Update README and BUILD

Update README with information from http://www.freeipa.org/page/Leaflet
and fixed links.

Update the list of dependencies in BUILD, and link to the Testing wiki page

Reviewed-By: Martin Košek <mkosek@redhat.com>
This commit is contained in:
Petr Viktorin 2014-02-11 13:47:16 +01:00
parent bf7efaef93
commit 70a495c58b
2 changed files with 67 additions and 33 deletions

View File

@ -7,13 +7,19 @@ The quickest way to get the dependencies needed for building is:
# yum install rpm-build `grep "^BuildRequires" freeipa.spec.in | awk '{ print $2 }' | grep -v "^/"`
This is currently (01/05/11):
This is currently (2014-02-11):
yum install 389-ds-base-devel mozldap-devel svrcore-devel nspr-devel \
openssl-devel openldap-devel e2fsprogs-devel krb5-devel nss-devel \
libcap-devel python-devel autoconf automake libtool popt-devel m4 \
policycoreutils python-setuptools python-krbV xmlrpc-c-devel \
libcurl-devel gettext authconfig libuuid-devel
yum install rpm-build 389-ds-base-devel svrcore-devel policycoreutils \
systemd-units samba-devel samba-python libwbclient-devel samba4-devel \
samba4-python libtalloc-devel libtevent-devel nspr-devel nss-devel \
openssl-devel openldap-devel krb5-devel krb5-workstation libuuid-devel \
libcurl-devel xmlrpc-c-devel popt-devel autoconf automake m4 libtool gettext \
python-devel python-ldap python-setuptools python-krbV python-nss \
python-netaddr python-kerberos python-rhsm pyOpenSSL pylint python-polib \
libipa_hbac-python python-memcached sssd python-lxml python-pyasn1 \
python-qrcode python-dns m2crypto check libsss_idmap-devel \
libsss_nss_idmap-devel java-1.7.0-openjdk libverto-devel systemd \
libunistring-devel python-lesscpy
Building
--------
@ -53,8 +59,10 @@ changes are required.
Testing
-------
For more information, see http://www.freeipa.org/page/Testing
We use python nosetests to test for regressions in the management framework
and plugins. You'll need the python-nose package installed to run the tests.
and plugins. All test dependencies are required by the freeipa-tests package.
To run all of the tests you will need 2 sessions, one to run the lite-server
and the other to execute the tests. You'll also need a TGT before starting

78
README
View File

@ -1,48 +1,74 @@
IPA Server
What is it?
-----------
Overview
--------
For efficiency, compliance and risk mitigation, organizations need to
centrally manage and correlate vital security information including:
FreeIPA allows Linux administrators to centrally manage identity,
authentication and access control aspects of Linux and UNIX systems
by providing simple to install and use command line and web based
managment tools.
FreeIPA is built on top of well known Open Source components and standard
protocols with a very strong focus on ease of management and automation
of installation and configuration tasks.
FreeIPA can seamlessly integrate into an Active Directory environment via
cross-realm Kerberos trust or user synchronization.
* Identity (machine, user, virtual machines, groups, authentication
credentials)
* Policy (configuration settings, access control information)
* Audit (events, logs, analysis thereof)
Benefits
--------
Since these are not new problems. there exist many approaches and
products focused on addressing them. However, these tend to have the
following weaknesses:
FreeIPA:
* Allows all your users to access all the machines with the same credentials
and security settings
* Allows users to access personal files transparently from any machine in
an authenticated and secure way
* Uses an advanced grouping mechanism to restrict network access to services
and files only to specific users
* Allows central management of security mechanisms like passwords,
SSH Public Keys, SUDO rules, Keytabs, Access Control Rules
* Enables delegation of selected administrative tasks to other power users
* Integrates into Active Directory environments
* Focus on solving identity management across the enterprise has meant
less focus on policy and audit.
* Vendor focus on Web identity management problems has meant less well
developed solutions for central management of the Linux and Unix
world's vital security info. Organizations are forced to maintain
a hodgepodge of internal and proprietary solutions at high TCO.
* Proprietary security products don't easily provide access to the
vital security information they collect or manage. This makes it
difficult to synchronize and analyze effectively.
Components
----------
The Latest Version
------------------
The FreeIPA project provides unified installation and management
tools for the following components:
Details of the latest version can be found on the IPA server project
page under <http://www.freeipa.org/>.
* LDAP Server - based on the 389 project (LDAP)
http://directory.fedoraproject.org/wiki/Main_Page
* KDC - based on MIT Kerberos implementation
http://k5wiki.kerberos.org/wiki/Main_Page
* PKI based on Dogtag project
http://pki.fedoraproject.org/wiki/PKI_Main_Page
* Samba libraries for Active Directory integration
http://www.samba.org/
* DNS Server based on BIND and the Bind-DynDB-LDAP plugin
https://www.isc.org/software/bind
https://fedorahosted.org/bind-dyndb-ldap
Project Website
---------------
Releases, announcements and other information can be found on the IPA
server project page at <http://www.freeipa.org/>.
Documentation
-------------
The most up-to-date documentation can be found at
<http://freeipa.org/page/Documentation/>.
<http://freeipa.org/page/Documentation>.
Quick Start
-----------
To get started quickly, start here:
<https://fedorahosted.org/freeipa/wiki/QuickStartGuide>
<http://www.freeipa.org/page/Quick_Start_Guide>
Licensing
---------