b9941359b3181c42f415530d5ccad0f4664d85fa |
|
21-Sep-2016 |
Lukas Slebodnik <lslebodn@redhat.com> |
Remove double semicolon at the end of line
Reviewed-by: Pavel Březina <pbrezina@redhat.com> |
b1a8b4a1291529367b46c79eb02448eced3bf8d2 |
|
11-Aug-2016 |
Michal Židek <mzidek@redhat.com> |
gpo: gPCMachineExtensionNames with just whitespaces
Resolves:
https://fedorahosted.org/sssd/ticket/3114
We failed GPO procesing if the gPCMachineExtensionNames
attribute contained just whitespaces. This coused
failures in some server settings.
Comment from Alexander Bokovoy quoting:
You should use MS-GPOL spec. 2.2.4 'GPO Search' section says that when
processing gPCMachineExtensionNames, "Group Policy processing terminates
at the first <CSE GUIDn> out of sequence."
Since ' ' (space only) does not fall into defined syntax for
gPCMachineExtensionNames, this Group Policy processing is stopped and
its CSE GUIDs are set to 'empty list'.
Because of the 3.2.5.1.10 'Extension Protocol Sequences' language
------------------------------------------------------------------------
The Group Policy client MUST evaluate the subset of the abstract element
Filtered GPO list separately for each Group Policy extension by
including in the subset only those GPOs whose gPCUserExtensionNames (for
user policy mode) or gPCMachineExtensionNames (for computer policy mode)
attributes contain CSE GUID that correspond to the Group Policy
extension. If the CSE GUID corresponding to the Group Policy extension
is present in Extension List, it is invoked using the
Implementation Identifier field. Applicability is determined as
specified in section 3.2.1.5. The Group Policy Registry Extension MUST
always execute first. All other applicable Group Policy extensions in
the Extension List MUST be loaded and executed in Extension List order.
A failure in any Group Policy extension sequence MUST NOT affect the
execution of other Group Policy extensions.
-------------------------------------------------------------------------
I think we can practically treat wrong content of
gPCMachineExtensionNames (and gPCUserExtensionNames) as inability of the
GPO to pass through the Filtered GPO list. Thus, the GPO would be
ignored.
Reviewed-by: Alexander Bokovoy <abokovoy@redhat.com>
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
44656ce260030556820c4b6be519e66ffdacb408 |
|
25-Jul-2016 |
Sumit Bose <sbose@redhat.com> |
AD: netlogon_get_domain_info() allow missing arguments and empty results
netlogon_get_domain_info() should not fail if not all parameters can be
retrieved. It should be the responsibility of the caller to see if the
needed data is available and act accordingly.
Resolves:
https://fedorahosted.org/sssd/ticket/3104
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
21a28c92d56a0fa3b62a951eb64bf0c48034fe5e |
|
22-Jun-2016 |
Michal Židek <mzidek@redhat.com> |
GPO: ignore non-KVP lines if possible
Ticket:
https://fedorahosted.org/sssd/ticket/2751
Non-KVP break GPO processing. They are
used for values we are not interested in
so it is safe to ignore them.
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
cc2d77d5218c188119fa954c856e858cbde76947 |
|
20-Jun-2016 |
Pavel Březina <pbrezina@redhat.com> |
Rename dp_backend.h to backend.h
Reviewed-by: Sumit Bose <sbose@redhat.com>
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
5597f6eb3674c084ae5a089194d84c8604696a1f |
|
03-Jun-2016 |
Stephen Gallagher <sgallagh@redhat.com> |
GPO: Add "polkit-1" to ad_gpo_map_allow
Polkit is an authorization mechanism of its own (similar to sudo).
SSSD doesn't need to apply additional authorization decisions atop
it, so we'll just accept it as "allow".
Resolves:
https://bugs.launchpad.net/ubuntu/+source/sssd/+bug/1578415
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
45e11be651dbd3855a35de4abd2922e5b9d4b963 |
|
31-May-2016 |
Jakub Hrozek <jhrozek@redhat.com> |
Do not leak fds in case of failures setting up a child process
Resolves:
https://fedorahosted.org/sssd/ticket/3006
The handling of open pipes in failure cases was suboptimal. Moreover,
the faulty logic was copied all over the place. This patch introduces
helper macros to:
- initialize the pipe endpoints to -1
- close an open pipe fd and set it to -1 afterwards
- close both ends unless already closed
These macros are used in the child handling code.
