Feature #754
Update Auth Drivers to make use of the new ACL engine
Status: | Closed | Start date: | 07/27/2011 | |
---|---|---|---|---|
Priority: | Normal | Due date: | ||
Assignee: | Ruben S. Montero | % Done: | 0% | |
Category: | Drivers - Auth | |||
Target version: | Release 3.0 | |||
Resolution: | fixed | Pull request: |
Description
- Extend the communication protocol to include ACL information
- Rewrite the driver skeleton
- Adopt the same structure as the VMM, IM & TM drivers
- Use multiple authentication mechanisms at the same time
Related issues
Associated revisions
feature #754: Fix bug creating client. Allows multiple ':' in auth string
feature #754: simple driver that implements plain auth (that in OpenNebula core). Removed debug messages
feature #754: Missing ssh library for auth drivers
feature #754: New dummy authN protocol
feature #754: Add dummy authenticate script
feature #754: Basic X509 authorization
feature #754: Simple loginx509 option for oneauth. Needs merge with current login option
feature #754: Bug when parsing the ONE_AUTH file
feature #754: Removed uneeded parameters for x509 authenticate
feature #754: Moved proxy path creation to login function
feature #754: Include also the username in the security token
feature #754: Authentication based on X509 proxy certificates
feature #754: Validate X509 expiration times. Support for trusted CA's
feature #754: Rename proxy file name
feature #754: Change initialize parameters for SshAuth
feature #754: Add PROXY_PATH constant
feature #754: Options can be defined without short value
feature #754: Add CLI functionality for ssh and x509
feature #754: removed unneeded reader attribute
feature #754: Some formatting. Changed delete! & simple gsub with delete. Make use of class constant LOGIN_PATH
feature #754: minor change
feature #754: Split login tokan generation and write login file
feauture #754: Included check of expiration times for the complete cert chain (from Ted). Do not modify cert_chain in validation
feature #754: Added a server based authentication using x509 certificates
feature #754: Support for proxy certificates in oneuser
feature #754: Do not check trusted CA's if directory not specified
feature #754: Install server auth files
feature #754: Update authenticate to make use of new x509 auth class
feature #754: Removed unneeded files
feature #754: Better names for varibles.
feature #754: Authenticate file for server auth
feature #754: fix install bugs
feature #754: Fixing bugs...
feature #754: Fixing bugs. login and create users based on x509 works
feature #754: Default for expiration time
feature #754: Fix bugs for server authN
feature #754: Missing require
Feature #754: Update configuration files
feature #754: Encode template instead it's id in INSTANTIATE auth strings
feature #754: Add user_id to the authorize parameters
feature #754: Add quota functionality
feature #754: If CA path is not defined, CAs will not be checked instead of raising an exception
feature #754: Removed comment
feature #754: Improve get_usage method
feature #754: Revert CA check c1338c737a99af573ce8ab3eb41ec9f72ed1ee
feature #754: Fix problem parsing cert chains. Includes conf files for server and x509 authN methods
feature #754: Fix typo in constant
feature #754: Removed quota from 754 branch to moved its development to another branch
bug #754: new man pages with the format error fixed
bug #754: new man pages with the format error fixed
(cherry picked from commit 26996edcb33c81191629187cb38b0d436f887a85)
History
#1 Updated by Ruben S. Montero almost 10 years ago
- Status changed from New to Closed
- Resolution set to fixed