Commit Graph

35 Commits

Author SHA1 Message Date
Mark McLoughlin
a39f1cb2cb Fix ldif to work with ldapmodify in openldap-2.4.x
It seems that in openldap-2.4.x ldapmodify has gotten somewhat
more picky about the ldif it accepts. See here for more details:

  https://bugzilla.redhat.com/422251

Not sure whether ldapmodify will be fixed, but for now just
fix the ldif.

Signed-off-by: Mark McLoughlin <markmc@redhat.com>
2007-12-13 09:31:28 +00:00
Simo Sorce
d76886ff4f - Better access control, make sure not even admins can read out passwords
- Insure admins can't locked out by mistake by inclusion in disabled groups
- Fix also minor error in krbinstance.py
2007-12-11 21:56:36 -05:00
Karl MacMillan
d2378f13d0 Merge. 0001-01-01 00:00:00 +00:00
Rob Crittenden
b75d735b7e Add default e-mail domain to the IPA configuration 2007-12-10 11:53:00 -05:00
John Dennis
d53915954e merge 2007-12-04 10:08:08 -05:00
Rob Crittenden
03fe2a8d6a Increase default max password lifetime from 10 to 90 days 2007-12-03 18:09:14 -05:00
John Dennis
4e1d291d15 change location of radius data in ldap from
cn=radius,cn=services,cn=etc
to
cn=radius
2007-11-30 20:29:12 -05:00
John Dennis
904b76059c merged radius work with latest mainline tip 2007-11-28 07:49:07 -05:00
Rob Crittenden
2e7f629d91 Remove unnecessary attribute left over from testing 2007-11-26 20:34:59 -05:00
John Dennis
d98686e967 Add radius profile implementations:
get_radius_profile_by_uid
  add_radius_profile
  update_radius_profile
  delete_radius_profile
  find_radius_profiles

Rewrite command line arg handling, now support pair entry, interactive
mode with auto completion, reading pairs from a file, better handling
of mandatory values, better help, long arg names now match attribute
name in pairs

Establish mappings for all attributes and names used in clients and
profiles

Add notion of containers to radius clients and profiles in LDAP

Move common code, variables, constants, and strings into the files
radius_client.py, radius_util.py, ipautil.py to eliminate redundant
elements which could get out of sync if modified and to provide access
to other code which might benefit from using these items in the
future.

Add utility functions:
  format_list()
  parse_key_value_pairs()

Add utility class:
  AttributeValueCompleter

Unify attribute usage in radius ldap schema
2007-11-21 13:11:10 -05:00
John Dennis
eab5a89d4a ipa-addradiusclient now working 2007-11-13 20:05:02 -05:00
John Dennis
152f8e3392 checkpoint radius client work 2007-11-13 13:06:18 -05:00
John Dennis
84275328a0 radius now does kerberos auth, reads client entries from LDAP 2007-11-10 00:09:07 -05:00
Pete Rowley
24d5777bd6 Add posix auto gen for single master case 2007-11-06 15:57:15 -08:00
Simo Sorce
86c78cbe75 minor typos 2007-11-30 16:58:02 -05:00
Rob Crittenden
6ea3d9610e Utilize user and group objectclass lists in cn=ipaconfig
Change the syntax on user and group objectclasses in cn=ipaconfig
2007-12-06 00:30:26 -05:00
Rob Crittenden
ab67029d94 Add utility to lock user accounts. Remove lock capability from ipa-deluser
Fix bootstrap.ldif to add new Class of Service entries properly
Include some man pages that weren't being installed
2007-11-26 22:28:53 -05:00
Karl MacMillan
edc7af1446 Add xml-rpc interface for getting keytabs.
Warning: this lacks any sort of authorization.
0001-01-01 00:00:00 +00:00
Simo Sorce
b456d8424a more s/unique// wrt groups members/objectclasses 2007-11-21 16:07:07 -05:00
Simo Sorce
3580d0affb Use groupOfNames and member, not groupOfUniqueNames and uniqueMember 2007-11-20 10:22:43 -05:00
Rob Crittenden
f42f1f44c8 Enable group inactivation by using the Class of Service plugin.
This adds 2 new groups: activated and inactivated.