The patch also uses child_io_destructor in the p11_child code for safer
fd handling.
Reviewed-by: Petr Cech <pcech@redhat.com> |
de8815aba87d08b6b7ac5d502dcb1755787e0857 |
|
19-May-2016 |
Jakub Hrozek <jhrozek@redhat.com> |
UTIL: exit() the forked process if exec()-ing a child process fails
When exec() fails, we should not attempt to continue, but just kill the
forked process. The patch adds this logic to the exec_child() and
exec_child_ex() functions to avoid code duplication
Resolves:
https://fedorahosted.org/sssd/ticket/3016
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
89376da80b2250b82d256ea85ec349ce29fe5b51 |
|
06-May-2016 |
Stephen Gallagher <sgallagh@redhat.com> |
GPO: Add "unity" to ad_gpo_map_interactive
Ubuntu systems use "unity" as their screen-locker. Without this in the
defaults, people often get locked out of their machines when the screen
locks.
Resolves:
https://bugs.launchpad.net/ubuntu/+source/sssd/+bug/1578415
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
bdd533146cb2da71b7c39ad0efa2e5baca7257eb |
|
12-Apr-2016 |
Lukas Slebodnik <lslebodn@redhat.com> |
GPO: Process GPOS in offline mode if ldap search failed
Initgroup requests use global catalog for LDAP queries.
Only port for global catalog is marked as offline
if request fails due to problems with connection.
However, GPO code uses standard LDAP port for
retrieving of target DNs and other information.
Previously, GPOs were processed in offline mode only
if there were issues with connection to AD server.
But connection can be cached and ldap search can still fail.
Resolves:
https://fedorahosted.org/sssd/ticket/2964
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
dad416a9b0095e1c423b7da65db7c636fa69e614 |
|
23-Mar-2016 |
Michal Židek <mzidek@redhat.com> |
GPO: log specific ini parse error messages
We should log error messages generated by
libini if there are problems with parsing
gpo files.
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
293cf52a00c9c67f0ad8f264027f81c020854f66 |
|
29-Feb-2016 |
Stephen Gallagher <sgallagh@redhat.com> |
GPO: Add other display managers to interactive logon
Gone are the days when all systems used GDM or KDM. We need to support
other display managers in the default configuration to avoid issues
when enrolled in AD domains.
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
0e799bc491f636c69657d1678af13d23bf7b7c10 |
|
29-Feb-2016 |
Stephen Gallagher <sgallagh@redhat.com> |
GPO: Add Cockpit to the Remote Interactive defaults
The Cockpit Project is an administrative console that is gaining in
popularity and is a default component on some operating systems (such
as Fedora Server). Since it is becoming more common, we should ensure
that it is part of the standard mapping.
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
9dcc7dbf04466cd8cd90aa0bb8acbebef9aca832 |
|
19-Jan-2016 |
Sumit Bose <sbose@redhat.com> |
UTIL: allow to skip default options for child processes
Currently the SSSD default options like e.g. --debug-level are added
unconditionally to the command line options of a child process when
started with the child helper functions.
If a binary from a different source should be started as a child by SSSD
those options might not be known or used differently. This patch adds an
option to exec_child_ex() which allows to skip the default options and
only add specific options.
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
de1131abe5ba7aaeb59f81fc3a9cd2a71c0b52dd |
|
14-Dec-2015 |
Lukas Slebodnik <lslebodn@redhat.com> |
DEBUG: Add missing new lines
Reviewed-by: Petr Cech <pcech@redhat.com> |
5c129880ae10c80b4f79cb2994e9d127dc6dfbef |
|
26-Nov-2015 |
Mathieu Deaudelin-Lemay <contrib@mdeaudelin.net> |
Changes to allow SSSD to be used for access control with a machine account belonging to a domain controller.
