6b7bb6e62f91458b76753498030fb5 |
|
30-Mar-2017 |
Jakub Hrozek <jhrozek@redhat.com> |
PAM: Add application services
Related to:
https://pagure.io/SSSD/sssd/issue/3310
Adds a new PAM responder option 'pam_app_services'. This option can hold
a list of PAM services that are allowed to contact the application
non-POSIX domains. These services are NOT allowed to contact any of the
POSIX domains.
Reviewed-by: Sumit Bose <sbose@redhat.com> |
16c9d63d96ce8dc7517ae16502e9ec72d6a58d6c |
|
10-Mar-2017 |
Sumit Bose <sbose@redhat.com> |
PAM: allow muliple users mapped to a certificate
Related to https://pagure.io/SSSD/sssd/issue/3050
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
ed891c0c55985cd25de05f65e82debf4452987e1 |
|
03-Mar-2017 |
Fabiano Fidêncio <fidencio@redhat.com> |
PAM: Use cache_req to perform initgroups lookups
PAM responder has been already taking advantage of the cache_req
interface, so this patch is just replacing some code that performs
initgroups lookups by using cache_req to do so.
Resolves:
https://fedorahosted.org/sssd/ticket/1126
Signed-off-by: Fabiano Fidêncio <fidencio@redhat.com>
Reviewed-by: Sumit Bose <sbose@redhat.com>
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
ead25e32c52c8c2f5fd9abd179e9e81de58f9ca3 |
|
23-Feb-2017 |
Sumit Bose <sbose@redhat.com> |
p11: return name of PKCS#11 module and key id to pam_sss
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
82c5971fafe6063a90289ebba08035fc49ae8590 |
|
23-Feb-2017 |
Sumit Bose <sbose@redhat.com> |
PAM: forward Smartcard credentials to backends
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
f561c2bd3c72631ccb7ad6d0b5f6541b27b0922d |
|
23-Feb-2017 |
Sumit Bose <sbose@redhat.com> |
PAM: store user object in the preq context
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
ce43f710c9638fbbeae077559cd7514370a10c0c |
|
02-Nov-2016 |
Sumit Bose <sbose@redhat.com> |
PAM: add pam_response_filter option
Currently the main use-case for this new option is to not set the
KRB5CCNAME environment varible for services like 'sudo-i'.
Resolves https://fedorahosted.org/sssd/ticket/2296
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
c8fe1d922b254aa92e74f428135ada3c8bde87a1 |
|
02-Nov-2016 |
Sumit Bose <sbose@redhat.com> |
PAM: add a test for filter_responses()
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
8110a8e2369e49c288ede1473657be9451a244e5 |
|
11-May-2016 |
Petr Cech <pcech@redhat.com> |
RESPONDER: Removing ncache from pam_ctx
This patch switches ncache from pam_ctx to resp_ctx.
Reviewed-by: Pavel Březina <pbrezina@redhat.com> |
beb07d2f45856d4f3135f173cce551a2aa878f57 |
|
11-May-2016 |
Petr Cech <pcech@redhat.com> |
RESPONDER: Removing neg_timeout from pam responder
It removes neg_timeout parameter from struct pam_ctx. Timeout is
handled by context of negative cache internally.
This patch additioanlly removes neg_timeout from struct cache_req_state.
Resolves:
https://fedorahosted.org/sssd/ticket/2317
Reviewed-by: Pavel Březina <pbrezina@redhat.com> |
544a20de7667f05c1a406c4dea0706b0ab507430 |
|
26-Nov-2015 |
Sumit Bose <sbose@redhat.com> |
p11: enable ocsp checks
This patch enables the Online Certificate Status Protocol in NSS and
adds an option to disable it if needed. To make further tuning of
certificate verification more easy it is not an option on its own but an
option to the new certificate_verification configuration option.
Resolves https://fedorahosted.org/sssd/ticket/2812
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
4b12be504e20173e0629835818e4db6a9617a9a4 |
|
12-Nov-2015 |
Pavel Reichl <preichl@redhat.com> |
pam-srv-tests: Add UT for cached 'online' auth.
Extend PAM responder unit test to check 'online' cached authentication.
