346d6d8bf5fdb446921d754c07c8a7d913a048d5 |
|
29-Jan-2018 |
René Genz <liebundartig@freenet.de> |
Fix minor spelling mistakes
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
2c10819750a8d920ab755eba1278e6e20e684e93 |
|
28-Nov-2017 |
Sumit Bose <sbose@redhat.com> |
krb5: show error message for krb5_init_context() failures
If there are typos in /etc/krb5.conf (or one of the included config
snippets) krb5_init_context(), the initial call always needed to do any
other operation with libkrb5, fails because /etc/krb5.conf cannot be
parsed.
Currently the related debug/syslog messages might be misleading, e.g.
failed to read keytab. This is because SSSD does not use a global krb5
context but creates a fresh one for every new request or operation (to
always use the latest settings from /etc/krb5.conf) and typically there
is an error message indicating that the related operation failed but not
giving more details.
Since krb5_init_context() is fundamental for Kerberos support this patch
tries to add as much details as libkrb5 provides in the logs if the call
fails.
Resolves:
https://pagure.io/SSSD/sssd/issue/3586
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com>
Reviewed-by: Robbie Harwood <rharwood@redhat.com> |
96e1794db6915a655d97ecab7ab71ad53d1f527b |
|
08-Jun-2017 |
Lukas Slebodnik <lslebodn@redhat.com> |
UTIL: Remove ctype.h from util/util.h
ctype.h is not used directly by util/util.h. The header file ctype.h
must be included in 32 files and after removing it from util.h it had to be
added only to 8 missing files
Reviewed-by: Fabiano Fidêncio <fidencio@redhat.com> |
c6f1bc32774a7cf2f8678499dfbced420be3a3a1 |
|
12-Apr-2017 |
Lukas Slebodnik <lslebodn@redhat.com> |
UTIL: Use max 15 characters for AD host UPN
We do not want to use host principal with AD
"host/name.domain.tld@DOMAIN.TLD" because it does not work.
We need to use correct user principal for AD hosts. And we cannot
rely all fallback "*$" because of other principals in keytab.
The NetBIOS naming convention allows for 16 characters in a NetBIOS
name. Microsoft, however, limits NetBIOS names to 15 characters and
uses the 16th character as a NetBIOS suffix.
https://support.microsoft.com/en-us/help/163409/netbios-suffixes-16th-character-of-the-netbios-name
Resolves:
https://pagure.io/SSSD/sssd/issue/3329
Reviewed-by: Michal Židek <mzidek@redhat.com> |
1dbf09404e20b6e30a24afe72b6d349734aee62f |
|
27-Mar-2017 |
Jakub Hrozek <jhrozek@redhat.com> |
UTIL: krb5 principal (un)marshalling
The KCM responder needs to read the contents of the principal blob that
the Kerberos library sends. Since libkrb5 doesn't export any API to do
so, we need to implement marshalling and unmarshalling of the principal
ourselves.
In future, when the KCM server also supports renewals, we will also need
to unmarshall the credentials, but until that is not really needed, the
credentials will be stored as a blob.
Reviewed-by: Michal Židek <mzidek@redhat.com>
Reviewed-by: Simo Sorce <simo@redhat.com> |
e16b3174e465deceaca9bfef29d05dfe5537cf9c |
|
14-Nov-2016 |
Petr Čech <pcech@redhat.com> |
UTIL: Removing of never read value
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
f0815f5dff315576c8d1b6fedf00165a4161f8c0 |
|
16-Sep-2015 |
Jakub Hrozek <jhrozek@redhat.com> |
KRB5: Don't error out reading a minimal krb5.conf
With some setups, krb5.conf can be really minimal. In those cases, we
should ignore PROF_NO_RELATION and PROF_NO_SECTION and just return
"false" as in "no proxy" without a loud debug message.
Reviewed-by: Petr Cech <pcech@redhat.com> |
9a847b5d7dfea403d838274950402cccc36659d0 |
|
14-Sep-2015 |
Sumit Bose <sbose@redhat.com> |
utils: make sss_krb5_get_primary() private
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
7bb9ba8688ec1ca930d693eea05e936bc38f6d1b |
|
05-Aug-2015 |
Sumit Bose <sbose@redhat.com> |
krb5 utils: add sss_krb5_realm_has_proxy()
Reviewed-by: Alexander Bokovoy <abokovoy@redhat.com>
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
87f8bee53ee1b4ca87b602ff8536bc5fd5b5b595 |
|
17-Mar-2015 |
Lukas Slebodnik <lslebodn@redhat.com> |
Add missing new lines to debug messages
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
5dcf3ffa3aa228701a79556dc0b889dba0aac535 |
|
07-Dec-2014 |
Sumit Bose <sbose@redhat.com> |
krb5: add wrapper for krb5_kt_have_content()
krb5_kt_have_content() was introduced in MIT Kerberos 1.11. For older
platforms this patch adds sss_krb5_kt_have_content() as a wrapper.