Resolves:
https://fedorahosted.org/sssd/ticket/2870
Reviewed-by: Sumit Bose <sbose@redhat.com> |
560b624b34895df55bf489a1d53380c6c8c82e03 |
|
14-Sep-2015 |
Sumit Bose <sbose@redhat.com> |
GPO: use SDAP_SASL_AUTHID as samAccountName
The samAccountName for AD hosts is the hosts NetBIOS name with a
trailing $. Since there is a size limit on NetBIOS names long DNS names
must be truncated to find a matching entry in the AD LDAP tree.
The NetBIOS name is already needed during kinit/SASL bind where the
SDAP_SASL_AUTHID config option is used. Since the GPO lookup code is
only reached after the SASL bind was successful we can safely assume
that the name is correct and use it for the GPO lookup.
Resolves https://fedorahosted.org/sssd/ticket/2692
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
5dbdcc2c7210a0e3eb60ad1e85ba33f27d7faeda |
|
07-Sep-2015 |
Pavel Reichl <preichl@redhat.com> |
GPO: fix memory leak
Resolves:
https://fedorahosted.org/sssd/ticket/2777
Reviewed-by: Michal Židek <mzidek@redhat.com> |
7c18b65dbdeb584a946c055f2db3814544b17232 |
|
26-Jul-2015 |
Stephen Gallagher <sgallagh@redhat.com> |
AD: Handle cases where no GPOs apply
It is possible to have a machine where none of the GPOs associated with
it include access-control rules. Currently, this results in a
denial-by-system-error.
We need to treat this case as allowing the user (see the test cases in
https://fedorahosted.org/sssd/wiki/DesignDocs/ActiveDirectoryGPOIntegration
We also need to delete the result object from the cache to ensure that
offline operation will also grant access.
Resolves:
https://fedorahosted.org/sssd/ticket/2713
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
b08b6a994dcca108bb571458da092e0e320ce9c2 |
|
23-Jun-2015 |
Stephen Gallagher <sgallagh@redhat.com> |
GPO: Fix incorrect strerror on GPO access denial
We're attempting to use strerror() to print the result from
ad_gpo_access_check(), but that function returns an extended SSSD errno
Signed-off-by: Lukas Slebodnik <lslebodn@redhat.com>
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com>
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
31bafc0d6384a30859aa18f3bd22275aec6ee2ed |
|
28-May-2015 |
Stephen Gallagher <sgallagh@redhat.com> |
AD GPO: Support processing referrals
For GPOs assigned to a site, it's possible that their definition
actually exists in another domain. To retrieve this information,
we need to follow the referral and perform a base search on
another domain controller.
Resolves:
https://fedorahosted.org/sssd/ticket/2645
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
03e5f1528184a558fd990e66f083157b404dce08 |
|
30-Apr-2015 |
Lukas Slebodnik <lslebodn@redhat.com> |
GPO: Do not ignore missing attrs for GPOs
We don't want to skip over a GPO that might properly be denying
users.
[sssd[be[a.foo.com]]] [sdap_sd_search_send] (0x0400):
Searching entry [cn={2BA15B73-9524-419F-B4B7-185E1F0D3DCF},cn=policies,cn=system,DC=foo,DC=com] using SD
[sssd[be[a.foo.com]]] [sdap_get_generic_ext_step] (0x0400):
calling ldap_search_ext with [(objectclass=*)][cn={2BA15B73-9524-419F-B4B7-185E1F0D3DCF},cn=policies,cn=system,DC=lzb,DC=hq].
[sssd[be[a.foo.com]]] [sdap_process_message] (0x4000):
Message type: [LDAP_RES_SEARCH_RESULT]
[sssd[be[a.foo.com]]] [sdap_get_generic_op_finished] (0x0400):
Search result: Referral(10), 0000202B: RefErr: DSID-0310063C, data 0, 1 access points
ref 1: 'lzb.hq'
[sssd[be[a.foo.com]]] [sdap_get_generic_op_finished] (0x1000):
Ref: ldap://foo.com/cn=%7B2BA15B73-9524-419F-B4B7-185E1F0D3DCF%7D,cn=policies,cn=system,DC=foo,DC=com
[sssd[be[a.foo.com]]] [ad_gpo_get_gpo_attrs_done] (0x0040):
no attrs found for GPO; try next GPO.
