On Tue, Jul 25, 2017 at 08:39:59AM +0200, Lukas Slebodnik wrote:
> On (24/07/17 18:34), Jakub Hrozek wrote:
> >Hi,
> >
> >I would really like to release 1.15.3 soon (like, today, at worst
> >tomorrow if we can't merge PR #328 and #331 today). The release notes
> >are here:
> >    https://pagure.io/fork/jhrozek/SSSD/docs
> >
> >You can either clone the repo and run 'make html' or, for your
> >convenience, I'm pasting the RST-formatted release notes below:
> >
> >SSSD 1.15.3
> >===========
> >
> >Highlights
> >----------
> >
> >New Features
> >^^^^^^^^^^^^
> > * In a setup where an IPA domain trusts an Active Directory domain,
> >   it is now possible to `define the domain resolution order
> >   <http://www.freeipa.org/page/Releases/4.5.0#AD_User_Short_Names>`_.
> >   Starting with this version, SSSD is able to read and honor the domain
> >   resolution order, providing a way to resolve Active Directory users by
> >   just their short name.  SSSD also supports a new option
> >   ``domain_resolution_order`` applicable in the ``[sssd]`` section
> >   that allows to configure short names for AD users in setup with
> >   ``id_provider=ad`` or in a setup with an older IPA server that doesn't
> >   support the ``ipa config-mod --domain-resolution-order``
> >   configuration option. Also, it is now possible to use
> >   ``use_fully_qualified_names=False`` in a subdomain configuration, but
> >   please note that the user and group output from trusted domains will
> >   always be qualified to avoid conflicts.
> >
> >   * Design page - `Shortnames in trusted domains 
> > <https://docs.pagure.org/SSSD.sssd/design_pages/shortnames.html>`_
> >
> > * SSSD ships with a new service called KCM. This service acts as a
> >   storage for Kerberos tickets when ``libkrb5`` is configured to use
> >   ``KCM:`` in ``krb5.conf``. Compared to other Kerberos credential
> >   cache types, KCM is better suited for containerized environments and
> >   because the credential caches are managed by a stateful daemon, in
> >   future releases will also allow to renew tickets acquired outside SSSD
> >   (e.g. with ``kinit``) or provide notifications about ticket changes.
> >
> 
> Maybe we can mention that it is an optional feature and can be disabled
> at configure time if users does not want additional build/runtime time
> dependencies.

Done

> 
> 
> >   * Design page - `KCM server for SSSD 
> > <https://docs.pagure.org/SSSD.sssd/design_pages/kcm.html>`_
> >
> >   * `NOTE`: There are several known issues in the ``KCM`` responder that
> >     will be handled in the next release such as
> >     `issues with very large tickets 
> > <https://pagure.io/SSSD/sssd/issue/3386>`_
> >     or `tracking the SELinux label of the peer 
> > <https://pagure.io/SSSD/sssd/issue/3434>`_
> >
> > * Support for user and group resolution through the D-Bus interface and
> >   authentication and/or authorization through the PAM interface even
> >   for setups without UIDs or Windows SIDs present on the LDAP directory
> >   side. This enhancement allows SSSD to be used together with `apache
> >   modules <https://github.com/adelton/mod_lookup_identity>`_ to provide
> >   identities for applications
> >
> >   * Design page - `Support for non-POSIX users and groups 
> > <https://docs.pagure.org/SSSD.sssd/design_pages/non_posix_support.html>`_
> >
> > * SSSD ships a new public library called ``libsss_certmap`` that allows
> >   a flexible and configurable way of mapping a certificate to a user
> >   identity. This is required e.g. in environments where it is not possible
> >   to add the certificate to the LDAP user entry, because the certificates
> >   are issued externally or the LDAP schema cannot be modified. Additionally,
> >   specific matching rules allow a specific certificate on a smart card to
> >   be selected for authentication.
> >
> >   * Design page - `Matching and Mapping Certificates 
> > <https://docs.pagure.org/SSSD.sssd/design_pages/matching_and_mapping_certificates.html>`_
> >
> > * The Kerberos locator plugin can be disabled using an environment variable
> >   ``SSSD_KRB5_LOCATOR_DISABLE``. Please refer to the
> >   ``sssd_krb5_locator_plugin`` manual page for mode details.
> >
> > * The ``sssctl`` command line tool supports a new command ``user-checks``
> >   that enables the administrator to check whether a certain user should be
> >   allowed or denied access to a certain PAM service.
> >
> > * The ``secrets`` responder now forwards requests to a proxy Custodia
> >   back end over a secure channel.
> >
> >Notable bug fixes
> >^^^^^^^^^^^^^^^^^
> >
> > * The IPA HBAC evaluator no longer relies on ``originalMemberOf``
> >   attributes to construct the list of groups the user is a member of.
> >   Maintaining the ``originalMemberOf`` attribute was unreliable and
> >   was causing intermittent HBAC issues.
> >
> > * A bug where the cleanup operation might erroneously remove cached users
> >   during their cache validation in case SSSD was set up with
> >   ``enumerate=True`` was fixed.
> >
> > * Several bugs related to configuration of trusted domains were fixed, in
> >   particular handling of custom LDAP search bases set for trusted domains.
> >
> > * Password changes for users from trusted Active Directory domains
> >   were fixed
> >
> >Packaging Changes
> >-----------------
> >
> > * A new KCM responder was added along with a manpage. The upstream
> >   reference specfile packages the responder in its own subpackage called
> >   ``sssd-kcm`` and a krb5.conf snippet that enables the ``KCM``
> >   credentials cache simply by installing the subpackage
> >
> 
> Would be good to merge https://github.com/SSSD/sssd/pull/244 because
> /etc/krb5.conf.d/ is fedora/el7 specific which is not ideal from
> upstream POV.

Done.
_______________________________________________
sssd-devel mailing list -- sssd-devel@lists.fedorahosted.org
To unsubscribe send an email to sssd-devel-le...@lists.fedorahosted.org

Reply via email to