Go to file
Nathaniel McCallum 8b2f4443dc Periodically refresh global ipa-kdb configuration
Before this patch, ipa-kdb would load global configuration on startup and
never update it. This means that if global configuration is changed, the
KDC never receives the new configuration until it is restarted.

This patch enables caching of the global configuration with a timeout of
60 seconds.

https://fedorahosted.org/freeipa/ticket/4153

Reviewed-By: Alexander Bokovoy <abokovoy@redhat.com>
2014-06-19 14:50:32 +02:00
.tx Update translations 2013-08-02 16:54:25 +02:00
checks Use /usr/bin/python2 2014-01-03 09:46:05 +01:00
contrib Set master_kdc and dns_lookup_kdc to true 2012-09-19 20:47:12 -04:00
daemons Periodically refresh global ipa-kdb configuration 2014-06-19 14:50:32 +02:00
doc Remove the unused ipalib.frontend.Property class 2014-02-21 11:58:00 +01:00
init Remove systemd upgrader as it is not used anymore 2013-08-15 08:49:15 +02:00
install Convert Password Policy default permissions to managed 2014-06-18 14:56:43 +02:00
ipa-client ipaplatform: Pylint fixes 2014-06-16 19:48:21 +02:00
ipalib Convert Password Policy default permissions to managed 2014-06-18 14:56:43 +02:00
ipaplatform Fix self argument in tasks 2014-06-16 19:48:21 +02:00
ipapython ipaplatform: Change makefiles to accomodate for new platform package 2014-06-16 19:48:20 +02:00
ipaserver Add $REALM to variables supported by the managed permission updater 2014-06-18 14:56:42 +02:00
ipatests sudorule: Allow unsetting sudoorder 2014-06-18 12:59:25 +02:00
smartproxy ipaplatform: Move all filesystem paths to ipaplatform.paths module 2014-06-16 19:48:20 +02:00
util Add support to ipa-kdb for keyless principals 2014-02-19 10:15:36 +01:00
.gitignore ipaplatform: Link to platform module during build time 2014-06-16 19:48:21 +02:00
.mailmap Add Nathaniel McCallum to .mailmap 2014-03-17 12:21:13 +01:00
ACI.txt Convert Password Policy default permissions to managed 2014-06-18 14:56:43 +02:00
API.txt Add support for managedBy to tokens 2014-06-16 10:13:59 +02:00
autogen.sh build tweaks - use automake's foreign mode, avoid creating empty files to satisfy gnu mode - run autoreconf -f to ensure that everything matches 2010-11-29 11:39:55 -05:00
BUILD.txt Update README and BUILD 2014-02-12 14:04:07 +01:00
Contributors.txt Correct Jenny Severance's last name 2014-02-12 14:04:07 +01:00
COPYING Change FreeIPA license to GPLv3+ 2010-12-20 17:19:53 -05:00
freeipa.spec.in ipaplatform: Change makefiles to accomodate for new platform package 2014-06-16 19:48:20 +02:00
ipa Use /usr/bin/python2 2014-01-03 09:46:05 +01:00
ipa.1 Add version and API version 2014-06-09 16:27:41 +02:00
lite-server.py Use /usr/bin/python2 2014-01-03 09:46:05 +01:00
make-doc Make an ipa-tests package 2013-06-17 19:22:50 +02:00
make-lint DNSNameParam parameter 2014-06-03 15:55:32 +02:00
make-test Do not hardcode path to ipa-getkeytab in tests 2014-03-13 15:52:18 +01:00
makeaci Make sure member* attrs are always granted together in read permissions 2014-06-11 13:21:30 +02:00
makeapi Use /usr/bin/python2 2014-01-03 09:46:05 +01:00
Makefile ipaplatform: Link to platform module during build time 2014-06-16 19:48:21 +02:00
MANIFEST.in Change FreeIPA license to GPLv3+ 2010-12-20 17:19:53 -05:00
README Update README and BUILD 2014-02-12 14:04:07 +01:00
setup-client.py Use /usr/bin/python2 2014-01-03 09:46:05 +01:00
setup.py ipaplatform: Link to platform module during build time 2014-06-16 19:48:21 +02:00
VERSION Add support for managedBy to tokens 2014-06-16 10:13:59 +02:00
version.m4.in Mass tree reorganization for IPAv2. To view previous history of files use: 2009-02-03 15:27:14 -05:00

                               IPA Server

  Overview
  --------

  FreeIPA allows Linux administrators to centrally manage identity,
  authentication and access control aspects of Linux and UNIX systems
  by providing simple to install and use command line and web based
  managment tools.
  FreeIPA is built on top of well known Open Source components and standard
  protocols with a very strong focus on ease of management and automation
  of installation and configuration tasks.
  FreeIPA can seamlessly integrate into an Active Directory environment via
  cross-realm Kerberos trust or user synchronization.

  Benefits
  --------

  FreeIPA:
  * Allows all your users to access all the machines with the same credentials
    and security settings
  * Allows users to access personal files transparently from any machine in
    an authenticated and secure way
  * Uses an advanced grouping mechanism to restrict network access to services
    and files only to specific users
  * Allows central management of security mechanisms like passwords,
    SSH Public Keys, SUDO rules, Keytabs, Access Control Rules
  * Enables delegation of selected administrative tasks to other power users
  * Integrates into Active Directory environments

  Components
  ----------

  The FreeIPA project provides unified installation and management
  tools for the following components:

  * LDAP Server - based on the 389 project (LDAP)
    http://directory.fedoraproject.org/wiki/Main_Page

  * KDC - based on MIT Kerberos implementation
    http://k5wiki.kerberos.org/wiki/Main_Page

  * PKI based on Dogtag project
    http://pki.fedoraproject.org/wiki/PKI_Main_Page

  * Samba libraries for Active Directory integration
    http://www.samba.org/

  * DNS Server based on BIND and the Bind-DynDB-LDAP plugin
    https://www.isc.org/software/bind
    https://fedorahosted.org/bind-dyndb-ldap


  Project Website
  ---------------

  Releases, announcements and other information can be found on the IPA
  server project page at <http://www.freeipa.org/>.

  Documentation
  -------------

  The most up-to-date documentation can be found at
  <http://freeipa.org/page/Documentation>.

  Quick Start
  -----------

  To get started quickly, start here:
  <http://www.freeipa.org/page/Quick_Start_Guide>

  Licensing
  ---------

  Please see the file called COPYING.

  Contacts
  --------

     * If you want to be informed about new code releases, bug fixes,
       security fixes, general news and information about the IPA server
       subscribe to the freeipa-announce mailing list at
       <https://www.redhat.com/mailman/listinfo/freeipa-interest/>.

     * If you have a bug report please submit it at:
       <https://bugzilla.redhat.com>

     * If you want to participate in actively developing IPA please
       subscribe to the freeipa-devel mailing list at
       <https://www.redhat.com/mailman/listinfo/freeipa-devel/> or join
       us in IRC at irc://irc.freenode.net/freeipa