summaryrefslogtreecommitdiff
path: root/server/config
AgeCommit message (Collapse)AuthorFilesLines
2009-11-10Add cleanup taskSimo Sorce1-0/+1
2009-11-05Update midpoint refresh logic to be relative to cache timeoutStephen Gallagher1-1/+1
2009-11-03Rename sdap_id_map to sdap_attr_mapSimo Sorce1-0/+2
Also start adding some infrastructure to use the USN counter when available. In particular add a place to add generic attrs mapping, ie attributes that are neither user nor group specific.
2009-11-03Add complete pydoc for SSSDConfig APIStephen Gallagher1-1/+534
2009-11-03Add support for option descriptions to SSSDConfig APIStephen Gallagher2-14/+148
Addresses https://fedorahosted.org/sssd/ticket/242 related to authconfig integration
2009-11-03Remove magic_private_groups from SSSDConfig API schemaStephen Gallagher2-3/+0
2009-11-03Make config_file_version a hidden setting in SSSDConfig APIStephen Gallagher5-17/+134
The config_file_version should never be changed by the API, so we will hide the option inside the SSSDConfig API and remove it from the schema. Guarantee that the config file is of the correct version
2009-10-29Tidy up ipa optionsSimo Sorce2-5/+1
Do not replicate every and each option we may want to set in ipa. Just read out ldap and krb provider options (added reference in the manual too, and removed mention of ipa specific timeout values, use ldap options for that) Avoid calling auth module initialization twice, just pass the auth context to the chpass module too. Add a new ldap option SDAP_SEARCH_BASE, so that a single searching base can be used for both users and groups. the user and group search bases can still be set separately if necessary but they are now optional and set to be identical to SDAP_SEARCH_BASE if not explicitly specified in the configuration.
2009-10-28Fix sssd.api.conf with correct entry_cache_timeoutStephen Gallagher2-2/+5
Changeset 3a21103f61bf9b60256cc2d0da54b757b634319f moved the wrong option to the domain list, and also didn't update the unit tests.
2009-10-27Move responsibility for entry expiration timeoutSimo Sorce2-2/+1
The providers are now responsible for determining how long a cached entry is considered valid. The default is the same as before (600s)
2009-10-26Add IPA conf templateSimo Sorce1-0/+9
2009-10-22Add support for offline auth cache timeoutStephen Gallagher1-0/+1
This adds a new option (offline_credentials_expiration) to the [PAM] section of the sssd.conf If the user does not perform an online authentication within the timeout (in days), they will be denied auth once the timeout passes.
2009-10-22Bring SSSDConfig API options up-to-dateStephen Gallagher3-21/+68
2009-10-13Package SSSDConfig APIStephen Gallagher1-0/+34
2009-10-13Add plugin configuration schema for proxy providerStephen Gallagher1-0/+7
2009-10-12Add new SSSDConfig python APIStephen Gallagher9-0/+2111
Also adds unit tests for the SSSDConfig API