Resolves https://fedorahosted.org/sssd/ticket/2518
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
466f5a539be1e4c6e7cfb396a2f406e1eb8c428d |
|
28-Nov-2014 |
Lukas Slebodnik <lslebodn@redhat.com> |
krb5: Check return value of sss_krb5_princ_realm
sss_krb5_princ_realm set output parameter realm to NULL and len to 0
in case of failure. Clang static analysers reported warning
"Null pointer passed as an argument to a 'nonnull' parameter"
in function match_principal. It was possible, that realm_name with value NULL
could be used in strncmp.
Reviewed-by: Pavel Reichl <preichl@redhat.com> |
2dc519ba98ca886076ba9e16b95a72732909cea1 |
|
28-Nov-2014 |
Lukas Slebodnik <lslebodn@redhat.com> |
krb5: Check return value of krb5_principal_get_realm
Function krb5_principal_get_realm can return NULL an it would
case segfault in function strlen.
Reviewed-by: Pavel Reichl <preichl@redhat.com> |
0348c74bad010d35f92400c749a7acc2fea8b2cb |
|
05-Nov-2014 |
Jakub Hrozek <jhrozek@redhat.com> |
LDAP: Move sss_krb5_verify_keytab_ex to ldap_child
The function was called from one place only, so it makes no sense to
keep it in a shared module. Moreover, the function should only be
called from code that runs as root.
Reviewed-by: Michal Židek <mzidek@redhat.com> |
5ae539828197f032d3e2ccb27e87ccf2a1d94996 |
|
29-Sep-2014 |
Stephen Gallagher <sgallagh@redhat.com> |
krb5: make get_primary() a public call
This patch changes get_primary() into sss_krb5_get_primary() so it can
be used by the AD provider to get the sAMAccountName from the hostname.
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
498a0cefea205f7783dd675aac3f8b831d3baa82 |
|
23-Apr-2014 |
Jakub Hrozek <jhrozek@redhat.com> |
KRB5: Print a verbose error message on failure reading the keytab
krb5_kt_resolve() returns 0 when a non-existent keytab is read, which
means there was no FATAL-level DEBUG message printed to the user in case
the keytab was missing completely and users had to enable more verbose
debugging to diagnose failure to start up.
This patch adds both the verbose DEBUG message as well as a syslog
message.
Reviewed-by: Michal Židek <mzidek@redhat.com> |
83bf46f4066e3d5e838a32357c201de9bd6ecdfd |
|
12-Feb-2014 |
Nikolai Kondrashov <Nikolai.Kondrashov@redhat.com> |
Update DEBUG* invocations to use new levels
Use a script to update DEBUG* macro invocations, which use literal
numbers for levels, to use bitmask macros instead:
grep -rl --include '*.[hc]' DEBUG . |
while read f; do
mv "$f"{,.orig}
perl -e 'use strict;
use File::Slurp;
my @map=qw"
SSSDBG_FATAL_FAILURE
SSSDBG_CRIT_FAILURE
SSSDBG_OP_FAILURE
SSSDBG_MINOR_FAILURE
SSSDBG_CONF_SETTINGS
SSSDBG_FUNC_DATA
SSSDBG_TRACE_FUNC
SSSDBG_TRACE_LIBS
SSSDBG_TRACE_INTERNAL
SSSDBG_TRACE_ALL
";
my $text=read_file(\*STDIN);
my $repl;
$text=~s/
^
(
.*
\b
(DEBUG|DEBUG_PAM_DATA|DEBUG_GR_MEM)
\s*
\(\s*
)(
[0-9]
)(
\s*,
)
(
\s*
)
(
.*
)
$
/
$repl = $1.$map[$3].$4.$5.$6,
length($repl) <= 80
? $repl
: $1.$map[$3].$4."\n".(" " x length($1)).$6
/xmge;
print $text;
' < "$f.orig" > "$f"
rm "$f.orig"
done
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>
Reviewed-by: Stephen Gallagher <sgallagh@redhat.com>
Reviewed-by: Simo Sorce <simo@redhat.com> |
a3c8390d19593b1e5277d95bfb4ab206d4785150 |
|
12-Feb-2014 |
Nikolai Kondrashov <Nikolai.Kondrashov@redhat.com> |
Make DEBUG macro invocations variadic
Use a script to update DEBUG macro invocations to use it as a variadic
macro, supplying format string and its arguments directly, instead of
wrapping them in parens.
