Go to file
Adam Misnyovszki 23302645aa webui static site delete command fixed
When the static test site called batch delete,
it always referred to batch.json. This patch
fixes it, by referring entityname + '_batch_del.json'

Reviewed-By: Petr Vobornik <pvoborni@redhat.com>
2014-05-07 16:55:01 +02:00
.tx Update translations 2013-08-02 16:54:25 +02:00
checks Use /usr/bin/python2 2014-01-03 09:46:05 +01:00
contrib Set master_kdc and dns_lookup_kdc to true 2012-09-19 20:47:12 -04:00
daemons ipa-pwd-extop: Deny LDAP binds for accounts with expired principals 2014-05-05 18:50:01 +03:00
doc Remove the unused ipalib.frontend.Property class 2014-02-21 11:58:00 +01:00
init Remove systemd upgrader as it is not used anymore 2013-08-15 08:49:15 +02:00
install webui static site delete command fixed 2014-05-07 16:55:01 +02:00
ipa-client Fixed various typos in ipa-client-install man page 2014-05-06 13:49:38 +02:00
ipalib plugin registration refactoring for pwpolicy 2014-05-06 14:15:21 +02:00
ipapython ipalib: Add DateTime parameter 2014-05-05 18:57:29 +03:00
ipaserver Trust add datetime fix 2014-05-06 19:14:45 +03:00
ipatests Fixed typo in ipa-test-task man page 2014-05-06 13:44:53 +02:00
smartproxy Implement an IPA Foreman smartproxy server 2014-04-30 21:57:27 +02:00
util Add support to ipa-kdb for keyless principals 2014-02-19 10:15:36 +01:00
.gitignore tests: Create the testing service certificate on demand 2014-03-06 10:33:21 +01:00
.mailmap Add Nathaniel McCallum to .mailmap 2014-03-17 12:21:13 +01:00
API.txt ipalib: Expose krbPrincipalExpiration in CLI 2014-05-05 19:01:04 +03:00
autogen.sh build tweaks - use automake's foreign mode, avoid creating empty files to satisfy gnu mode - run autoreconf -f to ensure that everything matches 2010-11-29 11:39:55 -05:00
BUILD.txt Update README and BUILD 2014-02-12 14:04:07 +01:00
Contributors.txt Correct Jenny Severance's last name 2014-02-12 14:04:07 +01:00
COPYING Change FreeIPA license to GPLv3+ 2010-12-20 17:19:53 -05:00
freeipa.spec.in Implement an IPA Foreman smartproxy server 2014-04-30 21:57:27 +02:00
ipa Use /usr/bin/python2 2014-01-03 09:46:05 +01:00
ipa.1 Fix various typos. 2012-09-18 08:45:28 +02:00
lite-server.py Use /usr/bin/python2 2014-01-03 09:46:05 +01:00
make-doc Make an ipa-tests package 2013-06-17 19:22:50 +02:00
make-lint Remove the unused ipalib.frontend.Property class 2014-02-21 11:58:00 +01:00
make-test Do not hardcode path to ipa-getkeytab in tests 2014-03-13 15:52:18 +01:00
makeapi Use /usr/bin/python2 2014-01-03 09:46:05 +01:00
Makefile Implement an IPA Foreman smartproxy server 2014-04-30 21:57:27 +02:00
MANIFEST.in Change FreeIPA license to GPLv3+ 2010-12-20 17:19:53 -05:00
README Update README and BUILD 2014-02-12 14:04:07 +01:00
setup-client.py Use /usr/bin/python2 2014-01-03 09:46:05 +01:00
setup.py Use /usr/bin/python2 2014-01-03 09:46:05 +01:00
VERSION ipalib: Expose krbPrincipalExpiration in CLI 2014-05-05 19:01:04 +03:00
version.m4.in Mass tree reorganization for IPAv2. To view previous history of files use: 2009-02-03 15:27:14 -05:00

                               IPA Server

  Overview
  --------

  FreeIPA allows Linux administrators to centrally manage identity,
  authentication and access control aspects of Linux and UNIX systems
  by providing simple to install and use command line and web based
  managment tools.
  FreeIPA is built on top of well known Open Source components and standard
  protocols with a very strong focus on ease of management and automation
  of installation and configuration tasks.
  FreeIPA can seamlessly integrate into an Active Directory environment via
  cross-realm Kerberos trust or user synchronization.

  Benefits
  --------

  FreeIPA:
  * Allows all your users to access all the machines with the same credentials
    and security settings
  * Allows users to access personal files transparently from any machine in
    an authenticated and secure way
  * Uses an advanced grouping mechanism to restrict network access to services
    and files only to specific users
  * Allows central management of security mechanisms like passwords,
    SSH Public Keys, SUDO rules, Keytabs, Access Control Rules
  * Enables delegation of selected administrative tasks to other power users
  * Integrates into Active Directory environments

  Components
  ----------

  The FreeIPA project provides unified installation and management
  tools for the following components:

  * LDAP Server - based on the 389 project (LDAP)
    http://directory.fedoraproject.org/wiki/Main_Page

  * KDC - based on MIT Kerberos implementation
    http://k5wiki.kerberos.org/wiki/Main_Page

  * PKI based on Dogtag project
    http://pki.fedoraproject.org/wiki/PKI_Main_Page

  * Samba libraries for Active Directory integration
    http://www.samba.org/

  * DNS Server based on BIND and the Bind-DynDB-LDAP plugin
    https://www.isc.org/software/bind
    https://fedorahosted.org/bind-dyndb-ldap


  Project Website
  ---------------

  Releases, announcements and other information can be found on the IPA
  server project page at <http://www.freeipa.org/>.

  Documentation
  -------------

  The most up-to-date documentation can be found at
  <http://freeipa.org/page/Documentation>.

  Quick Start
  -----------

  To get started quickly, start here:
  <http://www.freeipa.org/page/Quick_Start_Guide>

  Licensing
  ---------

  Please see the file called COPYING.

  Contacts
  --------

     * If you want to be informed about new code releases, bug fixes,
       security fixes, general news and information about the IPA server
       subscribe to the freeipa-announce mailing list at
       <https://www.redhat.com/mailman/listinfo/freeipa-interest/>.

     * If you have a bug report please submit it at:
       <https://bugzilla.redhat.com>

     * If you want to participate in actively developing IPA please
       subscribe to the freeipa-devel mailing list at
       <https://www.redhat.com/mailman/listinfo/freeipa-devel/> or join
       us in IRC at irc://irc.freenode.net/freeipa