summaryrefslogtreecommitdiff
path: root/src/man
AgeCommit message (Collapse)AuthorFilesLines
2013-08-28Add a new option to control subdomain enumerationJakub Hrozek1-0/+27
2013-08-28krb5: Fetch ccname template from krb5.confStephen Gallagher1-1/+10
In order to use the same defaults in all system daemons that needs to know how to generate or search for ccaches we introduce ode here to take advantage of the new option called default_ccache_name provided by libkrb5. If set this variable we establish the same default for all programs that surce it out of krb5.conf therefore providing a consistent experience across the system. Related: https://fedorahosted.org/sssd/ticket/2036
2013-08-27KRB5: Add support for KEYRING cache typeStephen Gallagher1-6/+17
https://fedorahosted.org/sssd/ticket/2036
2013-08-24MAN: AD provider only supports trusted domains from the same forestJakub Hrozek1-0/+5
Resolves: https://fedorahosted.org/sssd/ticket/2044
2013-07-29Netgroups should ignore the 'use_fully_qualified_names' settingStephen Gallagher1-0/+7
Netgroups often have memberNisNetgroup entries included in them that will never process correctly if we require fully-qualified names on the nested lookup. This patch alters the behavior of netgroup lookups to check *all* domains for an unqualified netgroup name, instead of only the ones not requiring fully- qualified names. https://fedorahosted.org/sssd/ticket/2013
2013-07-25Fix two minor typosYuri Chornoivan1-1/+1
2013-07-24Updating translations for the 1.11 beta2 releaseJakub Hrozek15-3402/+3974
2013-07-24Set default DNS resolution timeout to 6 seconds.Michal Zidek1-1/+1
Partially solves ticket: https://fedorahosted.org/sssd/ticket/1966 To avoid the problem mentioned in the ticket above, option dns_discovery_domain must be set properly.
2013-07-17MAN: Clarify the min_id/max_id limits furtherJakub Hrozek1-0/+4
https://fedorahosted.org/sssd/ticket/2005 Some users were confused by our description of min_id/max_id and thought the limits only applied to returning entries from the NSS responder. However, the limits are actually enforced on the back end side, so the entries are not even saved to cache.
2013-07-17MAN: IP addresss does not work when used for ad_serverJakub Hrozek1-1/+1
https://fedorahosted.org/sssd/ticket/1998 Currently using IP address as value of ad_server is not supported, so the man pages should not mention that as an option.
2013-07-17MAN: clarify the default access provider for ADJakub Hrozek1-0/+5
https://fedorahosted.org/sssd/ticket/1965 After we added a section that clarified what access_provider=ad did, some users were confused and thought that "ad" was also the default access provider if "id_provider=ad" was specified.
2013-07-10sss_cache: Add option to invalidate all entriesMichal Zidek1-0/+10
Option -E/--everething was added to invalide all types of entries. https://fedorahosted.org/sssd/ticket/1988
2013-07-09Do not copy special files when creating homedirOndrej Kos1-0/+4
https://fedorahosted.org/sssd/ticket/1778 When trying to copy special file, only message is logged now.
2013-06-28Updating translations for the 1.11 beta1 releaseJakub Hrozek15-3715/+4331
2013-06-28IPA: Add a server mode optionJakub Hrozek1-0/+19
https://fedorahosted.org/sssd/ticket/1993 SSSD needs to know that it is running on an IPA server and should not look up trusted users and groups with the help of the extdom plugin but do the lookups on its own. For this a new boolean configuration option, is introduced which defaults to false but is set to true during ipa-server-install or during updates of the FreeIPA server if it is not already set.
2013-06-28Add now options ldap_min_id and ldap_max_idSumit Bose1-0/+21
Currently the range for Posix IDs stored in an LDAP server is unbound. This might lead to conflicts in a setup with AD and trusts when the configured domain uses IDs from LDAP. With the two noe options this conflict can be avoided.
