Name: | ipa-client |
---|---|
Version: | 4.6.5 |
Release: | 11.0.1.el7_7.4 |
Architecture: | x86_64 |
Group: | System Environment/Base |
Size: | 259596 |
License: | GPLv3+ |
RPM: | ipa-client-4.6.5-11.0.1.el7_7.4.x86_64.rpm |
Source RPM: | ipa-4.6.5-11.0.1.el7_7.4.src.rpm |
Build Date: | Tue Feb 04 2020 |
Build Host: | jenkins-10-147-72-125-90ef0c6a-e4bf-41c5-a26e-604f9f2cbc51.appad3iad.osdevelopmeniad.oraclevcn.com |
Vendor: | Oracle America |
URL: | http://www.freeipa.org/ |
Summary: | IPA authentication for use on clients |
Description: | IPA is an integrated solution to provide centrally managed Identity (users, hosts, services), Authentication (SSO, 2FA), and Authorization (host access control, SELinux user roles, services). The solution provides features for further integration with Linux based clients (SUDO, automount) and integration with Active Directory based infrastructures (Trusts). If your network uses IPA for authentication, this package should be installed on every client machine. This package provides command-line tools for IPA administrators. |
- Blank out header-logo.png product-name.png - Replace login-screen-logo.png [Orabug: 20362818]
- Resolves: #1781153 - After upgrade AD Trust Agents were removed from LDAP - trust upgrade: ensure that host is member of adtrust agents - Resolves: #1777303 - CVE-2019-10195 ipa: batch API logging user passwords to /var/log/httpd/error_log - CVE-2019-10195: Don't log passwords embedded in commands in calls using batch - Resolves: #1773953 - User incorrectly added to negative cache when backend is reconnecting to IPA service / timed out: error code 32 'No such object' - extdom: unify error code handling especially LDAP_NO_SUCH_OBJECT - ipa-extdom-extop: test timed out getgrgid_r - Resolves: #1770728 - Issue with adding multiple RHEL 7 IPA replica to RHEL 6 IPA master - DL0 replica install: fix nsDS5ReplicaBindDN config - Resolves: #1767300 - CVE-2019-14867 ipa: Denial of service in IPA server due to wrong use of ber_scanf() - Make sure to have storage space for tag
- Resolves: #1756914 - Sub-CA key replication failure - Handle missing LWCA certificate or chain - Fix CustodiaClient ccache handling - CustodiaClient: use ldapi when ldap_uri not specified - CustodiaClient: fix IPASecStore config on ipa-4-7 - Bump krb5 min version
- Resolves: #1752740 - when migrating trusted domain object structure, add default access control definitions, if they were missing in old trust objects - add default access control when migrating trust objects - adtrust: add default read_keys permission for TDO objects - Disable deprecated-lambda check in adtrust upgrade code
- Resolves: 1723473 - ipa upgrade fails with trust entry already exists - adtrust upgrade: fix wrong primary principal name, part 2 - Resolves: 1686302 - ipa trust fetch-domains, server parameter ignored - trust-fetch-domains: make sure we use right KDC when --server is specified
- Resolves: 1723473 - ipa upgrade fails with trust entry already exists - adtrust upgrade: fix wrong primary principal name
- Resolves: 1712794 - ERROR: invalid 'PKINIT enabled server': all masters must have IPA master role enabled - Consider configured servers as valid
- Resolves: 1702651 - Command ipa conole is broken - ipa console: catch proper exception when history file can not be open - Resolves: 1704796 - Wrong CA replication topology created with two replicas - replica install: acknowledge ca_host override - Resolves: 1708873 - Unable to upgrade ipa data: IPA version error: data needs to be upgraded (expected version '4.7.90.pre1-3.fc30', current version '4.7.2-8.fc30') - upgrade: adtrust - catch empty result when retrieving list of trusts
- Resolves: 1704227 - Wrong logic in ipactl restart leads to start instead of restart pki-tomcatd - ipactl restart: fix wrong logic when checking service list
- Resolves: 1700804 - Update Red Hat logo in IdM Server