Import Upstream version 4.12.4
This commit is contained in:
@@ -55,7 +55,7 @@ PROFILE CONFIGURATION FORMAT:
|
||||
The profile configuration format is the raw property-list format
|
||||
used by Dogtag Certificate System. The XML format is not supported.
|
||||
|
||||
The following restrictions apply to profiles managed by FreeIPA:
|
||||
The following restrictions apply to profiles managed by IPA:
|
||||
|
||||
- When importing a profile the "profileId" field, if present, must
|
||||
match the ID given on the command line.
|
||||
|
||||
@@ -120,7 +120,7 @@ for a different domain.
|
||||
|
||||
(*) The RID is typically the last integer of a user or group SID which follows
|
||||
the domain SID. E.g. if the domain SID is S-1-5-21-123-456-789 and a user from
|
||||
this domain has the SID S-1-5-21-123-456-789-1010 then 1010 id the RID of the
|
||||
this domain has the SID S-1-5-21-123-456-789-1010 then 1010 is the RID of the
|
||||
user. RIDs are unique in a domain, 32bit values and are used for users and
|
||||
groups.
|
||||
|
||||
|
||||
@@ -132,7 +132,7 @@ class otptoken(Object):
|
||||
'ipatokentotpclockoffset',
|
||||
required=False,
|
||||
label=_(u'Clock offset'),
|
||||
doc=_(u'TOTP token / FreeIPA server time difference'),
|
||||
doc=_(u'TOTP token / IPA server time difference'),
|
||||
),
|
||||
parameters.Int(
|
||||
'ipatokentotptimestep',
|
||||
@@ -263,7 +263,7 @@ class otptoken_add(Method):
|
||||
required=False,
|
||||
cli_name='offset',
|
||||
label=_(u'Clock offset'),
|
||||
doc=_(u'TOTP token / FreeIPA server time difference'),
|
||||
doc=_(u'TOTP token / IPA server time difference'),
|
||||
default=0,
|
||||
autofill=True,
|
||||
),
|
||||
@@ -553,7 +553,7 @@ class otptoken_find(Method):
|
||||
required=False,
|
||||
cli_name='offset',
|
||||
label=_(u'Clock offset'),
|
||||
doc=_(u'TOTP token / FreeIPA server time difference'),
|
||||
doc=_(u'TOTP token / IPA server time difference'),
|
||||
default=0,
|
||||
),
|
||||
parameters.Int(
|
||||
|
||||
@@ -24,7 +24,7 @@ give certain users (or groups of users) the ability to run some (or all)
|
||||
commands as root or another user while providing an audit trail of the
|
||||
commands and their arguments.
|
||||
|
||||
FreeIPA provides a means to configure the various aspects of Sudo:
|
||||
IPA provides a means to configure the various aspects of Sudo:
|
||||
Users: The user(s)/group(s) allowed to invoke Sudo.
|
||||
Hosts: The host(s)/hostgroup(s) which the user is allowed to to invoke Sudo.
|
||||
Allow Command: The specific command(s) permitted to be run via Sudo.
|
||||
@@ -37,11 +37,13 @@ An order can be added to a sudorule to control the order in which they
|
||||
are evaluated (if the client supports it). This order is an integer and
|
||||
must be unique.
|
||||
|
||||
FreeIPA provides a designated binddn to use with Sudo located at:
|
||||
IPA provides a designated binddn to use with Sudo located at:
|
||||
uid=sudo,cn=sysaccounts,cn=etc,dc=example,dc=com
|
||||
|
||||
To enable the binddn run the following command to set the password:
|
||||
LDAPTLS_CACERT=/etc/ipa/ca.crt /usr/bin/ldappasswd -S -W -h ipa.example.com -ZZ -D "cn=Directory Manager" uid=sudo,cn=sysaccounts,cn=etc,dc=example,dc=com
|
||||
LDAPTLS_CACERT=/etc/ipa/ca.crt /usr/bin/ldappasswd -S -W \\
|
||||
-H ldap://ipa.example.com -ZZ -D "cn=Directory Manager" \\
|
||||
uid=sudo,cn=sysaccounts,cn=etc,dc=example,dc=com
|
||||
|
||||
EXAMPLES:
|
||||
|
||||
|
||||
Reference in New Issue
Block a user