URL: https://github.com/freeipa/freeipa/pull/398
Title: #398: Support for Certificate Identity Mapping
dkupka commented:
"""
master:
* 9e24918c89f30a6d7064844dc0dd848bb35140df Support for Certificate Identity
Mapping
"""
See the full comment at
https://github.com/freeipa/freeipa/pull/398#iss
URL: https://github.com/freeipa/freeipa/pull/398
Title: #398: Support for Certificate Identity Mapping
dkupka commented:
"""
Works for me.
"""
See the full comment at
https://github.com/freeipa/freeipa/pull/398#issuecomment-283297105
--
Manage your subscription for the Freeipa-devel mailing l
URL: https://github.com/freeipa/freeipa/pull/398
Title: #398: Support for Certificate Identity Mapping
sumit-bose commented:
"""
Ok, sorry for the noise, I tested on a fresh install again and now it is
working as expected. I guess I shouldn't have tried to update from an older
version of your
URL: https://github.com/freeipa/freeipa/pull/398
Title: #398: Support for Certificate Identity Mapping
flo-renaud commented:
"""
Hi @sumit-bose ,
I am not able to reproduce this issue:
`[root@vm-161 ~]# kinit -k
[root@vm-161 ~]# klist
Ticket cache: KEYRING:persistent:0:krb_ccache_h6XRpeK
Default
URL: https://github.com/freeipa/freeipa/pull/398
Title: #398: Support for Certificate Identity Mapping
sumit-bose commented:
"""
It looks like the ACis on the latest version do not allow hosts to access the
rules. When I do 'kinit -k' on the IPA server or a client and call
ldapsearch -H ld
URL: https://github.com/freeipa/freeipa/pull/398
Title: #398: Support for Certificate Identity Mapping
HonzaCholasta commented:
"""
LGTM. @flo-renaud, don't forget to register the new OIDs.
"""
See the full comment at
https://github.com/freeipa/freeipa/pull/398#issuecomment-281337299
--
Manag
URL: https://github.com/freeipa/freeipa/pull/398
Title: #398: Support for Certificate Identity Mapping
flo-renaud commented:
"""
PR updated with the check on domain in certmaprule-add/mod.
"""
See the full comment at
https://github.com/freeipa/freeipa/pull/398#issuecomment-280152942
--
Manage
URL: https://github.com/freeipa/freeipa/pull/398
Title: #398: Support for Certificate Identity Mapping
flo-renaud commented:
"""
@HonzaCholasta
PR updated according to your comments. Thanks for the detailed review!
"""
See the full comment at
https://github.com/freeipa/freeipa/pull/398#issuec
URL: https://github.com/freeipa/freeipa/pull/398
Title: #398: Support for Certificate Identity Mapping
flo-renaud commented:
"""
Hi @HonzaCholasta
PR updated with `ipa user-add-certmapdata` using positional arg for CERTMAPDATA
"""
See the full comment at
https://github.com/freeipa/freeipa/pul
URL: https://github.com/freeipa/freeipa/pull/398
Title: #398: Support for Certificate Identity Mapping
HonzaCholasta commented:
"""
@flo-renaud, nevermind the `default_from` suggestion, I was wrong - if e.g.
both `--certmapdata` and `--certificate` are specified, we want to use both,
not throw
URL: https://github.com/freeipa/freeipa/pull/398
Title: #398: Support for Certificate Identity Mapping
flo-renaud commented:
"""
Hi @HonzaCholasta,
PR updated with most of your comments, except the suggestion to use
default_from. Please see my answer inline for this one.
"""
See the full comme
URL: https://github.com/freeipa/freeipa/pull/398
Title: #398: Support for Certificate Identity Mapping
MartinBasti commented:
"""
I put some inline commets, @flo-renaud if you don't know where to register OIDs
feel free to ping me
"""
See the full comment at
https://github.com/freeipa/freeipa
12 matches
Mail list logo