Commit Graph

426 Commits

Author SHA1 Message Date
Karl MacMillan
a174d6d6e6 Fix mode on ipa-keytab-util. 0001-01-01 00:00:00 +00:00
Karl MacMillan
61258a645c Add ipa-keytab-util to spec. 0001-01-01 00:00:00 +00:00
Karl MacMillan
edc7af1446 Add xml-rpc interface for getting keytabs.
Warning: this lacks any sort of authorization.
0001-01-01 00:00:00 +00:00
Karl MacMillan
9038bf71dd Move packages to ipa from freeipa. 0001-01-01 00:00:00 +00:00
Karl MacMillan
b202b6cc31 Bump the version numbers for release. Also remove
specific version check on freeradius. Packages aren't
available and the freeradius support isn't ready
anyway.
0001-01-01 00:00:00 +00:00
Karl MacMillan
67cddce4d4 Generate master password from Simo. 0001-01-01 00:00:00 +00:00
Karl MacMillan
7ce4df7038 Added replication.py 0001-01-01 00:00:00 +00:00
Karl MacMillan
c373ed5c5c Initial replication setup.
This add replication setup through two new commands: ipa-replica-prepare
and ipa-replica-install. The procedure is to run ipa-replica-prepare
on an existing master. This will collect information about the realm
and the current master and create a file storing all of the information.
After copying that file to the new replica, ipa-replica-install is
run (with -r to create a read-only replica).

This version of the patch also includes fixes for the sasl mappings
on the replicas.

Remaining features:
- ssl for replication.
- automatic configuration of mesh topology for
  master (or a simpler way to replicate multiple
  masters.
- tool for view / configuring current replication.
0001-01-01 00:00:00 +00:00
Simo Sorce
b456d8424a more s/unique// wrt groups members/objectclasses 2007-11-21 16:07:07 -05:00
Simo Sorce
3580d0affb Use groupOfNames and member, not groupOfUniqueNames and uniqueMember 2007-11-20 10:22:43 -05:00
Simo Sorce
bec524485a Fix subtle errors in kpasswd 2007-11-20 17:41:26 -05:00
Rob Crittenden
d3d89f754b Use same tzinfo as the time parser to avoid TypeError from being thrown 2007-11-21 00:27:50 -05:00
Rob Crittenden
bf743087d2 Fix indentation error that occured in merge 2007-11-21 00:29:03 -05:00
Rob Crittenden
f42f1f44c8 Enable group inactivation by using the Class of Service plugin.
This adds 2 new groups: activated and inactivated.

If you, or a group you are a member of, is in inactivated then you are too.

If you, or a group you are a member of, is in the activated group, then you
are too.

In a fight between activated and inactivated, activated wins.

The DNs for doing this matching is case and white space sensitive.

The goal is to never have to actually set nsAccountLock in a user directly
but move them between these groups.

We need to decide where in the CLI this will happen. Right it is split
between ipa-deluser and ipa-usermod. To inactivate groups for now just
add the group to inactivate or active.
2007-11-20 22:45:29 -05:00
Simo Sorce
56d67b86e1 Fix bad segfault when pwvals is null 2007-11-19 19:34:27 -05:00
Simo Sorce
44f9f13e17 Remove default SASL mappings if any to avoid conflicts with IPA SASL mappings 2007-11-19 19:34:10 -05:00
Simo Sorce
c6532b621d fix ldif typo 2007-11-19 19:33:36 -05:00
Karl MacMillan
6d3fa7f892 Minor fixes. 0001-01-01 00:00:00 +00:00
Karl MacMillan
164076a76e Add pyasn1 requirement to rpms. 0001-01-01 00:00:00 +00:00
Simo Sorce
a0d8d87b97 Fix installation
Add missing schema for GUI Config, and missing objectclass for cn=accounts
container
2007-11-18 15:02:26 -05:00
Simo Sorce
d5c269c8eb Merge upstream and fix bad suffix in default-aci 2007-11-18 14:27:25 -05:00
Simo Sorce
b51f4b28ec - Set correct values in ipa.conf during client install so that admin tools can
reach the xml-rpc server.
- Assume the kdc/ldap server == xml-rpc server for v1.


Initial code to read the Kerberos Master Key from the Directory
2007-11-16 20:18:36 -05:00
Simo Sorce
de5a54ef75 - Set correct values in ipa.conf during client install so that admin tools can
reach the xml-rpc server.
- Assume the kdc/ldap server == xml-rpc server for v1.


Initial code to read the Kerberos Master Key from the Directory
2007-11-16 20:18:36 -05:00
Simo Sorce
0a5a952c1b - Report correct information back to users when policies prevent a successful
password change.
- Fix some minor error

Initial code to read the Kerberos Master Key from the Directory
2007-11-16 20:17:26 -05:00
Simo Sorce
598b05569b - Report correct information back to users when policies prevent a successful
password change.
- Fix some minor error

Initial code to read the Kerberos Master Key from the Directory
2007-11-16 20:17:26 -05:00
Simo Sorce
ae97fcf94d - Store Master Key in Ldap (Makes it easier to set up replicas)
- Does not require dirsrv access to stash file
- Finalize password history support
- Fix strict password length default in pwd_extop (fix install sctript too)
- fix plugin configuration

- Introduce 3 kind of password change: normal, admin, and ds manager
   - normal require adherence to policies
   - admin does not but password is immediately expired
   - ds manager can just change the password any way he likes.

