mirror of
https://salsa.debian.org/freeipa-team/freeipa.git
synced 2025-01-11 00:31:56 -06:00
Documenting kinit_lifetime in /etc/ipa/default.conf
Describing the parameter kinit_lifetime that allows to limit the lifetime of ticket obtained by users authenticating to the WebGUI using login/password. Removing session_auth_duration and session_duration_type since these parameters are not relevant anymore. Resolves: https://pagure.io/freeipa/issue/7333 Reviewed-By: Florence Blanc-Renaud <flo@redhat.com>
This commit is contained in:
parent
0cab090f4d
commit
5c361f5450
@ -107,6 +107,9 @@ This is used in development and is generally a detected value. It means that the
|
||||
.B interactive <boolean>
|
||||
Specifies whether values should be prompted for or not. The default is True.
|
||||
.TP
|
||||
.B kinit_lifetime <time duration spec>
|
||||
Controls the lifetime of ticket obtained by users authenticating to the WebGUI using login/password. The expected format is a time duration string. Examples are "2 hours", "1h:30m", "10 minutes", "5min, 30sec". When the parameter is not set in default.conf, the ticket will have a duration inherited from the default value for kerberos clients, that can be set as ticket_lifetime in krb5.conf. When the ticket lifetime has expired, the ticket is not valid anymore and the GUI will prompt to re-login with a message "Your session has expired. Please re-login."
|
||||
.TP
|
||||
.B ldap_uri <URI>
|
||||
Specifies the URI of the IPA LDAP server to connect to. The URI scheme may be one of \fBldap\fR or \fBldapi\fR. The default is to use ldapi, e.g. ldapi://%2fvar%2frun%2fslapd\-EXAMPLE\-COM.socket
|
||||
.TP
|
||||
@ -157,12 +160,6 @@ Specifies the name of the CA back end to use. The current options are \fBdogtag\
|
||||
.B realm <realm>
|
||||
Specifies the Kerberos realm.
|
||||
.TP
|
||||
.B session_auth_duration <time duration spec>
|
||||
Specifies the length of time authentication credentials cached in the session are valid. After the duration expires credentials will be automatically reacquired. Examples are "2 hours", "1h:30m", "10 minutes", "5min, 30sec".
|
||||
.TP
|
||||
.B session_duration_type <inactivity_timeout|from_start>
|
||||
Specifies how the expiration of a session is computed. With \fBinactivity_timeout\fR the expiration time is advanced by the value of session_auth_duration everytime the user accesses the service. With \fBfrom_start\fR the session expiration is the start of the user's session plus the value of session_auth_duration.
|
||||
.TP
|
||||
.B server <hostname>
|
||||
Specifies the IPA Server hostname.
|
||||
.TP
|
||||
|
@ -920,7 +920,6 @@
|
||||
"container_sysaccounts" : "cn=sysaccounts,cn=etc",
|
||||
"dogtag_version" : 10,
|
||||
"container_rolegroup" : "cn=roles,cn=accounts",
|
||||
"session_duration_type" : "inactivity_timeout",
|
||||
"container_s4u2proxy" : "cn=s4u2proxy,cn=etc",
|
||||
"container_automount" : "cn=automount",
|
||||
"ca_host" : "vm.example.com",
|
||||
@ -942,7 +941,6 @@
|
||||
"enable_ra" : true,
|
||||
"container_trusts" : "cn=trusts",
|
||||
"container_policygroups" : "cn=policygroups,cn=configs,cn=policies",
|
||||
"session_auth_duration" : "20 minutes",
|
||||
"container_realm_domains" : "cn=Realm Domains,cn=ipa,cn=etc",
|
||||
"in_tree" : false,
|
||||
"realm" : "DOM.EXAMPLE.COM",
|
||||
|
@ -157,11 +157,6 @@ DEFAULT_CONFIG = (
|
||||
('webui_prod', True),
|
||||
|
||||
# Session stuff:
|
||||
|
||||
# Maximum time before a session expires forcing credentials to be reacquired.
|
||||
('session_auth_duration', '20 minutes'),
|
||||
# How a session expiration is computed, see SessionManager.set_session_expiration_time()
|
||||
('session_duration_type', 'inactivity_timeout'),
|
||||
('kinit_lifetime', None),
|
||||
|
||||
# Debugging:
|
||||
|
@ -67,8 +67,6 @@ NAMESPACE_ATTRS = ['Command', 'Object', 'Method', fake_backend, 'Updater',
|
||||
fake_api_env = {'env': [
|
||||
'host',
|
||||
'realm',
|
||||
'session_auth_duration',
|
||||
'session_duration_type',
|
||||
'kinit_lifetime',
|
||||
]}
|
||||
|
||||
|
Loading…
Reference in New Issue
Block a user