Back to bug 1310877

Who When What Removed Added
Jakub Hrozek 2016-02-22 21:11:46 UTC Status NEW POST
Sat6QE Jenkins 2016-03-28 20:15:54 UTC Status POST MODIFIED
Mike McCune 2016-03-28 23:37:25 UTC Status MODIFIED POST
John Skeoch 2016-06-01 01:29:23 UTC CC preichl
Jakub Hrozek 2016-06-21 08:17:04 UTC Status POST MODIFIED
Fixed In Version sssd-1.14.0-0.1.alpha.el7
errata-xmlrpc 2016-06-21 08:41:29 UTC Status MODIFIED ON_QA
Aneta Šteflová Petrová 2016-06-27 10:56:52 UTC Docs Contact mmuehlfe
Marc Muehlfeld 2016-07-08 13:21:16 UTC Doc Text SSSD now supports automatic Kerberos host keytab renewal

Previously, the System Security Services Daemon (SSSD) did not support the automatic renewal of Kerberos host keytab files in an Active Directory (AD). In environments that do not allow never expiring passwords for security reasons, the files had to be manually renewed. With this update, SSSD is able to automatically renew Kerberos host keytab files.

SSSD checks once per day if the machine account password is older than the configured number of days in the "ad_maximum_machine_account_password_age" parameter of the `/etc/sssd/sssd.conf` file.
Marc Muehlfeld 2016-07-15 05:50:07 UTC Doc Text SSSD now supports automatic Kerberos host keytab renewal

Previously, the System Security Services Daemon (SSSD) did not support the automatic renewal of Kerberos host keytab files in an Active Directory (AD). In environments that do not allow never expiring passwords for security reasons, the files had to be manually renewed. With this update, SSSD is able to automatically renew Kerberos host keytab files.

SSSD checks once per day if the machine account password is older than the configured number of days in the "ad_maximum_machine_account_password_age" parameter of the `/etc/sssd/sssd.conf` file.
SSSD now supports automatic Kerberos host keytab renewal

Previously, the System Security Services Daemon (SSSD) did not support the automatic renewal of Kerberos host keytab files in an Active Directory (AD). In environments that, for security reasons, do not allow using passwords that never expire, the files had to be manually renewed. With this update, SSSD is able to automatically renew Kerberos host keytab files.

SSSD checks once per day if the machine account password is older than the configured number of days in the "ad_maximum_machine_account_password_age" parameter of the `/etc/sssd/sssd.conf` file.
Marc Muehlfeld 2016-07-15 06:11:52 UTC CC sssd-maint
Flags needinfo?(sssd-maint)
Jakub Hrozek 2016-07-15 07:44:37 UTC Flags needinfo?(sssd-maint)
Aneta Šteflová Petrová 2016-08-05 06:56:36 UTC Blocks 1359600
Aneta Šteflová Petrová 2016-08-16 11:29:28 UTC Doc Text SSSD now supports automatic Kerberos host keytab renewal

Previously, the System Security Services Daemon (SSSD) did not support the automatic renewal of Kerberos host keytab files in an Active Directory (AD). In environments that, for security reasons, do not allow using passwords that never expire, the files had to be manually renewed. With this update, SSSD is able to automatically renew Kerberos host keytab files.

SSSD checks once per day if the machine account password is older than the configured number of days in the "ad_maximum_machine_account_password_age" parameter of the `/etc/sssd/sssd.conf` file.
SSSD now supports automatic Kerberos host keytab renewal

Previously, the System Security Services Daemon (SSSD) did not support the automatic renewal of Kerberos host keytab files in an Active Directory (AD). In environments that, for security reasons, do not allow using passwords that never expire, the files had to be manually renewed. With this update, SSSD is able to automatically renew Kerberos host keytab files.

SSSD checks once per day if the machine account password is older than the configured number of days in the "ad_maximum_machine_account_password_age" parameter of the `/etc/sssd/sssd.conf` file.

For details, see https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7-Beta/html-single/System-Level_Authentication_Guide/index.html#sssd-auto-keytab-renewal
Niranjan Mallapadi Raghavender 2016-08-17 06:41:18 UTC Status ON_QA VERIFIED
Aneta Šteflová Petrová 2016-10-12 15:45:17 UTC Doc Text SSSD now supports automatic Kerberos host keytab renewal

Previously, the System Security Services Daemon (SSSD) did not support the automatic renewal of Kerberos host keytab files in an Active Directory (AD). In environments that, for security reasons, do not allow using passwords that never expire, the files had to be manually renewed. With this update, SSSD is able to automatically renew Kerberos host keytab files.

SSSD checks once per day if the machine account password is older than the configured number of days in the "ad_maximum_machine_account_password_age" parameter of the `/etc/sssd/sssd.conf` file.

For details, see https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7-Beta/html-single/System-Level_Authentication_Guide/index.html#sssd-auto-keytab-renewal
SSSD now supports automatic Kerberos host keytab renewal

Previously, the System Security Services Daemon (SSSD) did not support the automatic renewal of Kerberos host keytab files in an Active Directory (AD). In environments that, for security reasons, do not allow using passwords that never expire, the files had to be manually renewed. With this update, SSSD is able to automatically renew Kerberos host keytab files.

SSSD checks once per day if the machine account password is older than the configured number of days in the "ad_maximum_machine_account_password_age" parameter of the `/etc/sssd/sssd.conf` file.

For details, see https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7/html-single/System-Level_Authentication_Guide/index.html#sssd-auto-keytab-renewal
errata-xmlrpc 2016-11-02 14:22:08 UTC Status VERIFIED RELEASE_PENDING
errata-xmlrpc 2016-11-04 07:16:18 UTC Status RELEASE_PENDING CLOSED
Resolution --- ERRATA
Last Closed 2016-11-04 03:16:18 UTC
Pavel Březina 2020-05-04 10:53:56 UTC Link ID Github SSSD/sssd/issues/2083

Back to bug 1310877