summaryrefslogtreecommitdiff
path: root/src/man
AgeCommit message (Collapse)AuthorFilesLines
2010-12-17Start first enumeration immediatelyStephen Gallagher1-0/+5
Previously, we would wait for ten seconds before starting an enumeration. However, this meant that on the first startup (before we had run our first enumeration) there was a ten-second window where clients would immediately get back a response with no entries instead of blocking until the enumeration completed. With this patch, SSSD will now run an enumeration immediately upon startup. Further startups will retain the ten-second delay so as not to slow down system bootups. https://fedorahosted.org/sssd/ticket/616
2010-12-13Add group support to the simple access providerStephen Gallagher1-13/+43
This patch adds simple_allow_groups and simple_deny_groups options to the simple access provider. It makes it possible to grant or deny access based on a user's group memberships within the domain. This patch makes one minor change to previous functionality: now all deny rules will supersede allow rules. Previously, if both simple_allow_users and simple_deny_users were set with the same value, the allow would win. https://fedorahosted.org/sssd/ticket/440
2010-12-08Fix a typo in sssd-krb5 man pageMarko Myllynen1-1/+1
2010-12-07Replace krb5_kdcip by krb5_server in LDAP providerSumit Bose1-1/+7
2010-12-07Add support for FAST in krb5 providerSumit Bose1-0/+35
2010-12-06Add ldap_chpass_uri config optionSumit Bose1-0/+34
2010-12-06Add new account expired rule to LDAP access providerSumit Bose1-1/+54
Two new options are added to the LDAP access provider to allow a broader range of access control rules to be evaluated. 'ldap_access_order' makes it possible to run more than one rule. To keep compatibility with older versions the default is 'filter'. This patch adds a new rule 'expire'. 'ldap_account_expire_policy' specifies which LDAP attribute should be used to determine if an account is expired or not. Currently only 'shadow' is supported which evaluates the ldap_user_shadow_expire attribute.
2010-12-03Allow krb5 lifetime values without a unitSumit Bose1-0/+8
2010-12-03Add support for automatic Kerberos ticket renewalSumit Bose1-0/+18
2010-12-03Add krb5_lifetime optionSumit Bose1-0/+32
2010-12-03Add krb5_renewable_lifetime optionSumit Bose1-0/+32
2010-12-01Allow protocol fallback for SRV queriesJakub Hrozek3-0/+17
https://fedorahosted.org/sssd/ticket/691
2010-11-22Add SIGUSR2 to reset offline statusSumit Bose1-0/+9
2010-11-22Add signal documentation to sssd(8)Stephen Gallagher1-0/+35
https://fedorahosted.org/sssd/ticket/665
2010-11-19Fix man pageSumit Bose1-2/+2
Currently sssd does not support authentication via GSSAPI. I think it is not necessary to support it, because if GSSAPI is possible Kerberos should be use for authentication.
2010-11-15Introduce pam_verbosity config optionSumit Bose1-0/+31
Currently we display all PAM messages generated by sssd to the user. But only some of them are important and others are just some useful information. This patch introduces a new option to the PAM responder which controls what kind of messages are displayed. As an example the 'Authenticated with cached credentials' message is used. This message is only displayed if pam_verbosity=1 or if there is an expire date.
2010-11-15Properly document ldap_purge_cache_timeoutStephen Gallagher1-0/+19
Also allow it to be disabled entirely
2010-11-05Review comments for namingContexts patchesSumit Bose1-9/+3
2010-11-04Make ldap_search_base a non-mandatory optionSumit Bose1-3/+20
2010-11-04Call krb5_child to check access permissionsSumit Bose1-0/+8
2010-10-22Add ldap_deref optionSumit Bose1-0/+35
2010-10-19Option krb5_server is now used to store a list of KDCs instead of krb5_kdcip.Jan Zeleny2-3/+9
For the time being, if krb5_server is not found, still falls back to krb5_kdcip with a warning. If both options are present in config file, krb5_server has a higher priority. Fixes: #543
2010-10-18Move all references to ldap_<entity>_search_base to "advanced" sectionJan Zeleny1-42/+52
The <entity> can be one of user, group or netgroup. The references were removed from example configuration and they were moved from section Configuration options to section Advanced options. Ticket: #607
2010-10-18Add option to limit nested groupsSimo Sorce1-0/+16
2010-10-13Add infrastructure to LDAP provider for netgroup supportSumit Bose1-0/+91
2010-10-13Add KDC to the list of LDAP optionsJakub Hrozek1-0/+18
2010-10-13Man pages should mention supported providersJan Zeleny4-13/+28
Each back end can support id, auth or access provider, but each back end supports different subset of these. Man pages should describe which providers are supported by each back end. Ticket: #615
2010-09-08Deobfuscate password in back endsJakub Hrozek1-1/+10
When obfuscated password is used in config file, the LDAP backend converts it back to clear text and uses it to authenticate to the server.
2010-09-08sss_obfuscate toolJakub Hrozek1-0/+113
A tool to add obfuscated passwords into the SSSD config file
2010-09-07Reviewed sssd-ldap man pageJan Zeleny1-7/+207
Some config options updated, newly documented 12 new options.
