freeipa/ipaserver
Alexander Bokovoy dadfbf9d15 Handle various forms of admin accounts when establishing trusts
Realm administrator account may be specified using different form:
Administrator, DOM\Administrator, Administrator@DOMAIN

This patch introduces handling of the second two forms:
- In DOM\Administrator only user name is used, short domain name
  is then taken from a discovered record from the AD DC
- In Administrator@DOMAIN first DOMAIN is verified to be the same
  as the domain we are establishing trust to, and then user name
  is taken, together with short domain name taken from a discovered
  record from the AD DC

Note that we do not support using to-be-trusted domain's trusted domains'
accounts to establish trust as there is basically zero chance to verify
that things will work with them. In addition, in order to establish trust
one needs to belong to Enterprise Admins group in AD or have specially
delegated permissions. These permissions are unlikely delegated to the
ones in already trusted domain.

https://fedorahosted.org/freeipa/ticket/2864
2012-07-18 16:55:57 +03:00
..
install Warn user if an ID range with incorrect size was created 2012-07-13 16:18:39 +02:00
plugins Typo fixes 2012-06-25 21:35:11 -04:00
__init__.py Change FreeIPA license to GPLv3+ 2010-12-20 17:19:53 -05:00
conn.py Change FreeIPA license to GPLv3+ 2010-12-20 17:19:53 -05:00
dcerpc.py Handle various forms of admin accounts when establishing trusts 2012-07-18 16:55:57 +03:00
ipaldap.py Centralize timeout for waiting for servers to start. 2012-07-02 17:08:58 -04:00
rpcserver.py Store session cookie in ccache for cli users 2012-06-14 14:02:26 +02:00