Resolves:
https://fedorahosted.org/sssd/ticket/2629
Reviewed-by: Stephen Gallagher <sgallagh@redhat.com> |
475d986b534c5e0dfdb8e2348ab89b13fd4874aa |
|
15-Apr-2015 |
Stephen Gallagher <sgallagh@redhat.com> |
AD GPO: Always look up GPOs from machine domain
When dealing with users from a child domain, SSSD was attempting to use
the subdomain for lookups. However, all GPOs applicable to this machine
are stored in the primary domain (the domain the host directly joined).
This patch has the GPO processing use the primary domain instead of the
user domain.
Resolves:
https://fedorahosted.org/sssd/ticket/2606
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
d9079aa05eb8aacb488992fdce328c1abadd08d8 |
|
15-Apr-2015 |
Stephen Gallagher <sgallagh@redhat.com> |
AD: Clean up ad_access_gpo
Align goto usage with conventions in the rest of the source.
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
818c55be478ca2539a86567280114e823d79a51f |
|
01-Apr-2015 |
Lukas Slebodnik <lslebodn@redhat.com> |
GPO: Check return value of ad_gpo_store_policy_settings
Reviewed-by: Pavel Reichl <preichl@redhat.com> |
4cfab2330323834574c179f774a0c6b1fff4936e |
|
23-Mar-2015 |
Sumit Bose <sbose@redhat.com> |
GPO: error out instead of leaving array element uninitialized
In general every object created by the AD provider should have a SID
attribute. Since SIDs and GPOs are used for access control a missing SID
should be treated as error for now until it is known if there is a valid
reason why the SID is missing.
Resolves https://fedorahosted.org/sssd/ticket/2608
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
b49c6abe12721ee8442be1c1bd6c15443b518ca2 |
|
15-Jan-2015 |
Pavel Reichl <preichl@redhat.com> |
GPO: add systemd-user to gpo default permit list
Resolves:
https://fedorahosted.org/sssd/ticket/2556
Reviewed-by: Stephen Gallagher <sgallagh@redhat.com> |
f3d91181d4ee9da3f8bbf4ddf8782951c0ae46c1 |
|
15-Jan-2015 |
Jakub Hrozek <jhrozek@redhat.com> |
UTIL: Unify the fd_nonblocking implementation
The responder and child_common modules each had their own
implementation. Unify it instead and add a unit test.
Reviewed-by: Pavel Březina <pbrezina@redhat.com> |
ccff8e75940963a0f68f86efcddc37133318abfa |
|
13-Jan-2015 |
Jakub Hrozek <jhrozek@redhat.com> |
GPO: Extract server hostname after connecting
https://fedorahosted.org/sssd/ticket/2543
The LDAP URI is not valid prior to connecting to LDAP. Moreover,
reconnecting to a different server might invalidate the URI.
Move reading the URI after the connection has been established.
Reviewed-by: Sumit Bose <sbose@redhat.com> |
f00a61b6079d8de81432077a59daf015d85800d2 |
|
13-Jan-2015 |
Jakub Hrozek <jhrozek@redhat.com> |
GPO: Don't use stdout for output in gpo_child
Resolves:
https://fedorahosted.org/sssd/ticket/2544
Use a dedicated fd instead to work around
https://bugzilla.samba.org/show_bug.cgi?id=11036
Reviewed-by: Sumit Bose <sbose@redhat.com> |
16cb0969f0a9ea71524d852077d6a480740d4f12 |
|
13-Jan-2015 |
Jakub Hrozek <jhrozek@redhat.com> |
UTIL: Allow dup-ing child pipe to a different FD
Related to:
https://fedorahosted.org/sssd/ticket/2544
Adds a new function exec_child_ex and moves setting the extra_argv[]
to exec_child_ex() along with specifying the input and output fds.
Reviewed-by: Sumit Bose <sbose@redhat.com> |
fc2cc91a5b645180e53d46436b0d08011aac8d74 |
|
08-Jan-2015 |
Jakub Hrozek <jhrozek@redhat.com> |
GPO: Ignore ENOENT result from sysdb_gpo_get_gpo_result_setting()
https://fedorahosted.org/sssd/ticket/2542
If the GPO result object was missing completely, we would error out with
a fatal error code. It's more user-friendly to treat the missing object
as if the requested attribute was missing on the provider level.