This script was used to update the code:
grep -rwl --include '*.[hc]' DEBUG . |
while read f; do
mv "$f"{,.orig}
perl -e \
'use strict;
use File::Slurp;
my $text=read_file(\*STDIN);
$text=~s#(\bDEBUG\s*\([^(]+)\((.*?)\)\s*\)\s*;#$1$2);#gs;
print $text;' < "$f.orig" > "$f"
rm "$f.orig"
done
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>
Reviewed-by: Stephen Gallagher <sgallagh@redhat.com>
Reviewed-by: Simo Sorce <simo@redhat.com> |
9318c99b485015a9e3774b9414f3a559a4bb721a |
|
09-Dec-2013 |
Jakub Hrozek <jhrozek@redhat.com> |
Fix a trivial typo |
077fa994f62641a13665b6a07d38b3d5a903dcdc |
|
09-Sep-2013 |
Simo Sorce <simo@redhat.com> |
krb5: Remove unused helper functions
these functions are not needed anymore.
Related:
https://fedorahosted.org/sssd/ticket/2061 |
0dbcc64a5cee58d5fffaaef923302d9c7a951a7d |
|
09-Sep-2013 |
Simo Sorce <simo@redhat.com> |
krb5: Remove unused function
Related:
https://fedorahosted.org/sssd/ticket/2061 |
c121e65ed592bf3611053ee38032fd33c8d1b285 |
|
09-Sep-2013 |
Simo Sorce <simo@redhat.com> |
krb5: Make check_for_valid_tgt() static
check_for_valid_tgt() is used exclusively in krb5_uitls.c so move it there.
Resolves:
https://fedorahosted.org/sssd/ticket/2061 |
aeb1e654c337037b6bdb350e1ec8aaa065e86794 |
|
27-Aug-2013 |
Stephen Gallagher <sgallagh@redhat.com> |
KRB5: Add support for KEYRING cache type
https://fedorahosted.org/sssd/ticket/2036 |
d9816ac73176ee1f4d9c1fbf4861918d01dda798 |
|
27-Aug-2013 |
Stephen Gallagher <sgallagh@redhat.com> |
KRB5: Add low-level debugging to sss_get_ccache_name_for_principal |
e0b89ca1cc4160f5a9beb15c39dd685edb6021cd |
|
22-Aug-2013 |
Lukas Slebodnik <lslebodn@redhat.com> |
Fix memory leak insss_krb5_get_error_message
warning reported by cppcheck |
8340ca480e0fe823441633720d67efc9e4a4bc64 |
|
22-Aug-2013 |
Stephen Gallagher <sgallagh@redhat.com> |
KRB5: Add new #define for collection cache types
Kerberos now supports multiple types of collection caches, not just
DIR: caches. We should add a macro for generic collection behavior
and use that where appropriate. |
b4486ce81fefae716549959eaa82612dac63cbe5 |
|
19-Jul-2013 |
Lukas Slebodnik <lslebodn@redhat.com> |
Add mising argument required by format string |
dbf4dd47aa7f314a6a6bb2c8f9bb4ddd09de9e8b |
|
15-Jul-2013 |
Lukas Slebodnik <lslebodn@redhat.com> |
Use conditional build for retrieving ccache.
