[release-notes] Joining an AD domain should be easy now, thanks FreeIPA
Pete Travis
immanetize at fedoraproject.org
Mon May 13 00:38:31 UTC 2013
commit cfd0200e5a649932a8d64c0ff895c997a04a4b28
Author: Pete Travis <immanetize at fedoraproject.org>
Date: Sun May 12 18:37:54 2013 -0600
Joining an AD domain should be easy now, thanks FreeIPA
en-US/Security.xml | 49 +++++++++++++++++++++++++++++++------------------
1 files changed, 31 insertions(+), 18 deletions(-)
---
diff --git a/en-US/Security.xml b/en-US/Security.xml
index cad6843..628971a 100644
--- a/en-US/Security.xml
+++ b/en-US/Security.xml
@@ -21,25 +21,38 @@
</section>
<section>
- <title>FreeIPA Trust Improvements</title>
- <para>
- When using <application>FreeIPA</application> to trust <productname>Active Directory</productname> domain, it is now possible to designate multiple domain controllers in <application>FreeIPA</application> to server <productname>Windows</productname> clients.
- </para>
- <para>
- <application>FreeIPA</application> has added management of additional domain suffixes visible to the trusted <productname>Active Directory</productname> domain's clients.
- </para>
- <para>
- <application>FreeIPA</application> now implements <function>Global Catalog</function> service to allow <productname>Active Directory</productname> domain administrators to <application>FreeIPA</application> users.
- </para>
- <para>
- Documentation of these new features is available at <ulink url="http://www.freeipa.org/page/V3/MultipleTrustServers" /> and <ulink url="https://fedorahosted.org/sssd/wiki/DesignDocs/GlobalCatalogLookups" />.
- </para>
- </section>
+ <title>FreeIPA</title>
+
+ <section>
+ <title>FreeIPA realmd support</title>
+ <para>
+ It is now possible to simply configure a client to use a FreeIPA domain for authentication by using the <application>GNOME Control Center</application>, <function>kickstart</function> or command line:
+ <screen>
+ <command>realm join <replaceable>myipadomain.com</replaceable></command>
+ </screen>
+ </para>
+ </section>
+
+ <section>
+ <title>FreeIPA Trust Improvements</title>
+ <para>
+ When using <application>FreeIPA</application> to trust <productname>Active Directory</productname> domain, it is now possible to designate multiple domain controllers in <application>FreeIPA</application> to server <productname>Windows</productname> clients.
+ </para>
+ <para>
+ <application>FreeIPA</application> has added management of additional domain suffixes visible to the trusted <productname>Active Directory</productname> domain's clients.
+ </para>
+ <para>
+ <application>FreeIPA</application> now implements <function>Global Catalog</function> service to allow <productname>Active Directory</productname> domain administrators to <application>FreeIPA</application> users.
+ </para>
+ <para>
+ Documentation of these new features is available at <ulink url="http://www.freeipa.org/page/V3/MultipleTrustServers" /> and <ulink url="https://fedorahosted.org/sssd/wiki/DesignDocs/GlobalCatalogLookups" />.
+ </para>
+ </section>
- <!-- Completion status unclear:
- <section>
- <title>FreeIPA Two Factor Authentication</title>
- <para>
+ <!-- Completion status unclear:
+ <section>
+ <title>FreeIPA Two Factor Authentication</title>
+ <para>
Improvements to <package>sssd</package>, <package>krb5</package>, and <package>freeipa-devel</package> packages allow two factor authentication by <application>FreeIPA</application>. Documentation is avvailable at <ulink url="http://k5wiki.kerberos.org/wiki/Projects/OTPOverRADIUS" /> and <ulink url="http://freeipa.org/page/V3/OTP" />.
</para>
</section>
More information about the docs-commits
mailing list