Reviewed-by: Pavel Reichl <preichl@redhat.com> |
b4f87b42b18888c396e44e7359f7aafb092221bf |
|
03-Dec-2014 |
Jakub Hrozek <jhrozek@redhat.com> |
Add extra_args to exec_child()
Related:
https://fedorahosted.org/sssd/ticket/2503
Currently all child processes use the same arguments, the construction
of argv[] is even hardcoded in exec_child(). Add an extra_args[] array
that extends the common set of argvs so that we can have child-specific
arguments. Also adds a unit test.
Reviewed-by: Sumit Bose <sbose@redhat.com> |
77b13371c87702aee3f858f6b2b73826cf5a01bd |
|
05-Nov-2014 |
Jakub Hrozek <jhrozek@redhat.com> |
UTIL: Remove more code duplication setting up child processes
All our child processes duplicated the same code that set up the
debugging all around. Instead of adding yet another copy for the
selinux_child, add a common utility function.
Reviewed-by: Michal Židek <mzidek@redhat.com> |
06f10b2a0ebb26f2460cd445f8040e9205de7500 |
|
05-Nov-2014 |
Jakub Hrozek <jhrozek@redhat.com> |
UTIL: Remove code duplication of struct io
We had struct io and the associated destructor copied twice in the code
already and need it again in the SELinux provider. Instead of adding
another copy, move the code to a shared subtree under util/
Reviewed-by: Michal Židek <mzidek@redhat.com> |
d3e69c059cb11c735d115a3914dad46806ff46fb |
|
22-Oct-2014 |
Jakub Hrozek <jhrozek@redhat.com> |
GPO: Terminate request on error
Reviewed-by: Pavel Reichl <preichl@redhat.com> |
76ba5d2b8d95ec444c124dd9a44275ce685fb648 |
|
13-Oct-2014 |
Lukas Slebodnik <lslebodn@redhat.com> |
GPO: Do not use output argument if function failed
deny_size and allow_size were initialized in function
parse_policy_setting_value (output argument).
If function parse_policy_setting_value fails then output arguments
will not initialized and will be used uninitialized in debug macro.
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
dd09bbb2578bd9f82afd7fc4d4fcc3a5659731d3 |
|
13-Oct-2014 |
Lukas Slebodnik <lslebodn@redhat.com> |
GPO: Fail if we cannot retrieve gpo from cache.
The variable value could be used uninitialized.
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
b083fec6c175989e0d32b83d8cc857a6b54d26a2 |
|
13-Oct-2014 |
Lukas Slebodnik <lslebodn@redhat.com> |
GPO: fail if there is problem with storing gpo into sysdb
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
0bed97f6ca4ad8bb61de9114c23051e7eaa8d1fc |
|
03-Oct-2014 |
Lukas Slebodnik <lslebodn@redhat.com> |
GPO: remove unused talloc contexts
Talloc context was not used in functions ad_gpo_parse_gpo_child_response
ad_gpo_process_cse_recv, ad_gpo_store_policy_settings.
Reviewed-by: Stephen Gallagher <sgallagh@redhat.com> |
4611802d41d8954a3040f39403590adb920ca521 |
|
02-Oct-2014 |
Yassir Elley <yelley@redhat.com> |
AD-GPO resolve conflicting policy settings correctly
Resolves:
https://fedorahosted.org/sssd/ticket/2437
Reviewed-by: Stephen Gallagher <sgallagh@redhat.com> |
7f4270ee333c1128a87fce6e6a3de64d263733e1 |
|
02-Oct-2014 |
Stephen Gallagher <sgallagh@redhat.com> |
AD GPO: Fix incorrect return of EACCES
In the access providers, we expect to receive ERR_ACCESS_DENIED when
access is denied, but we were returning EACCES here. The effect was the
same, except that it presented ultimately as a system error instead of
a proper denial.