Some krb5 functions needn't be available for retrieving ccache
with principal. Therefore ifdef is used to solve this situation with older
version of libkrb5. There were two functions with similar functionality
in krb5_child and krb5_utils. They were merged to one universal function, which
was moved to file src/util/sss_krb5.c |
58dd26b1c5b60ee992dd5d1214bb168aebb42d54 |
|
27-Jun-2013 |
Jakub Hrozek <jhrozek@redhat.com> |
AD: Write out domain-realm mappings
This patch reuses the code from IPA provider to make sure that
domain-realm mappings are written even for AD sub domains. |
d413dd5d7d4affeae9fe4dfd2de4b2296ecaffcc |
|
26-Jun-2013 |
Lukas Slebodnik <lslebodn@redhat.com> |
Fix wrong detection of krb5 ccname
DIR:/run/user/1000/krb5cc is valid ccname, but function sss_krb5_cc_file_path
returned NULL in this case. |
03713859dffacc7142393e53c73d8d4cf7dee8d5 |
|
16-Jun-2013 |
Pavel Březina <pbrezina@redhat.com> |
subdomains: touch krb5.conf when creating new domain-realm mappings
https://fedorahosted.org/sssd/ticket/1815 |
edaa983d094c239c3e1ba667bcd20ed3934be3b8 |
|
22-Apr-2013 |
Sumit Bose <sbose@redhat.com> |
Allow usage of enterprise principals
Enterprise principals are currently most useful for the AD provider and
hence enabled here by default while for the other Kerberos based
authentication providers they are disabled by default.
If additional UPN suffixes are configured for the AD domain the user
principal stored in the AD LDAP server might not contain the real
Kerberos realm of the AD domain but one of the additional suffixes which
might be completely randomly chooses, e.g. are not related to any
existing DNS domain. This make it hard for a client to figure out the
right KDC to send requests to.
To get around this enterprise principals (see
http://tools.ietf.org/html/rfc6806 for details) were introduced.
Basically a default realm is added to the principal so that the Kerberos
client libraries at least know where to send the request to. It is not
in the responsibility of the KDC to either handle the request itself,
return a client referral if he thinks a different KDC can handle the
request or return and error. This feature is also use to allow
authentication in AD environments with cross forest trusts.
Fixes https://fedorahosted.org/sssd/ticket/1842 |
4e78fab6a1b2e9653a7959cbdb7d54bb750041d0 |
|
11-Feb-2013 |
Jakub Hrozek <jhrozek@redhat.com> |
krb5: include backwards compatible declaration of krb5_trace_info
krb5-1.10 used to include "struct krb5_trace_info", now krb5-1.11
includes a "krb5_trace_info" typedefed from "struct _krb5_trace_info".
Do the same in the SSSD to allow compiling with both 1.10 and 1.11. |
399518984f37bd67d2d547de66efb875bc21ccbc |
|
07-Jan-2013 |
Jakub Hrozek <jhrozek@redhat.com> |
Search for SHORTNAME$@REALM instead of fqdn$@REALM by default
The search was intended for the AD provider mostly, but keytabs coming
from AD via samba don't contain fqdn$@REALM but rather uppercased
SHORTNAME$@REALM
https://fedorahosted.org/sssd/ticket/1740 |
4ee7f390af4193656c1e6ba45c9c3c14dd64a8a9 |
|
18-Dec-2012 |
Sumit Bose <sbose@redhat.com> |
select_principal_from_keytab() do wildcard lookups after specific ones
Currently the wildcard lookup '*$' is done before the one for
host/our.hostname@REALM. This means we would ignore a more specific
match in favour of an unspecific match with a principal which is only
used in a AD environment.
I think this is wrong an wildcards should only be used is all specific
lookups fail. |
f2999e1d624d45e0142f39317461a6a1c996efb2 |
|
18-Dec-2012 |
Sumit Bose <sbose@redhat.com> |
select_principal_from_keytab() look for plain input as well
Currently in select_principal_from_keytab() all kind of different
versions of the host principal are looked up in the keytab except for
the plain name the ldap_sasl_authid option. With this patch the plain
name is looked up first. |
0f76569b4cecc048974e837c92d4ca806ca3bbac |
|
12-Nov-2012 |
Jakub Hrozek <jhrozek@redhat.com> |
Only build extract_and_send_pac on platforms that support it |
7219ef88751bb05edd77629b8068330bb6d9b117 |
|
26-Oct-2012 |
Sumit Bose <sbose@redhat.com> |
Add replacement for krb5_find_authdata()
krb5_find_authdata() is only available in MIT Kerberos 1.10 or higher.
