You probably want to post these kind of questions to the users list:
freeipa-us...@lists.fedorahosted.org
the devel list is for technical discussions about the development of
the project.
On Mon, 2020-01-13 at 16:49 +, cyrine stambouli via FreeIPA-devel
wrote:
> Hello,
> I have a problem to
or")
$ echo '{"user":"username","new":"newpwd3412432","old":"old123"}' |
./ipapwcrack.py
{"success": true}
On Fri, 2018-07-13 at 07:54 -0400, Simo Sorce via FreeIPA-devel wrote:
> On Fri, 2018-07-13 at 07:46 -
ce
burden. The current approach already did, let's not keep doing the same
mistake.
Simo.
> Thanks,
>
> Mark
>
>
> On 07/13/2018 07:34 AM, Simo Sorce via FreeIPA-devel wrote:
> > Hi Mark,
> >
> > FWIW I do not think we should do this *in* FreeIPA or the
On Thu, 2018-07-12 at 15:08 -0400, Mark Reynolds via FreeIPA-devel
wrote:
> New Attributes to add to objectclass "krbPwdPolicy":
>
> krbPwdPalindrome: on
> krbPwdMaxSequence: 4
> krbPwdMaxSeqSets: 2
> krbPwdMaxCharClass: 3
> krbPwdMinDigits: 1
> krbPwdMinAlphas: 1
>
Hi Mark,
FWIW I do not think we should do this *in* FreeIPA or the 389ds
password plugin.
I think we should provide a mechanism to invoke an external service to
check for password quality and defer to it any enhancement.
There are just too many different requests coming in, each with their
On Fri, 2018-05-11 at 13:52 -0400, Rob Crittenden wrote:
> Simo Sorce wrote:
> > On Fri, 2018-05-11 at 15:47 +1000, Fraser Tweedale via FreeIPA-devel
> > wrote:
> > > Hi all,
> > >
> > > Ticket https://pagure.io/freeipa/issue/7482 made me think about the
> > > current revocation behaviour in `ipa
On Fri, 2018-05-11 at 15:47 +1000, Fraser Tweedale via FreeIPA-devel
wrote:
> Hi all,
>
> Ticket https://pagure.io/freeipa/issue/7482 made me think about the
> current revocation behaviour in `ipa cert-request`. For hosts and
> services, all old certificates get revoked.
>
> I wrote a blog
On Thu, 2018-03-15 at 10:59 -0400, Rob Crittenden via FreeIPA-devel
wrote:
> Christian Heimes wrote:
> > On 2018-03-15 14:19, Rob Crittenden via FreeIPA-devel wrote:
> > > freeIPA in Fedora 28 is currently broken for a number of reasons:
> > >
> > > - The NSS switch to sqlite
> > > - 389-ds now
On Tue, 2018-03-06 at 20:01 +0100, Petr Vobornik via FreeIPA-devel
wrote:
> Hi FreeIPA contributors,
>
> first, I apologize for such long mail.
>
> in the team, we discuss how upstream CI should look like and what to
> expect from it. Various proposals were discussed. In this email I'd
> like to
On Mon, 2018-01-29 at 14:54 +0100, Tibor Dudlák wrote:
[...]
> > > > So given the above we initially decided to make IPA servers also ntp
> > > > servers and configure client to use IPA server as time sources.
>
> Not configuring NTP service but still requiting it might be way to give
> freedom
On Wed, 2018-01-24 at 16:25 +0100, Tibor Dudlák via FreeIPA-devel
wrote:
> Hello FreeIPA-devel list fellow beings!
>
> I would like to continue the discussion started in [1], and find its
> solution.
>
> While using the Single-Sign-on authentication provided via an MIT Kerberos
> KDC there must
On Wed, 2017-11-15 at 22:03 +0100, Martin Kosek via FreeIPA-devel
wrote:
> On 11/15/2017 04:53 PM, Rob Crittenden wrote:
> > Martin Kosek via FreeIPA-devel wrote:
> > > On 09/15/2017 12:54 PM, Martin Kosek wrote:
> > > > Hello all,
> > > >
> > > > I would like to start a discussion regarding the
On Mon, 2017-07-10 at 12:44 +0200, Tomas Krizek wrote:
> On 07/10/2017 12:16 PM, Simo Sorce via FreeIPA-devel wrote:
> > Hi Fraser,
> > I think you put on a reasonable proposal, however If I had to
> > design
> > this right now and had the freedom to change dogtag
Hi Fraser,
I think you put on a reasonable proposal, however If I had to design
this right now and had the freedom to change dogtag and the rest of
freeipa to cope I would do the following:
- Change the LDAP profile storage to have versioned subtrees for
"system" profiles, and have a "custom"
14 matches
Mail list logo