-
Notifications
You must be signed in to change notification settings - Fork 255
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Tests: Add passkey test cases for following scenario #6965
Conversation
d4d1573
to
561e06c
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Why do you need to set cache_credentials
and krb5_store_password_if_offline
to true? Offline authentication should work without changing these options.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
So far, just some minor things to start looking at. Overall it looks good.
I took reference from https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/configuring_authentication_and_authorization_in_rhel/assembly_additional-configuration-for-identity-and-authentication-providers_configuring-authentication-and-authorization-in-rhel for and for |
e83f26d
to
e709956
Compare
That's only valid for 2FA, and from the SSSD perspective this isn't 2FA. The pin (or fingerprint) that you are setting is handled by FIDO2. Therefore, it is not necessary to set this value either. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Quick review update. Small things like adding su
to the descriptions to match other comments from #6727
e709956
to
7c7e55d
Compare
7c7e55d
to
ce8587d
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Just one new question/comment.
f450bc7
to
ebf6a03
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Minor comments.
ebf6a03
to
3cd756b
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
3cd756b
to
8a9a935
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Comments inline.
8a9a935
to
274ca4a
Compare
dcdd33f
to
b313042
Compare
b313042
to
cb40b76
Compare
cb40b76
to
405dee8
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM! Good job
405dee8
to
d4148c8
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Ack, thank you Madhuri.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM.
Test cases are as follows: 7. Check offline authentication of a user with LDAP, IPA, AD and Samba 8. Fetch user from cache for LDAP, IPA, AD and Samba server 9. Check authentication of user when multiple keys added for same user with LDAP, IPA, AD and Samba server. 10. Check authentication of user when same key added for multiple user with LDAP, IPA, AD and Samba server. Signed-off-by: Madhuri Upadhye <[email protected]>
9aa3ada
to
d6deb1a
Compare
@pbrezina Could You please merge this? Due to binary data the merge script does not work there. |
Test cases are as follows:
7. Check offline authentication of a user with LDAP, IPA, AD and Samba
8. Fetch user from cache for LDAP, IPA, AD and Samba server
9. Check authentication of user when multiple keys added for same user with LDAP, IPA, AD and Samba server.
10. Check authentication of user when same key added for multiple user with LDAP, IPA, AD and Samba server.