2013-06-27Update the translations for the 1.10.0 releaseJakub Hrozek15-520/+287
2013-06-12Fix minor typosYuri Chornoivan3-4/+4
2013-06-11Updating translations for the 1.10 beta2 releaseJakub Hrozek15-12547/+14575
2013-06-10A new option krb5_use_kdcinfoJakub Hrozek2-0/+56
https://fedorahosted.org/sssd/ticket/1883 The patch introduces a new Kerberos provider option called krb5_use_kdcinfo. The option is true by default in all providers. When set to false, the SSSD will not create krb5 info files that the locator plugin consumes and the user would have to set up the Kerberos options manually in krb5.conf
2013-06-10back end: add refresh expired records periodic taskPavel Březina1-0/+18
https://fedorahosted.org/sssd/ticket/1713 Add new option refresh_expired_interval.
2013-06-10man: document the need to set ldap_access_orderJakub Hrozek1-0/+21
https://fedorahosted.org/sssd/ticket/1789 ldap_access_order must be set in order to non-default access control options to work. This patch amends the sssd-ldap man page to document this fact with all non-default ldap_access_order options.
2013-06-06Enhance PAC responder for AD usersSumit Bose1-10/+10
This patch modifies the PAC responder so that it can be used with the AD provider as well. The main difference is that the POSIX UIDs and GIDs are now lookup up with the help of the SID instead of being calculated algorithmically. This was necessary because the AD provider allows either algorithmic mapping or reading the value from attributes stored in AD. Fixes https://fedorahosted.org/sssd/ticket/1558
2013-05-30MAN: state default dyndns interfaceOndrej Kos2-2/+8
https://fedorahosted.org/sssd/ticket/1924
2013-05-30Allow flat name in the FQname formatJakub Hrozek1-5/+63
https://fedorahosted.org/sssd/ticket/1648 Adds another expansion in the printf format that allows the user to use the domain flat name in the format.
2013-05-23Add a domain config attribute for realmdStef Walter1-0/+9
realmd needs to be able to tag various domains with basic info when it configures a domain.
2013-05-23Adding option to disable retrieving large AD groups.Lukas Slebodnik1-0/+21
This commit adds new option ldap_disable_range_retrieval with default value FALSE. If this option is enabled, large groups(>1500) will not be retrieved and behaviour will be similar like was before commit ae8d047122c "LDAP: Handle very large Active Directory groups" https://fedorahosted.org/sssd/ticket/1823
2013-05-14man: Note that IPA updates are secured with GSS-TSIGJakub Hrozek1-1/+2
2013-05-14man: Clarify the AD site discovery documentationJakub Hrozek1-1/+3
https://fedorahosted.org/sssd/ticket/1909
2013-05-13man: Clarify that AD dyndns updates are secured using GSS-TSIGJakub Hrozek1-1/+4
https://fedorahosted.org/sssd/ticket/1910
2013-05-13Enable the AD dynamic DNS updates by defaultJakub Hrozek1-1/+1
https://fedorahosted.org/sssd/ticket/1915
2013-05-13Fix a typo in sssd-ad man pageJakub Hrozek1-1/+1
s/IPA/AD/
2013-05-07AD: read flat name and SID of the AD domainSumit Bose2-0/+8
For various features either the flat/short/NetBIOS domain name or the domain SID is needed. Since the responders already try to do a subdomain lookup when and known domain name is encountered I added a subdomain lookup to the AD provider which currently only reads the SID from the base DN and the NetBIOS name from a reply of a LDAP ping. The results are written to the cache to have them available even if SSSD is started in offline mode. Looking up trusted domains can be added later. Since all the needed responder code is already available from the corresponding work for the IPA provider this patch fixes https://fedorahosted.org/sssd/ticket/1468
2013-05-06Fix minor typosYuri Chornoivan1-1/+1
2013-05-03Updating the translations for the 1.10 beta1 releaseJakub Hrozek15-11401/+12875
2013-05-03Active Directory dynamic DNS updatesJakub Hrozek1-0/+90
https://fedorahosted.org/sssd/ticket/1504 Implements dynamic DNS updates for the AD provider. By default, the updates also update the reverse zone and run periodically every 24 hours.