Initial code to read the Kerberos Master Key from the Directory
2007-11-16 20:16:11 -05:00
Karl MacMillan
27b93a6944 Small fix from Rob to pwd-extop-plugin 0001-01-01 00:00:00 +00:00
Simo Sorce
f35ec78d56 - Store Master Key in Ldap (Makes it easier to set up replicas)
- Does not require dirsrv access to stash file
- Finalize password history support
- Fix strict password length default in pwd_extop (fix install sctript too)
- fix plugin configuration

- Introduce 3 kind of password change: normal, admin, and ds manager
   - normal require adherence to policies
   - admin does not but password is immediately expired
   - ds manager can just change the password any way he likes.

Initial code to read the Kerberos Master Key from the Directory
2007-11-16 20:16:11 -05:00
Rob Crittenden
1967aafa39 Implement the password policy UI and finish IPA policy UI
This includes a default password policy
Custom fields are now read from LDAP. The format is a list of
  dicts with keys: label, field, required.
The LDAP-based configuration now specifies:
    ipaUserSearchFields: uid,givenName,sn,telephoneNumber,ou,title
    ipaGroupSearchFields: cn,description
    ipaSearchTimeLimit: 2
    ipaSearchRecordsLimit: 0
    ipaCustomFields:
    ipaHomesRootDir: /home
    ipaDefaultLoginShell: /bin/sh
    ipaDefaultPrimaryGroup: ipausers
    ipaMaxUsernameLength: 8
    ipaPwdExpAdvNotify: 4
This could use some optimization.
2007-11-16 12:59:32 -05:00
Rob Crittenden
0a3ed69746 Completely remove attributes when delattr argument in ipa-groupmod 2007-11-15 14:44:09 -05:00
Rob Crittenden
b01c468e8c Completely remove attributes when delattr argument 2007-11-15 14:39:54 -05:00
Rob Crittenden
49aa82e932 Use same labels as UI for ipa-finduser and ipa-findgroup
Add -a option to ipa-findgroup to print all attributes
2007-11-15 14:20:50 -05:00
Rob Crittenden
3e24df161b Replace references to Person and People with User and Users 2007-11-15 13:13:35 -05:00
Karl MacMillan
816b3e2ea5 Add memberof-task.ldif. 0001-01-01 00:00:00 +00:00
Rob Crittenden
949b4a0bf7 Check for existance of of the target file in update_file. It used to silently
fail if the file it was to update didn't exist.
2007-11-15 11:09:17 -05:00
Rob Crittenden
6f268a185c Broke invididual Requires and BuildRequires onto separate lines and
reordered them
Added python-tgexpandingformwidget as a dependency
Require at least fedora-ds-base 1.1
2007-11-15 10:57:26 -05:00
Rob Crittenden
bfcc044db2 If unable to connect to the XML-RPC server print a more useful error msg. 2007-11-15 10:27:59 -05:00
Karl MacMillan
4d96b37de1 Initialize memberof patch from Pete Rowley. 0001-01-01 00:00:00 +00:00
Rob Crittenden
abdd344073 Remove reference to a bogus system and make the error message more generic 2007-11-14 14:11:29 -05:00
Rob Crittenden
02e5a6599b Forgot to include FQDN in the substitition list 2007-11-13 17:51:29 -05:00
Rob Crittenden
cb0476f223 Make the group cn an editable field though protected by default.
Fix some issues with the multi-value to single-value reversion.
2007-11-14 23:33:49 -05:00
Rob Crittenden
83dd42797e Include multi-value fields on the Add Person page
Remove multi-valued cn from groups
2007-11-14 17:50:46 -05:00
Rob Crittenden
3e715a04cf Add an editors group. This is used to generally grant access for users
to edit other users (the Edit link won't appear otherwise). Additional
delegation is need to grant permission to individual attributes.
Update the failed login page to indicate that it is a permission issue.
Don't allow access to policy at all for non-admins.
By default users can only edit themselves.
2007-11-14 10:49:03 -05:00
Simo Sorce
7502ebe479 Initial implementation of policies support.
This patch uses the kerberos schema policy, this is the same policy used by
kadmin.
While this patch allows for krbPwdPolicy objects anywhere the kldap module
will make the kdc fail to provide tickets if the "krbPwdPolicyReference"
points to any object that is not a child of cn=<REALM>,cn=kerberos,dc=....
To let us set policies anywhere in the tree I enabled the code to actually
look at parent entries and the user entry itself and specify policies directly
on these objects by adding the krbPwdPolicy objectclass to them (I know its
structural but DS seem to allow multiple Structural classes on the same
entry).
The only side effect is that kadmin will not understand this, but we don't
want to use kadmin anyway as it does not understand way too many things about the
directory.

I've tested a few scenarios and all seem working as expected, but further
testing is welcome of course.
2007-11-13 16:21:03 -05:00
Rob Crittenden
bd78fe0687 Add more fields to the IPA Policy form 2007-11-13 15:36:52 -05:00
Rob Crittenden
83dd26c6e3 Remove non-existent files from Makefile targets 2007-11-13 17:24:00 -05:00
Rob Crittenden
eecbaf91e2 Use the dna plugin to automatically assign uid
Set gid to the group "ipausers"
Add the user to this default group
2007-11-13 15:03:20 -05:00
Rob Crittenden
79544637d6 The e-mail field should not be required. 2007-11-13 15:49:06 -05:00
Rob Crittenden
5011f64243 Restrict access to some parts of the UI to those in the admins group 2007-11-13 11:15:07 -05:00
Rob Crittenden
cd489f0a73 Allow a user or group to change an attribute in its RDN
Add secretary to the list of indexes otherwise RDN changing could be slow
Port --addattr, --setattr and --delattr from usermod to groupmod
2007-11-12 23:11:55 -05:00