freeipa/install
2015-07-01 13:05:30 +00:00
..
certmonger Adopted kinit_keytab and kinit_password for kerberos auth 2015-04-20 08:27:35 +00:00
conf Provide Kerberos over HTTP (MS-KKDCP) 2015-06-24 10:43:58 +02:00
ffextension webui: append network.negotiate-auth.trusted-uris 2014-09-11 09:41:51 +02:00
html webui: remove remnants of jquery-ui 2014-06-10 10:23:22 +02:00
migration ipaplatform: Move all filesystem paths to ipaplatform.paths module 2014-06-16 19:48:20 +02:00
po Add a KRA to IPA 2014-08-22 09:59:31 +02:00
restart_scripts Adopted kinit_keytab and kinit_password for kerberos auth 2015-04-20 08:27:35 +00:00
share Fix indicies ntUserDomainId, ntUniqueId 2015-06-29 13:40:29 +02:00
tools ipalib: Load ipaserver plugins when api.env.in_server is True 2015-07-01 13:05:30 +00:00
ui webui: adjust user deleter dialog to new api 2015-06-18 15:50:44 +02:00
updates Add ACI to allow hosts to add their own services 2015-06-29 13:41:52 +02:00
wsgi Remove trivial path constants from modules 2014-11-04 12:57:01 +01:00
configure.ac Import included profiles during install or upgrade 2015-06-04 08:27:33 +00:00
Makefile.am Change group ownership of CRL publish directory 2013-07-16 12:17:40 +02:00
README.schema Add some basic rules for adding new schema 2010-08-27 13:40:37 -04:00

Ground rules on adding new schema

Brand new schema, particularly when written specifically for IPA, should be
added in share/*.ldif. Any new files need to be explicitly loaded in
ipaserver/install/dsinstance.py. These simply get copied directly into
the new instance schema directory.

Existing schema (e.g. in an LDAP draft) may either be added as a separate
ldif in share or as an update in the updates directory. The advantage of
adding the schema as an update is if 389-ds ever adds the schema then the
installation won't fail due to existing schema failing to load during
bootstrap.

If the new schema requires a new container then this should be added
to install/bootstrap-template.ldif.