Resolves:
https://fedorahosted.org/sssd/ticket/2697
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
a8d887323f83984679a7d9b827a70146656bb7b2 |
|
31-Jul-2015 |
Sumit Bose <sbose@redhat.com> |
PAM: add certificate support to PAM (pre-)auth requests
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
0aa18cc0bf3447ca734476926724f1632e160807 |
|
06-Jul-2015 |
Pavel Reichl <preichl@redhat.com> |
PAM: authenticate agains cache
Enable authenticating users from cache even when SSSD is in online mode.
Introduce new option `cached_auth_timeout`.
Resolves:
https://fedorahosted.org/sssd/ticket/1807
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
ff7481ff6f75d92470cff56632ad06ff7f10e895 |
|
25-Nov-2014 |
Jakub Hrozek <jhrozek@redhat.com> |
PAM: Move is_uid_trusted from pam_ctx to preq
Keeping a per-request flag in a global structure is really dangerous.
Reviewed-by: Sumit Bose <sbose@redhat.com> |
830ded27453015080a54d6ba85fd4999ee7e9af1 |
|
29-Sep-2014 |
Pavel Reichl <preichl@redhat.com> |
PAM: new options pam_trusted_users & pam_public_domains
pam_public_domains option is a list of numerical UIDs or user names
that are trusted.
pam_public_domains option is a list of domains accessible even for
untrusted users.
Based on:
https://fedorahosted.org/sssd/wiki/DesignDocs/RestrictDomainsInPAM
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
17c4d901ecf62fa9d641d46c9e92032b0deaaa36 |
|
01-Sep-2014 |
Sumit Bose <sbose@redhat.com> |
PAM: remove ldb_result member from pam_auth_req context
This member was used only in a single call where a local variable suits
better. |
a28391f68a09eaedbe1a515f513ca56bbb94d7a5 |
|
08-Apr-2013 |
Jakub Hrozek <jhrozek@redhat.com> |
Allocate PAM DP request data on responder context
https://fedorahosted.org/sssd/ticket/1869
Currently the private data passed to the PAM request is a structure
allocated on the client context. But in the odd case where the back end
would be stopped or stuck until the idle timeout hits, the DP callback
would access data that were freed when the client timed out.
This patch introduces a new structure allocated on responder context,
whose only purpose is to live as long as the request is active. |
d844aab866ae237844360cea70e2dccdc90c783d |
|
20-Dec-2011 |
Stephen Gallagher <sgallagh@redhat.com> |
PAM: make initgroups timeout work across multiple clients
Instead of timing out the initgroups lookup on a per-cctx basis,
we will maintain a hash table of recently-seen users and use this
instead. This will allow SSSD to handle user's logging into
multiple services simultaneously more graciously, as well as
playing nicer with SSH (which makes calls to PAM both before and
after a fork).
https://fedorahosted.org/sssd/ticket/1063 |
c71ff1e4615ec8560b90ca7d4827d99424ad0355 |
|
22-Dec-2010 |
Stephen Gallagher <sgallagh@redhat.com> |
Update the ID cache for any PAM request
Also adds an option to limit how often we check the ID provider,
so that conversations with multiple PAM requests won't update the
cache multiple times.
https://fedorahosted.org/sssd/ticket/749 |
6d65f4d78567cdcab9b0ab52e1f08ad054278cc7 |
|
17-Jun-2010 |
Stephen Gallagher <sgallagh@redhat.com> |
Honor filter_users in PAM |
a572e241c20a4c5df4f282a2e54b89bf071369da |
|
06-Jun-2010 |
Jakub Hrozek <jhrozek@redhat.com> |
Remove dead code from the PAM responder |
7ffaa2afb9e03a6f0b9c602c0f03b2074ea33eac |
|
12-Apr-2010 |
Simo Sorce <ssorce@redhat.com> |
sysdb: convert sysdb_getpwnam |
1c48b5a62f73234ed26bb20f0ab345ab61cda0ab |
|
18-Feb-2010 |
Stephen Gallagher <sgallagh@redhat.com> |
Rename server/ directory to src/
Also update BUILD.txt |