Go to file
Rob Crittenden 6e2c3a45a1 Handle a 501 in cert-find from dogtag as a "not supported"
Upgrading from d9 -> d10 does not set up the RESTful interface
in dogtag, they just never coded it. Rather than trying to backport
things they have decided to not support upgrades.

We need to catch this and report a more reasonable error. They are
returning a 501 (HTTP method unimplemented) in this case.

https://fedorahosted.org/freeipa/ticket/3549
2013-05-03 16:05:49 -04:00
.tx Add Transifex tx client configuration file 2011-03-07 16:05:33 -05:00
checks Change FreeIPA license to GPLv3+ 2010-12-20 17:19:53 -05:00
contrib Set master_kdc and dns_lookup_kdc to true 2012-09-19 20:47:12 -04:00
daemons Allow ID-to-SID mappings in the extdom plugin 2013-05-02 16:57:12 -04:00
doc Add the version option to all Commands 2013-02-21 16:26:09 +01:00
init Remove syslog.target from ipa.server 2013-03-29 08:59:41 +01:00
install Handle connection timeout in ipa-replica-manage 2013-05-02 10:55:54 -04:00
ipa-client Drop uniqueMember mapping with nss-pam-ldapd. 2013-05-02 10:43:10 -04:00
ipalib Add userClass attribute for hosts 2013-04-26 10:20:17 -04:00
ipapython Remove unused ipapython.certdb.CertDB class 2013-04-02 15:28:50 +02:00
ipaserver Handle a 501 in cert-find from dogtag as a "not supported" 2013-05-03 16:05:49 -04:00
selinux Update SELinux policy for dogtag10 2012-11-30 11:12:51 -05:00
tests Add userClass attribute for hosts 2013-04-26 10:20:17 -04:00
util ipa-kdb: read SID blacklist from LDAP 2013-02-12 10:37:47 +01:00
.bzrignore Added top-level tests/ package that will contain all unit tests 2008-10-07 20:36:44 -06:00
.gitignore Ignore log files from automake tests 2013-05-02 15:19:39 -04:00
API.txt Add userClass attribute for hosts 2013-04-26 10:20:17 -04:00
autogen.sh build tweaks - use automake's foreign mode, avoid creating empty files to satisfy gnu mode - run autoreconf -f to ensure that everything matches 2010-11-29 11:39:55 -05:00
BUILD.txt Remove obsolete self-sign references from man pages, docstrings, comments 2013-04-15 16:56:06 -04:00
Contributors.txt Add Nathaniel McCallum to Contributors.txt 2013-05-02 15:19:40 -04:00
COPYING Change FreeIPA license to GPLv3+ 2010-12-20 17:19:53 -05:00
freeipa.spec.in Handle a 501 in cert-find from dogtag as a "not supported" 2013-05-03 16:05:49 -04:00
ipa Execute /usr/bin/python directly instead of /usr/bin/env python 2011-01-14 16:27:48 -05:00
ipa-compliance.cron Add support for tracking and counting entitlements 2011-02-02 10:00:38 -05:00
ipa.1 Fix various typos. 2012-09-18 08:45:28 +02:00
lite-server.py Tweak the session auth to reflect developer consensus. 2012-02-27 05:54:29 -05:00
make-doc This patch removes the existing UI functionality, as a prep for adding the Javascript based ui. 2010-07-29 10:44:56 -04:00
make-lint Use explicit loggers in ldap2 code 2013-03-01 16:59:42 +01:00
make-test Make sure appropriate exit status is returned in make-test 2013-02-25 13:32:34 +01:00
make-testcert Use DN objects instead of strings 2012-08-12 16:23:24 -04:00
makeapi Add client capabilities, enable messages 2013-02-21 16:26:09 +01:00
Makefile Use two digits for each part of NUM_VERSION 2013-04-19 10:55:05 -04:00
MANIFEST.in Change FreeIPA license to GPLv3+ 2010-12-20 17:19:53 -05:00
README Change FreeIPA license to GPLv3+ 2010-12-20 17:19:53 -05:00
setup-client.py Change FreeIPA license to GPLv3+ 2010-12-20 17:19:53 -05:00
setup.py Add plugin framework to LDAP updates. 2011-11-22 23:57:10 -05:00
TODO Parse comma-separated lists of values in all parameter types. This can be enabled for a specific parameter by setting the "csv" option to True. 2011-11-30 17:08:35 +01:00
VERSION Add userClass attribute for hosts 2013-04-26 10:20:17 -04:00
version.m4.in Mass tree reorganization for IPAv2. To view previous history of files use: 2009-02-03 15:27:14 -05:00

                               IPA Server

  What is it?
  -----------

  For efficiency, compliance and risk mitigation, organizations need to
  centrally manage and correlate vital security information including:

    * Identity (machine, user, virtual machines, groups, authentication
      credentials)
    * Policy (configuration settings, access control information)
    * Audit (events, logs, analysis thereof) 

  Since these are not new problems. there exist many approaches and
  products focused on addressing them. However, these tend to have the
  following weaknesses:

    * Focus on solving identity management across the enterprise has meant
      less focus on policy and audit.
    * Vendor focus on Web identity management problems has meant less well
      developed solutions for central management of the Linux and Unix
      world's vital security info. Organizations are forced to maintain
      a hodgepodge of internal and proprietary solutions at high TCO.
    * Proprietary security products don't easily provide access to the
      vital security information they collect or manage. This makes it
      difficult to synchronize and analyze effectively. 

  The Latest Version
  ------------------

  Details of the latest version can be found on the IPA server project
  page under <http://www.freeipa.org/>.

  Documentation
  -------------

  The most up-to-date documentation can be found at
  <http://freeipa.org/page/Documentation/>.

  Quick Start
  -----------

  To get started quickly, start here:
  <https://fedorahosted.org/freeipa/wiki/QuickStartGuide>

  Licensing
  ---------

  Please see the file called COPYING.

  Contacts
  --------

     * If you want to be informed about new code releases, bug fixes,
       security fixes, general news and information about the IPA server
       subscribe to the freeipa-announce mailing list at
       <https://www.redhat.com/mailman/listinfo/freeipa-interest/>.

     * If you have a bug report please submit it at:
       <https://bugzilla.redhat.com>

     * If you want to participate in actively developing IPA please
       subscribe to the freeipa-devel mailing list at
       <https://www.redhat.com/mailman/listinfo/freeipa-devel/> or join
       us in IRC at irc://irc.freenode.net/freeipa