2013-05-03dyndns: new option dyndns_force_tcpJakub Hrozek1-0/+13
https://fedorahosted.org/sssd/ticket/1831 Adds a new option that can be used to force nsupdate to only use TCP to communicate with the DNS server.
2013-05-03dyndns: New option dyndns_update_ptrJakub Hrozek1-0/+20
https://fedorahosted.org/sssd/ticket/1832 While some servers, such as FreeIPA allow the PTR record to be synchronized when the forward record is updated, other servers, including Active Directory, require that the PTR record is synchronized manually. This patch adds a new option, dyndns_update_ptr that automatically generates appropriate DNS update message for updating the reverse zone. This option is off by default in the IPA provider. Also renames be_nsupdate_create_msg to be_nsupdate_create_fwd_msg
2013-05-03dyndns: new option dyndns_refresh_intervalJakub Hrozek1-0/+16
This new options adds the possibility of updating the DNS entries periodically regardless if they have changed or not. This feature will be useful mainly in AD environments where the Windows clients periodically update their DNS records.
2013-05-03Convert IPA-specific options to be back-end agnosticJakub Hrozek1-5/+23
This patch introduces new options for dynamic DNS updates that are not specific to any back end. The current ipa dyndns options are still usable, just with a deprecation warning.
2013-05-03SUDO: IPA providerLukas Slebodnik1-27/+3
This patch added auto configuration SUDO with ipa provider and compat tree. https://fedorahosted.org/sssd/ticket/1733
2013-05-02DNS sites support - add AD SRV pluginPavel Březina1-0/+21
https://fedorahosted.org/sssd/ticket/1032
2013-04-29Add override_homedir.xml to po4a.cfgSumit Bose1-0/+1
Every man page source which should be translated must be listed in po4a.cfg. Please remember to add a line whenever a new man page or a new include file is created
2013-04-26Document that the AD provider is case-insensitiveJakub Hrozek1-0/+3
https://fedorahosted.org/sssd/ticket/1867
2013-04-26Document the naming convention for SSSD domainsJakub Hrozek1-0/+2
https://fedorahosted.org/sssd/ticket/1809
2013-04-23Add exit status section to sss_ssh_* man pagesJan Cholasta2-0/+16
2013-04-22Allow usage of enterprise principalsSumit Bose2-0/+34
Enterprise principals are currently most useful for the AD provider and hence enabled here by default while for the other Kerberos based authentication providers they are disabled by default. If additional UPN suffixes are configured for the AD domain the user principal stored in the AD LDAP server might not contain the real Kerberos realm of the AD domain but one of the additional suffixes which might be completely randomly chooses, e.g. are not related to any existing DNS domain. This make it hard for a client to figure out the right KDC to send requests to. To get around this enterprise principals (see http://tools.ietf.org/html/rfc6806 for details) were introduced. Basically a default realm is added to the principal so that the Kerberos client libraries at least know where to send the request to. It is not in the responsibility of the KDC to either handle the request itself, return a client referral if he thinks a different KDC can handle the request or return and error. This feature is also use to allow authentication in AD environments with cross forest trusts. Fixes https://fedorahosted.org/sssd/ticket/1842
2013-04-10DNS sites support - add IPA SRV pluginPavel Březina1-0/+26
https://fedorahosted.org/sssd/ticket/1032
2013-04-10Allow using flatname for subdomain home dir templateJakub Hrozek1-1/+9
https://fedorahosted.org/sssd/ticket/1609
2013-04-10Put the override_homedir into an included xml fileJakub Hrozek3-141/+56
The description was duplicated on two places, leading to errors where one was amended but the other was not.