If you, or a group you are a member of, is in inactivated then you are too.

If you, or a group you are a member of, is in the activated group, then you
are too.

In a fight between activated and inactivated, activated wins.

The DNs for doing this matching is case and white space sensitive.

The goal is to never have to actually set nsAccountLock in a user directly
but move them between these groups.

We need to decide where in the CLI this will happen. Right it is split
between ipa-deluser and ipa-usermod. To inactivate groups for now just
add the group to inactivate or active.
2007-11-20 22:45:29 -05:00
Simo Sorce
c6532b621d fix ldif typo 2007-11-19 19:33:36 -05:00
Karl MacMillan
6d3fa7f892 Minor fixes. 0001-01-01 00:00:00 +00:00
Simo Sorce
a0d8d87b97 Fix installation
Add missing schema for GUI Config, and missing objectclass for cn=accounts
container
2007-11-18 15:02:26 -05:00
Rob Crittenden
1967aafa39 Implement the password policy UI and finish IPA policy UI
This includes a default password policy
Custom fields are now read from LDAP. The format is a list of
  dicts with keys: label, field, required.
The LDAP-based configuration now specifies:
    ipaUserSearchFields: uid,givenName,sn,telephoneNumber,ou,title
    ipaGroupSearchFields: cn,description
    ipaSearchTimeLimit: 2
    ipaSearchRecordsLimit: 0
    ipaCustomFields:
    ipaHomesRootDir: /home
    ipaDefaultLoginShell: /bin/sh
    ipaDefaultPrimaryGroup: ipausers
    ipaMaxUsernameLength: 8
    ipaPwdExpAdvNotify: 4
This could use some optimization.
2007-11-16 12:59:32 -05:00
Rob Crittenden
3e715a04cf Add an editors group. This is used to generally grant access for users
to edit other users (the Edit link won't appear otherwise). Additional
delegation is need to grant permission to individual attributes.
Update the failed login page to indicate that it is a permission issue.
Don't allow access to policy at all for non-admins.
By default users can only edit themselves.
2007-11-14 10:49:03 -05:00
Rob Crittenden
ed387e2ebb Add inetUser to the admin user so memberOf will work 2007-10-30 14:42:19 -04:00
Kevin McCarthy
d1899e8f35 patch queue: admin_account_fix.patch 2007-10-04 13:41:19 -07:00
rcritten@redhat.com
370500ab1a Remove support for LDAP proxy connections 2007-09-20 09:01:23 -04:00
Simo Sorce
7a0629ea55 More DIT fixes discovered after testing 2007-08-31 18:36:54 -04:00
Simo Sorce
a8fe485065 Integrate corrections pointed out on the list 2007-08-30 12:23:39 -04:00
Simo Sorce
bebc413366 Finalize DIT, this is waht we are probably going to have in the end,
or something very close to this one
Add default groups and admin user

TODO: need to discuss more in deep uid/gid generation, this will
      probably change as soon as the DNA plugin is activated
2007-08-29 18:07:05 -04:00
rcritten@redhat.com
861cda3cb5 Initial support for Groups
Create separate object for Users and Groups (using same base class)
Check for uniqueness before adding new users and groups
Remove user_container from everything but add operations
Abstract out a number of functions that are common across users and groups
Make sure all strings passed in to be in a filter are checked
Add new error message: No modifications specified
2007-08-24 15:42:56 -04:00
rcritten@redhat.com
993f76fe60 - Abstracted client class to work directly or over RPC
- Add mod_auth_kerb and cyrus-sasl-gssapi to Requires
- Remove references to admin server in ipa-server-setupssl
- Generate a client certificate for the XML-RPC server to connect to LDAP with
- Create a keytab for Apache
- Create an ldif with a test user
- Provide a certmap.conf for doing SSL client authentication
- Update tools to use kerberos
- Add User class
2007-08-06 10:05:53 -04:00
Karl MacMillan
9d5b946fda Reorganized repo to reflect packaging. 0001-01-01 00:00:00 +00:00