freeipa/ipa-client
Alexander Bokovoy 1b4aaf5756 Fix sssd.conf to always have IPA certificate for the domain.
Fixes https://fedorahosted.org/freeipa/ticket/1476

SSSD will need TLS for checking if ipaMigrationEnabled attribute is set
Note that SSSD will force StartTLS because the channel is later used for
authentication as well if password migration is enabled. Thus set the option
unconditionally.
2011-07-18 19:42:04 -04:00
..
firefox Change FreeIPA license to GPLv3+ 2010-12-20 17:19:53 -05:00
ipa-install Fix sssd.conf to always have IPA certificate for the domain. 2011-07-18 19:42:04 -04:00
ipaclient KDC autodiscovery may fail when domain is not realm 2011-05-17 08:56:22 +02:00
man Configure SSSD to store user password if offline. 2011-07-14 19:26:25 -04:00
AUTHORS Fix build from autoconf patch import. 0001-01-01 00:00:00 +00:00
config.c Fix issues found by Coverity. 2011-05-09 16:23:40 -04:00
configure.ac build tweaks - use automake's foreign mode, avoid creating empty files to satisfy gnu mode - run autoreconf -f to ensure that everything matches 2010-11-29 11:39:55 -05:00
ipa-client-common.c Change FreeIPA license to GPLv3+ 2010-12-20 17:19:53 -05:00
ipa-client-common.h Do not use LDAP_DEPRECATED in plugins 2011-01-07 05:00:44 -05:00
ipa-client.spec.in Fix versioning for configure.ac and ipa-python/setup.py 2008-08-11 18:31:05 -04:00
ipa-getkeytab.c Fix duplicate OIDs 2011-02-17 08:38:53 -05:00
ipa-join.c Fix issues found by Coverity. 2011-05-09 16:23:40 -04:00
ipa-rmkeytab.c Bad return values for ipa-rmkeytab command 2011-05-03 15:19:07 +02:00
Makefile.am Mozldap-specific code removed 2011-01-14 17:33:11 -05:00
NEWS Fix build from autoconf patch import. 0001-01-01 00:00:00 +00:00
README Add a copy of the LICENSE and populate some README's 2008-01-23 10:30:18 -05:00
version.m4.in Fix versioning for configure.ac and ipa-python/setup.py 2008-08-11 18:31:05 -04:00

Code to be installed on any client that wants to be in an IPA domain.

Mostly consists of a tool for Linux systems that will help configure the
client so it will work properly in a kerberized environment.

It also includes several ways to configure Firefox to do single sign-on.

The two methods on the client side are:

1. globalsetup.sh. This modifies the global Firefox installation so that
   any profiles created will be pre-configured.

2. usersetup.sh. This will update a user's existing profile.

The downside of #1 is that an rpm -V will return a failure. It will also
need to be run with every update of Firefox.

One a profile contains the proper preferences it will be unaffected by
upgrades to Firefox. 

The downside of #2 is that every user would need to run this each time they
create a new profile.

There is a third, server-side method. See ipa-server/README for details.