Related:
https://fedorahosted.org/sssd/ticket/2437
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
cb7644495e76ffa3e19ba10efb4a0f5f3817ba33 |
|
29-Sep-2014 |
Jakub Hrozek <jhrozek@redhat.com> |
AD: Add a missing break statement to the GPO code
Reviewed-by: Pavel Reichl <preichl@redhat.com> |
5e381cc03f6e1cd15686bc5a0c8ea1c28723fd5c |
|
29-Sep-2014 |
Stephen Gallagher <sgallagh@redhat.com> |
AD GPO: Fix incorrect sAMAccountName selection
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
eb0cde4e6dfdbda08588860534f7ece5776ec3af |
|
08-Sep-2014 |
Yassir Elley <yelley@redhat.com> |
AD-GPO: delete stale GPOs
https://fedorahosted.org/sssd/ticket/2431
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
a8356a0c98ee44e7256bb1c7767159c70e1fc218 |
|
08-Sep-2014 |
Yassir Elley <yelley@redhat.com> |
AD-GPO: processing changes for gpo_map_* options
Reviewed-by: Sumit Bose <sbose@redhat.com>
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
d3c6fca0f0d3b1c5d3dda3dcf3de0ae3ae4c0c38 |
|
13-Aug-2014 |
Yassir Elley <yelley@redhat.com> |
AD-GPO: ad_gpo changes for offline gpo support
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
ff4b603cc14ea6ea15caaf89a03e927920124af4 |
|
31-Jul-2014 |
Yassir Elley <yelley@redhat.com> |
AD-GPO: add ad_gpo_cache_timeout option
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
b47449d8596d9573ff13e74b6984d080b414715a |
|
30-Jul-2014 |
Yassir Elley <yelley@redhat.com> |
AD-GPO: only download policy files if gpo version changes
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
1b72f6377e997bbadabad9e5e43998dddfe38156 |
|
29-Jul-2014 |
Jakub Hrozek <jhrozek@redhat.com> |
AD: Increment som_index when advancing to the next GPO
When the GPO processing tried to advance to the next GPO on encountering
an error, the som_index was not incremented, causing an infinite loop.
Reviewed-by: Yassir Elley <yelley@redhat.com> |
210bc14aac190bbb043272821aeb3342c995a4f6 |
|
29-Jul-2014 |
Jakub Hrozek <jhrozek@redhat.com> |
AD: Check return value of ad_gpo_evaluate_dacl
Reviewed-by: Pavel Reichl <preichl@redhat.com> |
32381402a4a9afc003782c9e2301fc59c9bda2a9 |
|
20-Jul-2014 |
Yassir Elley <yelley@redhat.com> |
AD-GPO: Store policy settings in local files
Reviewed-by: Sumit Bose <sbose@redhat.com> |
588f8fbe74e66cc015f185a5b798173d320a65b5 |
|
01-Jul-2014 |
Yassir Elley <yelley@redhat.com> |
AD-GPO: Add support for gpo permissive mode
Reviewed-by: Sumit Bose <sbose@redhat.com> |
d3ca320a1ddea52fe86c052dd5521b8f98bb4f9f |
|
01-Jul-2014 |
Yassir Elley <yelley@redhat.com> |
Use ldap_url_parse to extract hostname from ldap uri
Reviewed-by: Sumit Bose <sbose@redhat.com> |
19d3aba12c70528708be9440aca66038a291f29e |
|
01-Jul-2014 |
Yassir Elley <yelley@redhat.com> |
AD-GPO: Add gpo-smb implementation in gpo_child process
Reviewed-by: Sumit Bose <sbose@redhat.com> |
4e299001aff97d5aaabd7ca490cd7d3d5151823e |
|
30-May-2014 |
Yassir Elley <yelley@redhat.com> |
AD-GPO: Fix some failure modes in ad_gpo.c
Reviewed-by: Sumit Bose <sbose@redhat.com> |
28c155e20d3ebf53581821572c6c3fe1724582c9 |
|
23-May-2014 |
Yassir Elley <yelley@redhat.com> |
AD-GPO: Remove dependency on libsamba-security
Reviewed-by: Sumit Bose <sbose@redhat.com> |
60cab26b12df9a2153823972cde0c38ca86e01b9 |
|
13-May-2014 |
Yassir Elley <yelley@redhat.com> |
Implemented LDAP component of GPO-based access control
Reviewed-by: Sumit Bose <sbose@redhat.com>
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |