Go to file
Alexander Bokovoy 785f6593ca add one-way trust support to ipasam
When trust is established, ipasam module creates a number of objects in LDAP
to represent the trust information. Among them, for one-way trust we create
a principal named IPA$@AD where IPA is a NetBIOS (flat) name of the IPA forest
and AD is a realm of the trusted Active Directory forest root domain.

This principal is then used by SSSD on IPA masters to authenticate against
trusted Active Directory domain controllers and retrieve information about
user and group identities.

FreeIPA also uses this principal's credentials to retrieve domain topology.

The access to the keys of the principal should be well-protected. We only
allow to retrieve the keytab for it for members of cn=adtrust agents group.
This group is populated with host/ and cifs/ principals from IPA masters.

Starting with FreeIPA 4.2 the group will also have host/ principals of IPA masters
where no ipa-adtrust-install was run. To add them, run ipa-adtrust-install
on the master which will be configured to be a domain controller (e.g.
run Samba with ipasam), and specify --add-agents option to trigger activation
of the interactive mode to specify which IPA masters to enable.

Fixes https://fedorahosted.org/freeipa/ticket/4962
Part of fixes for https://fedorahosted.org/freeipa/ticket/4546

Reviewed-By: Tomas Babej <tbabej@redhat.com>
2015-07-08 01:56:52 +02:00
.tx Update translations 2013-08-02 16:54:25 +02:00
asn1 Fix memory leak in GetKeytabControl asn1 code 2014-11-25 08:23:24 +00:00
checks Add profile_id parameter to 'request_certificate' 2015-06-04 08:27:33 +00:00
contrib Set master_kdc and dns_lookup_kdc to true 2012-09-19 20:47:12 -04:00
daemons add one-way trust support to ipasam 2015-07-08 01:56:52 +02:00
doc Remove the unused ipalib.frontend.Property class 2014-02-21 11:58:00 +01:00
init Provide Kerberos over HTTP (MS-KKDCP) 2015-06-24 10:43:58 +02:00
install Fix regression: ipa-dns-install will add CA records if required 2015-07-08 00:32:05 +02:00
ipa-client FIX: Clear SSSD caches when uninstalling the client 2015-07-07 16:27:24 +02:00
ipalib add option to skip client API version check 2015-07-08 00:35:05 +02:00
ipaplatform DNSSEC: allow to disable/replace DNSSEC key master 2015-07-07 08:37:15 +02:00
ipapython Allow to run subprocess with suplementary groups 2015-07-07 08:37:15 +02:00
ipaserver dcerpc: Raise ACIError correctly 2015-07-08 01:56:52 +02:00
ipatests Added ipaVaultPublicKey attribute. 2015-07-07 07:44:56 +00:00
util Add compatibility function for older libkrb5 2015-05-30 12:24:15 -04:00
.gitignore git ignore ipaplatform/__init__.py 2015-05-22 15:58:44 +02:00
.mailmap Update contributors 2014-10-20 08:18:09 +02:00
ACI.txt User life cycle: permission to delete a preserved user 2015-06-29 13:50:04 +02:00
API.txt certprofile: add ability to update profile config in Dogtag 2015-07-08 00:25:46 +02:00
autogen.sh build tweaks - use automake's foreign mode, avoid creating empty files to satisfy gnu mode - run autoreconf -f to ensure that everything matches 2010-11-29 11:39:55 -05:00
BUILD.txt Update BUILD.txt 2015-05-07 17:13:27 +02:00
Contributors.txt Update contributors 2014-10-20 08:18:09 +02:00
COPYING Change FreeIPA license to GPLv3+ 2010-12-20 17:19:53 -05:00
COPYING.openssl Add a clear OpenSSL exception. 2015-02-23 16:25:54 +01:00
freeipa.spec.in Added symmetric and asymmetric vaults. 2015-07-07 07:44:56 +00:00
ipa Use /usr/bin/python2 2014-01-03 09:46:05 +01:00
ipa.1 Fix example usage in ipa man page. 2014-10-08 09:52:08 +02:00
lite-server.py Use /usr/bin/python2 2014-01-03 09:46:05 +01:00
make-doc Make an ipa-tests package 2013-06-17 19:22:50 +02:00
make-lint Added vault-archive and vault-retrieve commands. 2015-06-08 10:04:23 +00:00
make-test Switch make-test to pytest 2014-11-21 12:14:44 +01:00
makeaci plugable: Load plugins only from modules imported by API 2015-07-01 13:05:30 +00:00
makeapi Use /usr/bin/python2 2014-01-03 09:46:05 +01:00
Makefile Server Upgrade: Verify version and platform 2015-05-04 11:16:26 +00:00
MANIFEST.in Change FreeIPA license to GPLv3+ 2010-12-20 17:19:53 -05:00
pytest.ini Configure pytest to run doctests 2014-11-21 12:14:44 +01:00
README Update README and BUILD 2014-02-12 14:04:07 +01:00
setup-client.py Include the ipa command in client-only build 2014-09-23 20:28:47 +02:00
setup.py install: Make a package out of ipaserver.install.server 2015-05-29 08:00:33 +00:00
VERSION add option to skip client API version check 2015-07-08 00:35:05 +02:00
version.m4.in Mass tree reorganization for IPAv2. To view previous history of files use: 2009-02-03 15:27:14 -05:00
zanata.xml l10n: Add configuration file for Zanata 2015-07-07 12:07:15 +02:00

                               IPA Server

  Overview
  --------

  FreeIPA allows Linux administrators to centrally manage identity,
  authentication and access control aspects of Linux and UNIX systems
  by providing simple to install and use command line and web based
  managment tools.
  FreeIPA is built on top of well known Open Source components and standard
  protocols with a very strong focus on ease of management and automation
  of installation and configuration tasks.
  FreeIPA can seamlessly integrate into an Active Directory environment via
  cross-realm Kerberos trust or user synchronization.

  Benefits
  --------

  FreeIPA:
  * Allows all your users to access all the machines with the same credentials
    and security settings
  * Allows users to access personal files transparently from any machine in
    an authenticated and secure way
  * Uses an advanced grouping mechanism to restrict network access to services
    and files only to specific users
  * Allows central management of security mechanisms like passwords,
    SSH Public Keys, SUDO rules, Keytabs, Access Control Rules
  * Enables delegation of selected administrative tasks to other power users
  * Integrates into Active Directory environments

  Components
  ----------

  The FreeIPA project provides unified installation and management
  tools for the following components:

  * LDAP Server - based on the 389 project (LDAP)
    http://directory.fedoraproject.org/wiki/Main_Page

  * KDC - based on MIT Kerberos implementation
    http://k5wiki.kerberos.org/wiki/Main_Page

  * PKI based on Dogtag project
    http://pki.fedoraproject.org/wiki/PKI_Main_Page

  * Samba libraries for Active Directory integration
    http://www.samba.org/

  * DNS Server based on BIND and the Bind-DynDB-LDAP plugin
    https://www.isc.org/software/bind
    https://fedorahosted.org/bind-dyndb-ldap


  Project Website
  ---------------

  Releases, announcements and other information can be found on the IPA
  server project page at <http://www.freeipa.org/>.

  Documentation
  -------------

  The most up-to-date documentation can be found at
  <http://freeipa.org/page/Documentation>.

  Quick Start
  -----------

  To get started quickly, start here:
  <http://www.freeipa.org/page/Quick_Start_Guide>

  Licensing
  ---------

  Please see the file called COPYING.

  Contacts
  --------

     * If you want to be informed about new code releases, bug fixes,
       security fixes, general news and information about the IPA server
       subscribe to the freeipa-announce mailing list at
       <https://www.redhat.com/mailman/listinfo/freeipa-interest/>.

     * If you have a bug report please submit it at:
       <https://bugzilla.redhat.com>

     * If you want to participate in actively developing IPA please
       subscribe to the freeipa-devel mailing list at
       <https://www.redhat.com/mailman/listinfo/freeipa-devel/> or join
       us in IRC at irc://irc.freenode.net/freeipa