2010-07-09Add try_inotify optionStephen Gallagher1-0/+28
There are some special cases where inotify cannot be used, even if the host OS claims that it is supported. In these cases, it should be possible to explicitly disable the use of inotify. https://fedorahosted.org/sssd/ticket/484
2010-06-30Add dns_discovery_domain optionJakub Hrozek2-2/+20
The service discovery used to use the SSSD domain name to perform DNS queries. This is not an optimal solution, for example from the point of view of authconfig. This patch introduces a new option "dns_discovery_domain" that allows to set the domain part of a DNS SRV query. If this option is not set, the default behavior is to use the domain part of the machine's hostname. Fixes: #479
2010-06-16Standardize on correct spelling of "principal" for krb5Stephen Gallagher1-1/+1
https://fedorahosted.org/sssd/ticket/542
2010-06-14Remove the -g option from useraddJakub Hrozek1-13/+0
The local domain has the magic private groups option set unconditionally. Therefore, it does not make any sense to let user configure the primary GID. As a side-effect, this fixes #522.
2010-06-14Remove krb5_changepw_principal optionJakub Hrozek1-15/+0
Fixes: #531
2010-06-09Change default min_id to 1Stephen Gallagher1-3/+11
Also update manpage for min_id/max_id to be more clear about how it relates to primary GID.
2010-06-06Man page fixesJakub Hrozek2-2/+6
Fixes: #496
2010-05-27Add ldap_access_filter optionStephen Gallagher1-0/+39
This option (applicable to access_provider=ldap) allows the admin to set an additional LDAP search filter that must match in order for a user to be granted access to the system. Common examples for this would be limiting access to users by in a particular group, for example: ldap_access_filter = memberOf=cn=access_group,ou=Groups,dc=example,dc=com
2010-05-26Add support for delayed kinit if offlineSumit Bose1-0/+18
If the configuration option krb5_store_password_if_offline is set to true and the backend is offline the plain text user password is stored and used to request a TGT if the backend becomes online. If available the Linux kernel key retention service is used.
2010-05-20Add enumerate details to the manpage and examplesStephen Gallagher1-1/+19
2010-05-16Add ldap_krb5_ticket_lifetime optionSumit Bose1-0/+13
2010-05-16Add dynamic DNS updates to FreeIPAStephen Gallagher1-0/+28
This adds two new options: ipa_dyndns_update: Boolean value to select whether this client should automatically update its IP address in FreeIPA DNS. ipa_dyndns_iface: Choose an interface manually to use for updating dynamic DNS. Default is to use the interface associated with the LDAP connection to FreeIPA. This patch supports A and AAAA records. It relies on the presence of the nsupdate tool from the bind-utils package to perform the actual update step. The location of this utility is set at build time, but its availability is determined at runtime (so clients that do not require dynamic update capability do not need to meet this dependency).
2010-05-07Revert "Add dynamic DNS updates to FreeIPA"Stephen Gallagher1-28/+0
This reverts commit 973b7c27c0b294b8b2f120296f64c6a3a36e44b7. While this patch applied cleanly, it was uncompilable. Reverting until it can be properly merged.
2010-05-07Add dynamic DNS updates to FreeIPAStephen Gallagher1-0/+28
This adds two new options: ipa_dyndns_update: Boolean value to select whether this client should automatically update its IP address in FreeIPA DNS. ipa_dyndns_iface: Choose an interface manually to use for updating dynamic DNS. Default is to use the interface associated with the LDAP connection to FreeIPA. This patch supports A and AAAA records. It relies on the presence of the nsupdate tool from the bind-utils package to perform the actual update step. The location of this utility is set at build time, but its availability is determined at runtime (so clients that do not require dynamic update capability do not need to meet this dependency).
2010-05-07Use service discovery in backendsJakub Hrozek4-3/+62
Integrate the failover improvements with our back ends. The DNS domain used in the SRV query is always the SSSD domain name. Please note that this patch changes the default value of ldap_uri from "ldap://localhost" to "NULL" in order to use service discovery with no server set.
2010-05-07Add retry option to pam_sssSumit Bose1-0/+17
2010-04-30Add dns_resolver_timeout optionStephen Gallagher1-0/+15
We had a hard-coded timeout of five seconds for DNS lookups in the async resolver. This patch adds an option 'dns_resolver_timeout' to specify this value (Default: 5)
2010-04-26Display a message if a password reset by root failsSumit Bose1-0/+22
2010-04-08SELinux login managementJakub Hrozek2-0/+23
Adds a new option -Z to sss_useradd and sss_usermod. This option allows user to specify the SELinux login context for the user. On deleting the user with sss_userdel, the login mapping is deleted, so subsequent adding of the same user would result in the default login context unless -Z is specified again. MLS security is not supported as of this patch.
2010-04-06Make sss_userdel check for logged in usersJakub Hrozek1-0/+11
sss_userdel now warns if the deleted user was logged in at the time of deletion. Also adds a new parameter --kick to userdel that kills all user processes before actually deleting ther user. Fixes: #229