| Name: | libsss_idmap |
|---|---|
| Version: | 1.16.2 |
| Release: | 13.el7_6.5 |
| Architecture: | i686 |
| Group: | Development/Libraries |
| Size: | 70026 |
| License: | LGPLv3+ |
| RPM: | libsss_idmap-1.16.2-13.el7_6.5.i686.rpm |
| Source RPM: | sssd-1.16.2-13.el7_6.5.src.rpm |
| Build Date: | Tue Jan 29 2019 |
| Build Host: | x86-ol7-builder-03.us.oracle.com |
| Vendor: | Oracle America |
| URL: | https://pagure.io/SSSD/sssd/ |
| Summary: | FreeIPA Idmap library |
| Description: | Utility library to convert SIDs to Unix uids and gids |
- Resolves: rhbz#1659507 - SSSD's LDAP authentication provider does not work
if ID provider is authenticated with GSSAPI [rhel-7.6.z]
- Resolves: rhbz#1659083 - SSSD must be cleared/restarted periodically in
order to retrieve AD users through IPA Trust [rhel-7.6.z]
- Resolves: rhbz#1656833 - sssd_nss memory leak [rhel-7.6.z]
- Resolves: Bug 1649784 - SSSD not fetching all sudo rules from
AD [rhel-7.6.z]
- Resolves: rhbz#1645047 - sssd only sets the SELinux login context if it
differs from the default [rhel-7.6.z]
- Resolves: rhbz#1593756 - sssd needs to require a newer version of
libtalloc and libtevent to avoid an issue
in GPO processing
- Resolves: rhbz#1610667 - sssd_ssh leaks file descriptors when more than one certificate is converted into an SSH key - Resolves: rhbz#1583360 - The IPA selinux provider can return an error if SELinux is completely disabled
- Resolves: rhbz#1602781 - Local users failed to login with same password
- Resolves: rhbz#1586127 - Spurious check in the sssd nss memcache can cause the memory cache to be skipped
- Resolves: rhbz#1522928 - sssd doesn't allow user with expired password