[release-notes] Joining an AD domain should be easy now, thanks FreeIPA

Pete Travis immanetize at fedoraproject.org
Mon May 13 00:38:31 UTC 2013


commit cfd0200e5a649932a8d64c0ff895c997a04a4b28
Author: Pete Travis <immanetize at fedoraproject.org>
Date:   Sun May 12 18:37:54 2013 -0600

    Joining an AD domain should be easy now, thanks FreeIPA

 en-US/Security.xml |   49 +++++++++++++++++++++++++++++++------------------
 1 files changed, 31 insertions(+), 18 deletions(-)
---
diff --git a/en-US/Security.xml b/en-US/Security.xml
index cad6843..628971a 100644
--- a/en-US/Security.xml
+++ b/en-US/Security.xml
@@ -21,25 +21,38 @@
   </section>
 
   <section>
-    <title>FreeIPA Trust Improvements</title>
-    <para>
-      When using <application>FreeIPA</application> to trust <productname>Active Directory</productname> domain, it is now possible to designate multiple domain controllers in <application>FreeIPA</application> to server <productname>Windows</productname> clients.
-    </para>
-    <para>
-      <application>FreeIPA</application> has added management of additional domain suffixes visible to the trusted <productname>Active Directory</productname> domain's clients.
-    </para>
-    <para>
-      <application>FreeIPA</application> now implements <function>Global Catalog</function> service to allow <productname>Active Directory</productname> domain administrators to <application>FreeIPA</application> users.
-    </para>
-    <para>
-      Documentation of these new features is available at <ulink url="http://www.freeipa.org/page/V3/MultipleTrustServers" /> and <ulink url="https://fedorahosted.org/sssd/wiki/DesignDocs/GlobalCatalogLookups" />.
-    </para>
-  </section>
+    <title>FreeIPA</title>
+    
+    <section>
+      <title>FreeIPA realmd support</title>
+      <para>
+        It is now possible to simply configure a client to use a FreeIPA domain for authentication by using the <application>GNOME Control Center</application>, <function>kickstart</function> or command line:
+        <screen>
+          <command>realm join <replaceable>myipadomain.com</replaceable></command>
+        </screen>
+      </para>
+    </section>
+ 
+    <section>
+      <title>FreeIPA Trust Improvements</title>
+      <para>
+        When using <application>FreeIPA</application> to trust <productname>Active Directory</productname> domain, it is now possible to designate multiple domain controllers in <application>FreeIPA</application> to server <productname>Windows</productname> clients.
+      </para>
+      <para>
+        <application>FreeIPA</application> has added management of additional domain suffixes visible to the trusted <productname>Active Directory</productname> domain's clients.
+      </para>
+      <para>
+        <application>FreeIPA</application> now implements <function>Global Catalog</function> service to allow <productname>Active Directory</productname> domain administrators to <application>FreeIPA</application> users.
+      </para>
+      <para>
+        Documentation of these new features is available at <ulink url="http://www.freeipa.org/page/V3/MultipleTrustServers" /> and <ulink url="https://fedorahosted.org/sssd/wiki/DesignDocs/GlobalCatalogLookups" />.
+      </para>
+    </section>
 
-  <!-- Completion status unclear:
-  <section>
-    <title>FreeIPA Two Factor Authentication</title>
-    <para>
+    <!-- Completion status unclear:
+         <section>
+         <title>FreeIPA Two Factor Authentication</title>
+         <para>
       Improvements to <package>sssd</package>, <package>krb5</package>, and <package>freeipa-devel</package> packages allow two factor authentication by <application>FreeIPA</application>. Documentation is avvailable at <ulink url="http://k5wiki.kerberos.org/wiki/Projects/OTPOverRADIUS" /> and <ulink url="http://freeipa.org/page/V3/OTP" />.
     </para>
   </section>


More information about the docs-commits mailing list