Go to file
Nathaniel McCallum 5baa941317 Implement OTP token importing
This patch adds support for importing tokens using RFC 6030 key container
files. This includes decryption support. For sysadmin sanity, any tokens
which fail to add will be written to the output file for examination. The
main use case here is where a small subset of a large set of tokens fails
to validate or add. Using the output file, the sysadmin can attempt to
recover these specific tokens.

This code is implemented as a server-side script. However, it doesn't
actually need to run on the server. This was done because importing is an
odd fit for the IPA command framework:
1. We need to write an output file.
2. The operation may be long-running (thousands of tokens).
3. Only admins need to perform this task and it only happens infrequently.

https://fedorahosted.org/freeipa/ticket/4261

Reviewed-By: Alexander Bokovoy <abokovoy@redhat.com>
2014-06-25 12:55:02 +02:00
.tx Update translations 2013-08-02 16:54:25 +02:00
checks Use /usr/bin/python2 2014-01-03 09:46:05 +01:00
contrib Set master_kdc and dns_lookup_kdc to true 2012-09-19 20:47:12 -04:00
daemons Periodically refresh global ipa-kdb configuration 2014-06-19 14:50:32 +02:00
doc Remove the unused ipalib.frontend.Property class 2014-02-21 11:58:00 +01:00
init Remove systemd upgrader as it is not used anymore 2013-08-15 08:49:15 +02:00
install Implement OTP token importing 2014-06-25 12:55:02 +02:00
ipa-client ipaplatform: Pylint fixes 2014-06-16 19:48:21 +02:00
ipalib Add several CRUD default permissions 2014-06-24 13:53:41 +02:00
ipaplatform Fix self argument in tasks 2014-06-16 19:48:21 +02:00
ipapython Fix handle python-dns UnicodeError 2014-06-20 13:28:53 +02:00
ipaserver Implement OTP token importing 2014-06-25 12:55:02 +02:00
ipatests Implement OTP token importing 2014-06-25 12:55:02 +02:00
smartproxy ipaplatform: Move all filesystem paths to ipaplatform.paths module 2014-06-16 19:48:20 +02:00
util Add support to ipa-kdb for keyless principals 2014-02-19 10:15:36 +01:00
.gitignore ipaplatform: Link to platform module during build time 2014-06-16 19:48:21 +02:00
.mailmap Add Nathaniel McCallum to .mailmap 2014-03-17 12:21:13 +01:00
ACI.txt Add several CRUD default permissions 2014-06-24 13:53:41 +02:00
API.txt Digest part in DLV/DS records allows only heaxadecimal characters 2014-06-20 16:46:03 +02:00
autogen.sh build tweaks - use automake's foreign mode, avoid creating empty files to satisfy gnu mode - run autoreconf -f to ensure that everything matches 2010-11-29 11:39:55 -05:00
BUILD.txt Update README and BUILD 2014-02-12 14:04:07 +01:00
Contributors.txt Correct Jenny Severance's last name 2014-02-12 14:04:07 +01:00
COPYING Change FreeIPA license to GPLv3+ 2010-12-20 17:19:53 -05:00
freeipa.spec.in Implement OTP token importing 2014-06-25 12:55:02 +02:00
ipa Use /usr/bin/python2 2014-01-03 09:46:05 +01:00
ipa.1 Add version and API version 2014-06-09 16:27:41 +02:00
lite-server.py Use /usr/bin/python2 2014-01-03 09:46:05 +01:00
make-doc Make an ipa-tests package 2013-06-17 19:22:50 +02:00
make-lint DNSNameParam parameter 2014-06-03 15:55:32 +02:00
make-test Do not hardcode path to ipa-getkeytab in tests 2014-03-13 15:52:18 +01:00
makeaci Make sure member* attrs are always granted together in read permissions 2014-06-11 13:21:30 +02:00
makeapi Use /usr/bin/python2 2014-01-03 09:46:05 +01:00
Makefile ipaplatform: Link to platform module during build time 2014-06-16 19:48:21 +02:00
MANIFEST.in Change FreeIPA license to GPLv3+ 2010-12-20 17:19:53 -05:00
README Update README and BUILD 2014-02-12 14:04:07 +01:00
setup-client.py Use /usr/bin/python2 2014-01-03 09:46:05 +01:00
setup.py ipaplatform: Link to platform module during build time 2014-06-16 19:48:21 +02:00
VERSION DNSSEC: DLVRecord type added 2014-06-20 16:46:02 +02:00
version.m4.in Mass tree reorganization for IPAv2. To view previous history of files use: 2009-02-03 15:27:14 -05:00

                               IPA Server

  Overview
  --------

  FreeIPA allows Linux administrators to centrally manage identity,
  authentication and access control aspects of Linux and UNIX systems
  by providing simple to install and use command line and web based
  managment tools.
  FreeIPA is built on top of well known Open Source components and standard
  protocols with a very strong focus on ease of management and automation
  of installation and configuration tasks.
  FreeIPA can seamlessly integrate into an Active Directory environment via
  cross-realm Kerberos trust or user synchronization.

  Benefits
  --------

  FreeIPA:
  * Allows all your users to access all the machines with the same credentials
    and security settings
  * Allows users to access personal files transparently from any machine in
    an authenticated and secure way
  * Uses an advanced grouping mechanism to restrict network access to services
    and files only to specific users
  * Allows central management of security mechanisms like passwords,
    SSH Public Keys, SUDO rules, Keytabs, Access Control Rules
  * Enables delegation of selected administrative tasks to other power users
  * Integrates into Active Directory environments

  Components
  ----------

  The FreeIPA project provides unified installation and management
  tools for the following components:

  * LDAP Server - based on the 389 project (LDAP)
    http://directory.fedoraproject.org/wiki/Main_Page

  * KDC - based on MIT Kerberos implementation
    http://k5wiki.kerberos.org/wiki/Main_Page

  * PKI based on Dogtag project
    http://pki.fedoraproject.org/wiki/PKI_Main_Page

  * Samba libraries for Active Directory integration
    http://www.samba.org/

  * DNS Server based on BIND and the Bind-DynDB-LDAP plugin
    https://www.isc.org/software/bind
    https://fedorahosted.org/bind-dyndb-ldap


  Project Website
  ---------------

  Releases, announcements and other information can be found on the IPA
  server project page at <http://www.freeipa.org/>.

  Documentation
  -------------

  The most up-to-date documentation can be found at
  <http://freeipa.org/page/Documentation>.

  Quick Start
  -----------

  To get started quickly, start here:
  <http://www.freeipa.org/page/Quick_Start_Guide>

  Licensing
  ---------

  Please see the file called COPYING.

  Contacts
  --------

     * If you want to be informed about new code releases, bug fixes,
       security fixes, general news and information about the IPA server
       subscribe to the freeipa-announce mailing list at
       <https://www.redhat.com/mailman/listinfo/freeipa-interest/>.

     * If you have a bug report please submit it at:
       <https://bugzilla.redhat.com>

     * If you want to participate in actively developing IPA please
       subscribe to the freeipa-devel mailing list at
       <https://www.redhat.com/mailman/listinfo/freeipa-devel/> or join
       us in IRC at irc://irc.freenode.net/freeipa