To allow sssd to be compiled on platform with lower version of MIT
Kerberos a replacement call is added. Please note that on those
platform the replacement call will only return an error. If the
krb5_find_authdata functionality is really needed on those platform it
must be implemented by a different patch. |
c5e4d4e9a3f6896f0f3c631ea26bb49a79b5cd8e |
|
12-Oct-2012 |
Jakub Hrozek <jhrozek@redhat.com> |
Only call krb5_set_trace_callback on platforms that support it |
e7a24374d97e1d1c32d3e18561a20e8c5e6319ec |
|
12-Oct-2012 |
Jakub Hrozek <jhrozek@redhat.com> |
Collect krb5 trace on high debug levels
If the debug level contains SSSDBG_TRACE_ALL, then the logs would also
include tracing information from libkrb5.
https://fedorahosted.org/sssd/ticket/1539 |
798a227df11f49147fa43e515910ec11e21e0caa |
|
02-Oct-2012 |
Pavel Březina <pbrezina@redhat.com> |
remove left over principal selection
https://fedorahosted.org/sssd/ticket/1303
Domain start up was taking too long when there are many principals
in a kerberos keytab. We were looking up in the keytab two times.
The first time we try to select a proper principal and remember it.
The second call happens almost right after the first one and
it is just a check if the principal exists in the keytab, without
any output information other than success/failure. It is
probably a left over from https://fedorahosted.org/sssd/ticket/781.
This patch removes the second call. |
84a4e4533b3af5b170e19827f428b7df76b69d71 |
|
09-Jul-2012 |
Stephen Gallagher <sgallagh@redhat.com> |
Check for errors from krb5_unparse_name
Coverity #12781 |
aa2c6f469414668e56aa03d5ba5cecde64bc713e |
|
06-Jul-2012 |
Stef Walter <stefw@gnome.org> |
Revert commit 4c157ecedd52602f75574605ef48d0c48e9bfbe8
* This broke corner cases when used with
default_tkt_types = des-cbc-crc
and DES enabled on an AD domain.
* This is fixed in kerberos instead, in a more correct way
and in a way which we cannot replicate. |
6ca87e797982061576885f944e2ccfaba9573897 |
|
15-Jun-2012 |
Stephen Gallagher <sgallagh@redhat.com> |
KRB5: Auto-detect DIR cache support in configure
We can't support the DIR cache features in systems with kerberos
libraries older than 1.10. Make sure we don't build it on those
systems. |
9a3ba9ca00e73adc3fb17ce8afa532076768023b |
|
14-Jun-2012 |
Jakub Hrozek <jhrozek@redhat.com> |
Add support for storing credential caches in the DIR: back end
https://fedorahosted.org/sssd/ticket/974 |
f674270b1068e4ad51c80dcd528ae996a4fe99ef |
|
14-Jun-2012 |
Jakub Hrozek <jhrozek@redhat.com> |
Residual util functions
Kerberos credential caches can be specified by TYPE:RESIDUAL. This patch
adds a couple of utilities to support parsing if ccache locations,
checking types etc. |
a3dd0afecaf1c197ac06e1da5cf59ad985c7abe9 |
|
22-May-2012 |
Stephen Gallagher <sgallagh@redhat.com> |
KRB5: Avoid NULL-dereference with empty keytab
https://fedorahosted.org/sssd/ticket/1330 |
4c157ecedd52602f75574605ef48d0c48e9bfbe8 |
|
07-May-2012 |
Stef Walter <stefw@gnome.org> |
Limit krb5_get_init_creds_keytab() to etypes in keytab
* Load the enctypes for the keys in the keytab and pass
them to krb5_get_init_creds_keytab().
* This fixes the problem where the server offers a enctype
that krb5 supports, but we don't have a key for in the keytab.
https://bugzilla.redhat.com/show_bug.cgi?id=811375 |
5b1a798a2a792c74e5f11f744f4f5b663c8b93c3 |
|
07-May-2012 |
Stef Walter <stefw@gnome.org> |
Remove erroneous failure message in find_principal_in_keytab
* When it's actually a failure, then the callers will print
a message. Fine tune this. |
c87a579a23b27e65ae956bc42cf0a247f2ca0baf |
|
06-Apr-2012 |
Stephen Gallagher <sgallagh@redhat.com> |
Clean up log messages about keytab_name
There were many places where we were printing (null) to the logs
because a NULL keytab name tells libkrb5 to use its configured
default instead of a particular path. This patch should clean up
all uses of this to print "default" in the logs.
