# SSSD 2.12.0

The SSSD team is announcing the release of version 2.12.0 of the
System Security Services Daemon. The tarball can be downloaded from:
     https://github.com/SSSD/sssd/releases/tag/2.12.0

See the full release notes at:
     https://sssd.io/release-notes/sssd-2.12.0.html

RPM packages will be made available for Fedora shortly.

## Feedback

Please provide comments, bugs and other feedback via the sssd-devel
or sssd-users mailing lists:
     https://lists.fedorahosted.org/mailman/listinfo/sssd-devel
     https://lists.fedorahosted.org/mailman/listinfo/sssd-users

# SSSD 2.12.0 Release Notes

## Highlights

### General information

* After startup SSSD already creates a Kerberos configuration snippet typically in `/var/lib/sss/pubconf/krb5.include.d/localauth_plugin` if the AD or IPA providers are used. This enables SSSD's localauth plugin. Starting with this release the an2ln plugin is disabled in the configuration snippet as well. If this file or its content are included in the Kerberos configuration it will fix CVE-2025-11561. * Previously deprecated `--with-extended-enumeration-support` `./configure` option was removed. * SSSD now allows using machine credentials from a trusted AD domain or Kerberos realm if no suitable domain-local credentials are available.

### New features

* SSSD now supports authentication mechanism selection through PAM using a JSON-based protocol. This feature enables passwordless authentication mechanisms in GUI login environments that support the protocol. Feature will be supported by GNOME Display Manager (GDM) starting with GNOME 50. While currently optimized for GNOME, the JSON protocol design allows for future support in other display managers. authselect is the recommended approach and will handle the necessary PAM stack modifications automatically starting with version 1.7 through the new option `with-switchable-auth` which provides a new PAM service called `switchable-auth`. Manual PAM configuration is also possible. For more technical details and implementation specifications, see the design documentation: https://sssd.io/design-pages/passwordless_gdm.html

### Packaging changes

* This update makes it possible to not grant CAP_SETUID and CAP_SETGID to `krb5_child` binary in a situation where it is not required to store acquired TGT after user authentication. Taking into account that it is already possible to avoid using CAP_DAC_READ_SEARCH if keytab is readable by SSSD service user, and usage of 'selinux_child' isn't always required, this allows to build a setup with completely privilege-less SSSD to serve certain use cases. In particular, this might be used to build a container running SSSD on OCP with a restricted profile. * A new configure option `--with-ldb-modules-path=PATH` option to specify LDB modules path at build time. * `--with-allow-remote-domain-local-groups` `./configure` option was removed.

### Configuration changes

* An option `ipa_enable_dns_sites`, that never worked due to missing server side implementation, was removed. * A new option `pam_json_services` is now available to enable JSON protocol to communicate the available authentication mechanisms. * The default value of `session_provider` option was changed to `none` (i.e. disabled) no matter what `id_provider` used. Previously `session_provider` was enabled by default for `id_provider = ipa` case. The primary tool it was intended to support, "Fleet Commander," has become obsolete. * The option `ipa_subid_ranges_search_base` was deprecated in favor of `ldap_subid_ranges_search_base`. * Support of previously deprecated `ad_allow_remote_domain_local_groups` config option was removed completely. * `ipa_dyndns_update`, `ipa_dyndns_ttl`, and `ipa_dyndns_iface` legacy options were removed. * A new option, `dyndns_address`, has been introduced to specify network addresses that are allowed or excluded from dynamic DNS updates. The `dyndns_iface` option has been extended to support the exclusion of network interfaces.

--
_______________________________________________
sssd-users mailing list -- [email protected]
To unsubscribe send an email to [email protected]
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedorahosted.org/archives/list/[email protected]
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue

Reply via email to