https://fedorahosted.org/sssd/ticket/1288 |
fcbaf4c73d3af215492f0907a6a3a46602a0e753 |
|
29-Mar-2012 |
Jakub Hrozek <jhrozek@redhat.com> |
Fix off-by-one error in principal selection
https://fedorahosted.org/sssd/ticket/1269 |
40d4e954b09e6f08f101acf3d03937d2bd7d847e |
|
27-Mar-2012 |
Sumit Bose <sbose@redhat.com> |
Always initialize the returned data in sss_krb5_princ_realm() |
ef479645b5e038a0e06d7d10b3c924227deafa52 |
|
17-Jan-2012 |
Stephen Gallagher <sgallagh@redhat.com> |
Raise the debug level of two very noisy statements |
768591607fc89d3a14fa00c9c8f78e83f3f6b565 |
|
22-Dec-2011 |
Stephen Gallagher <sgallagh@redhat.com> |
Add compatibility layer for Heimdal Kerberos implementation |
20c187339201a95558a9b237af37b461665d9340 |
|
02-Nov-2011 |
Jan Zeleny <jzeleny@redhat.com> |
Add wrapper for krb5_get_init_creds_opt_set_canonicalize |
13521d724231f12924dd996d81c157f328ceca17 |
|
16-May-2011 |
Jan Zeleny <jzeleny@redhat.com> |
Fixed unitialized pointer in select_principal_from_keytab
https://fedorahosted.org/sssd/ticket/857 |
6e32020ba248511f4adb5ce89156d576a329d6ad |
|
16-May-2011 |
Jan Zeleny <jzeleny@redhat.com> |
Fixed unitialized return value in match_principal
https://fedorahosted.org/sssd/ticket/858 |
628187049e815ee54637398c8011883d762c8a64 |
|
05-May-2011 |
Jan Zeleny <jzeleny@redhat.com> |
Added some kerberos functions for building on RHEL5 |
e81a816cddab4a62f263d1a0274d5d3f101e8e0f |
|
25-Apr-2011 |
Jan Zeleny <jzeleny@redhat.com> |
Modify principal selection for keytab authentication
Currently we construct the principal as host/fqdn@REALM. The problem
with this is that this principal doesn't have to be in the keytab. In
that case the provider fails to start. It is better to scan the keytab
and find the most suitable principal to use. Only in case no suitable
principal is found the backend should fail to start.
The second issue solved by this patch is that the realm we are
authenticating the machine to can be in general different from the realm
our users are part of (in case of cross Kerberos trust).
The patch adds new configuration option SDAP_SASL_REALM.
https://fedorahosted.org/sssd/ticket/781 |
cfd79b92d3813ed53ef51ae2cf93be6287e73a27 |
|
25-Apr-2011 |
Jan Zeleny <jzeleny@redhat.com> |
Extend and move function for finding principal in keytab
The function now supports finding principal in keytab not only based on
realm, but based on both realm and primary/instance parts. The function
also supports * wildcard at the beginning or at the end of primary
principal part. The function for finding principal has been moved to
util/sss_krb5.c, so it can be used in other parts of the code. |
7215ce30acdc19e95e31d83518a20f75eec74112 |
|
17-Dec-2010 |
Stephen Gallagher <sgallagh@redhat.com> |
Fix unchecked return value in sss_krb5_verify_keytab_ex
https://fedorahosted.org/sssd/ticket/711 |
5843ad321944a028f6dee7e1fd4f9381c4953d07 |
|
07-Dec-2010 |
Sumit Bose <sbose@redhat.com> |
Add support for FAST in krb5 provider |
c7bca19b94bd48d0088e5a8002946b345b6adcc1 |
|
18-Nov-2010 |
Sumit Bose <sbose@redhat.com> |
Add missing error code |
047332ebbe8397a70c92e5e3a5fbd40a9d00d0b5 |
|
23-Sep-2010 |
Sumit Bose <sbose@redhat.com> |
Use new MIT krb5 API for better password expiration warnings |
2f4e8fbdf1d4ba1e00fcab93af91fe4f4f40250d |
|
03-Aug-2010 |
Jakub Hrozek <jhrozek@redhat.com> |
Validate keytab at startup
In addition to validating the keytab everytime a TGT is requested, we
also validate the keytab on back end startup to give early warning that
the keytab is not usable.
Fixes: #556 |
1c48b5a62f73234ed26bb20f0ab345ab61cda0ab |
|
18-Feb-2010 |
Stephen Gallagher <sgallagh@redhat.com> |
Rename server/ directory to src/
Also update BUILD.txt |